Patent classifications
H04W12/66
Source verification device
Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.
SOURCE VERIFICATION DEVICE
Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.
METHOD FOR NETWORK POLICY MANAGEMENT OF FOREGROUND APPLICATIONS
A system and method for managing a network policy of an application on a client includes discovering, by the client, a first network, determining if the first network is a restricted network, applying a restricted network rule to the client when the first network is a restricted network, lowering a network score of the first network when the first network is a restricted network, and associating with the first network.
UTILIZING TRUST TOKENS TO CONDUCT SECURE MESSAGE EXCHANGES
Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.
SYSTEM AND METHOD FOR NETWORK DEVICE SECURITY AND TRUST SCORE DETERMINATIONS
The present disclosure relates to systems, devices and methods for device security and trust score determinations. In one embodiment, a method includes requesting, by a first device, trust score data for a second device, wherein the first device requests trust score data from a trust score management server, and receiving, by the first device, trust score data from the trust score management server. The method also includes generating a first trust score for the second device and transmitting the first trust score for the second device with a trust score management server. The method also includes configuring, by the first device, at least one control parameter for operation of the first device with the second device based on the first trust score, wherein configuring adjusts a previous control parameter to restrict operation of the first device relative to the second device. Device and systems are provided to enhance network security.
System for electroencephalogram patterning recognition for authentication
Embodiments of the invention are directed to systems, methods, and computer program products for electroencephalogram patterning recognition for user authentication into one or more physical or digital locations. In this way, the system may generate a spectral analysis baseline electroencephalogram reading for a user that can be segmented and analyzed based on a specific time span associated with a known stimulus or event, and diagnostic applications generally focus on either event-related potentials or the like. Upon initiating a request to enter a location requiring authentication, an electroencephalogram reading may be generated and patterned after the baseline electroencephalogram reading for the user. The system may perform patterned recognition of the readings and provide an authentication confidence of the user for authentication into the location.
RECEIVER DEVICE FOR FACILITATING WIRELESS POWER RECEPTION
Disclosed is a receiver device for facilitating wireless power reception, the receiver device comprising a receiver transceiver configured for wirelessly communicating with at least one transmitter device. Further, the receiver device comprising of a receiver processing device communicatively coupled to the unique receiver transceiver. Further, the receiver device comprising a enabled receiver storage device configured for storing energy for at least one blockchain enabled receiver. Moreover, the receiver device comprising a unique power port communicatively coupled with the unique receiver transceiver, wherein the unique power output port is configured to be interfaced with at least one power input port of at least one electronic device, wherein the unique power output port is configured for supplying the electrical energy to the at least one electronic device.
WEARABLE DEVICE FOR TRUSTED BIOMETRIC IDENTITY
According to an implementation, a wearable device is configured to store a biometric token associated with a wearer of the wearable device, the wearable device including: a wireless communications interface; a processing circuitry; a memory configured to store a biometric token associated with a wearer of the wearable device, the biometric token including a device identifier that is associated with the wearable device, a biometric template for each of one or more biometric scans of the wearer of the wearable device, and an indication of whether or not the biometric token is valid, wherein the biometric token, if valid, establishes a trust that wearer identifying information, linked to the biometric token, is associated with the wearer; an invalidating event detector configured to determine if an invalidating event has occurred; wherein the processing circuitry is configured to invalidate the biometric token in response to detecting that an invalidating event has occurred for the biometric token.
SECURING COMMUNICATION OF DEVICES IN THE INTERNET OF THINGS
It is recognized herein that current messaging protocols for internet of things (IoT) architectures are often weak from a security perspective, and are often poorly suited for resource-constrained devices. An example IoT system described herein combines device authentication and application-layer key establishment using facilities of IoT messaging protocols. The IoT system may include a Trust Broker, which acts as a registration point for devices, and an edge gateway, which manages communication between a given device and the trust broker (and IoT servers). The edge gateway may acquire a trusted role, such that it may be a secure intermediary for device-server messaging, and such that it can facilitate authentication of devices to services.
Wireless communication service over an edge data network (EDN) between a user equipment (UE) and an application server (AS)
In a wireless communication network, an Edge Enablement Client (EEC) in a UE Gateway (GW) exchanges EDGE-5 signaling with a user app and exchanges EDGE-1 signaling with a Gateway Enablement Server (GES) in the GW. The GES exchanges EDGE-9 signaling with an Edge Enablement Server (EES) in an Edge Data Network (EDN) and exchanges EDGE-3 signaling with a Gateway Application Server (GAS) in the GW. The GAS exchanges user data between the user app and an Edge Application Server (EAS) in the EDN responsive to the EDGE-3 signaling. The EES exchanges additional EDGE-3 signaling with the EAS. The EAS exchanges the user data between the GAS and a network core responsive to the additional EDGE-3 signaling. The core exchanges the user with the AS and transfers network information for the exchange to a Distributed Ledger (DL) node. The DL node determines trust based on the network information.