H04W12/66

Secure channel formation using embedded subscriber information module (ESIM)

Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.

METHOD AND SYSTEM FOR INFLUENCING USER INTERACTIONS
20240129284 · 2024-04-18 · ·

The invention relates to a computer-implemented method of pre-processing a user access request to an online communications session. The method comprises of the steps of transferring (62) the user to a pre-communication session, communicating (64) an honesty primer (70, 80) to the user, the honesty primer (70, 80) includes at least a message and/or action and/or exercise and transferring (69) the user to the communication session. The method further comprises the steps of determining (61) a first integrity indicator (?1) of a user sending an access request to a communication server before transferring the user to the pre-communication session, especially based on metadata of the access request and in particular selecting (63) and/or adapting an honesty primer (70, 80) based on the first integrity indicator (?1), and in particular determining a second integrity indicator (?2) based on adjustment parameters (?(?)) of the honesty primer (70 80). In particular, the first integrity indicator (?1) is determined based on reliability parameters of the metadata, which include at least one of geolocation, browser language, time, interaction with previous pre-communication and/or communication sessions, integrity indicators (?) of previous pre-communication sessions and/or communication sessions. Additionally or alternatively to the step of determining a first integrity indicator, the method comprises the steps of analyzing (66) user interaction with the pre-communication session, especially with the honesty primer (70,80), in particular analyzing response behavior parameters of the user in the pre-communication session and/or adjustment parameters (?(?)) of the honesty primers (70,80) and/or user response content and determining (67) a third (?3) integrity indicator based on the analysis.

ENROLLING BIOMETRICS WITH MUTUAL TRUST THROUGH 3RD PARTY
20240129128 · 2024-04-18 · ·

The present disclosure relates to a method of an access point of enrolling biometric data of an individual and an access point performing the method. In an aspect, a method of an access point is provided of enrolling biometric data of an individual. The method comprises establishing a trusted communication channel with a user device of the individual, the trust being ensured by a trusted 3rd party and capturing the biometric data of the individual, wherein the biometric data is enrolled with the access point.

Intelligent attestation of traffic using a routing engine

The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.

System and Process for Locking a Subscriber Identity Module (SIM) Card to a Wireless Device
20190335325 · 2019-10-31 ·

The disclosure is directed to a device configured to implement a SIM lock to control network access associated with a wireless device. The device including a processor configured to interrogate a host wireless device and obtain a host wireless device identification from the host wireless device. The processor further configured to retrieve from a memory a stored wireless device identification, determine if a host wireless device identification matches the stored wireless device identification, prevent access of the host wireless device to network wireless services if the host wireless device identification does not match the stored wireless device identification, and enable access of the host wireless device to network wireless services if the host wireless device identification matches the stored wireless device identification. An associated process is also disclosed.

METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
20190312738 · 2019-10-10 ·

A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.

WIRELESS COMMUNICATION SERVICE OVER AN EDGE DATA NETWORK (EDN) BETWEEN A USER EQUIPMENT (UE) AND AN APPLICATION SERVER (AS)
20240147578 · 2024-05-02 ·

A data communication network connects a user application in a wireless User Equipment (UE) to a user application server. An edge application server exchanges user data between the user application in a wireless UE and a wireless network slice. The wireless network slice exchanges the user data between the edge application server and the user application server. The data communication network determines a trust level for the exchange of the user data between the user application in the wireless UE and the user application server. In some examples, a distributed ledger in the data communication network determines the trust level for the exchange of the user data between the user application in the wireless UE and the user application server.

INFORMATION PROVISION APPARATUS AND METHOD OF CONTROLLING THE SAME
20190289435 · 2019-09-19 ·

An information provision apparatus comprises: a processor; and a memory storing instructions which, when executed by the processor, cause the information provision apparatus to function as: an identification unit configured to identify a relatedness of a plurality of people; an information provision unit configured to, in order to cause information to be perceivably outputted from an output unit to the people, provide predetermined information to the output unit; and a selection unit configured to, based on the relatedness of the plurality of people, select the predetermined information.

Network Access Method And Device
20190281464 · 2019-09-12 ·

This application discloses a network access method and device. The method includes: receiving, by a first management entity, a first request message sent by a first terminal, where the first request message includes at least a first identifier of a second terminal; determining, by the first management entity based on a first condition, whether the second terminal can access a network by using the first terminal, where the first condition includes at least that the first identifier of the second terminal belongs to a list of at least one terminal having a trust relationship with the first terminal, and the list includes at least a first identifier of the at least one terminal having the trust relationship with the first terminal; and when the first condition is satisfied, sending, by the first management entity, a second message to the second terminal, where the second message is used to indicate that the second terminal can access the network by using the first terminal. Legality of access by a wearable device to a network by using a user terminal can be authenticated by using the method and device in this application.

DETECTING UNAUTHORIZED ACCESS TO A WIRELESS NETWORK
20190281461 · 2019-09-12 ·

Systems and methods detect a potential hacking attack by monitoring the number and timing of DELBA (Delete Block Acknowledgement) action frames. When the number and timing of the DELBA action frames correspond to an unauthorized access pattern, an unauthorized access is detected. The potential unauthorized access may be detected by an access point (AP) or by the AP and a backend system. When a potential unauthorized access is detected, the AP may remain in silent mode for a longer period of time and limit access to the network to only trusted devices. In addition, an alarm or other notification of the potential unauthorized access may be provided to a user or other designated contact.