H04W12/66

Method and apparatus for verifying vehicle in inter-vehicular communication environment

An apparatus for verifying a vehicle in an inter-vehicular communication environment includes: a communication unit configured to receive a basic safety message and a verification message from a remote vehicle that is allowed to engage in inter-vehicular communication; and a controller configured to determine that the remote vehicle is reliable when the communication unit receives the verification message from the remote vehicle at least a predefined number of times over a predefined period of time, and to generate permission to utilize the basic safety message received from the remote vehicle when the controller determines that the remote vehicle is reliable.

EVALUATING TRUSTWORTHINESS OF DATA TRANSMITTED VIA UNENCRYPTED WIRELESS MOBILE COMMUNICATIONS
20190261171 · 2019-08-22 · ·

Systems and methods for making local decisions regarding the trustworthiness of V2V communications are provided. According to one embodiment, a vehicle information packet is received by a vehicle connectivity subsystem of a connected car and is indicative of an attribute of a source from which the packet was received. The source purportedly represents a neighboring vehicle in proximity to the connected car. A trustworthiness value for the packet is determined based on the source and coherence of the packet with local information maintained by the connected car. The trustworthiness value is indicative of a likelihood that the source represents a neighboring vehicle in proximity to the connected car from which communications are to be trusted. An action to be taken by the vehicle connectivity subsystem is determined with respect to the source or the packet based on the trustworthiness value. The determined action taken by the vehicle connectivity subsystem.

Spatial web of trust key initialization method for sensor platform array using directed close-field communication
11991528 · 2024-05-21 · ·

A method initializes a spatial web of trust for a sensor platform array by positioning multiple sensor groups within a restricted workspace, such that adjacent sensor platform pairs are formed from corresponding platforms of the groups within a close-field range. Sensor-specific identification keys are exchanged between respective adjacent sensor platforms, with the groups progressively repositioned to form unique adjacent sensor platform pairs within the close-field range. The method includes progressively exchanging the keys until each platform has exchanged a respective key with every other platform in the array, thereby initializing the spatial web of trust. A system for initializing the spatial web of trust for a UAV swarm includes the UAV swarm in communication with a base station over an encrypted communications link. Each UAV includes a CPU, a sensor suite, and memory on which is recorded instructions for the method.

System and method for resource access authentication

A method of providing continuous user authentication for resource access control includes launching a continuous authentication service at a boot time of a first device, wherein the first device includes a processor, a memory, and one or more sensors configured to collect authentication information. Additionally, the method includes receiving authentication information comprising one or more of explicit authentication information or implicit authentication information, and receiving a request for access to a resource of the first device. Further, the method includes the operations of determining, by the continuous authentication service, a current value of a security state, the current value of the security state based in part on a time interval between a receipt time of the authentication information and a current time and controlling access to the resource based on the current value of the security state.

A Method for Performing Resource Selection for Transmission, by a User Equipment, UE, in a Telecommunication Network, as well as the Corresponding UE and a Related Computer Program Product
20240155569 · 2024-05-09 ·

A method for performing resource determination for transmission, by a User Equipment, UE, in a telecommunication network, wherein said method comprises the steps of receiving, by said UE, from at least one UE in said telecommunication network, a resource coordination message in device-to-device, D2D, based transmissions, wherein said resource coordination message comprises a resource information to be taken into account by said UE when determining resources for transmission, determining, by said UE, a trustworthiness value for each of said at least one UE separately, wherein said trustworthiness value indicates a trustworthiness of a particular UE and determining resources for said transmission based on said resource information and said determined trustworthiness value for each of said at least one UE separately.

Network security system incorporating assessment of alternative mobile application market sites
10382476 · 2019-08-13 · ·

A processing device comprises a processor coupled to a memory and is configured to identify a plurality of mobile application market sites accessible over a network, and to extract features from each of the mobile application market sites. Health scores are computed for respective ones of the mobile application market sites based on the corresponding features extracted from those mobile application market sites. One or more proactive measures are initiated to prevent one or more mobile devices from downloading mobile applications from any of the mobile application market sites having computed health scores below a specified threshold. The mobile application market sites may be identified as respective alternative mobile application market sites relative to a known primary mobile application market site. The alternative mobile application market sites may comprise respective alternative mobile application stores. The processing device may be implemented in a computer network or an associated network security system.

Systems and methods for seamlessly connecting devices based on relationships between the users of the respective devices
10375432 · 2019-08-06 · ·

Systems and methods are described for seamlessly connecting devices based on relationships between the users of the respective devices. A media guidance application may determine that a first user has entered an environment (e.g., his/her mother's home) and may determine a frequency with which the first user enters the environment (e.g., daily). In response to determining that the first user visits frequently, the media guidance application may identify a second device in the environment (e.g., a smart TV) that a second user (e.g., the first user's mother) is authorized to grant access rights for. The media guidance application may determine a likelihood that the second user will grant the access rights for the second device to the first user, based on interaction data between the first user and the second user. In response to determining a high likelihood, the media guidance application may transmit the access rights.

DRONE CAPABLE OF AUTONOMOUSLY DETERMINING TRUSTWORTHINESS OF MESSAGES RECEIVED
20190238556 · 2019-08-01 ·

In some embodiments, apparatuses and methods are provided herein useful to autonomously determining trustworthiness of a message. In some embodiments, a drone capable of autonomously determining trustworthiness of messages comprises a drone body, a propulsion mechanism, a plurality of sensors, a wireless radio, and a control circuit, wherein the control circuit is configured to receive, from the wireless radio, a message, determine a source transmitting the message, determine content of the message, determine, based on the source transmitting the message, the content of the message, and the observational data, contextual information for the message, determine, based on the contextual information for the message, an expectation for the message, and one of: determine, based on the contextual information and the expectation, that the message is trustworthy, and determine, based on the contextual information and the expectation, that the message is not trustworthy.

Filtering the access of a connected object to a local area communication network
20240179534 · 2024-05-30 ·

A method for filtering access of a connected object to a local area communication network, implemented by a routing device of the local area network. The method includes: detecting a connected object waiting for pairing within the local network; assigning a confidence score to the connected object, based on information relating to the connected object; notifying a trusted device of the local area network of the request to pair the connected object and of the assigned confidence score; and upon receipt of a pairing refusal from the trusted device, blocking an access of the connected object to the local area network.

Method, Device and System for Utilizing Block Chain to Define Trusted Circle
20190208414 · 2019-07-04 ·

A method for utilizing a block chain infrastructure to define a trusted circle including at least two nodes of a plurality of nodes, the method includes receiving, by a first node, notification information identifying a trusted user circle including the first node and a second node, wherein the first node and the second node are configured to define a private block chain; and maintaining private block chain data within the trusted user circle according to pre-defined settings, wherein the private block chain data is divided between nodes of the trusted user circle based on the pre-defined settings.