H04W12/66

Transaction authentication, authorization, and/or auditing utilizing subscriber-specific behaviors

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.

MOBILE ELECTRONIC DEVICE, SYSTEM FOR USING MOBILE ELECTRONIC DEVICE AND METHOD THEREOF
20240236689 · 2024-07-11 ·

A system for using the mobile electronic device includes an external device, a communication device, and the mobile electronic device. The mobile electronic device includes a positioning module, a wireless communication module, and a processor. The positioning module is configured to generate a positioning signal. The wireless communication module detects the communication device and obtains a wireless network name to be confirmed. The processor confirms whether the positioning signal is located within a positioning coordinate range to generate a position confirmation result, and confirms whether the wireless network name to be confirmed is a trusted SSID to generate a network confirmation result. When the position confirmation result is yes and the network confirmation result is yes, a stored data of the mobile electronic device is sent to the external device through the communication device.

CERTIFICATE ENROLLMENT FOR SHARED NETWORK ELEMENT

A method of providing secure connections between a shared network node and a plurality of network nodes of different mobile network operators (MNOs) is provided. The method includes: receiving, by a first network node of a first MNO among the different MNOs, a digital certificate issued to the first network node from a public key infrastructure (PKI) service provider, the PKI service provider having a trust relationship with the different MNOs; establishing, by the first network node, a secure connection with a second network node of the first MNO using the issued digital certificate and based on the trust relationship; and establishing, by the first network node, a secure connection with a third network node of a second MNO, among the different MNOs, using the issued digital certificate and based on the trust relationship.

Systems and methods for dynamic communication channel switching for secure message propagation

Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.

Adverse user behavior detection and mitigation

Aspects of the present disclosure relate to adverse user behavior detection and mitigation. In examples, a user account of a social platform may be trusted or untrusted. If the user account is untrusted, activity of the user account may be buffered so as to not directly affect social metrics of the social platform. For example, if the untrusted user account follows a target user account, the untrusted user account may be added to a separate set of followers or otherwise separated from a set of trusted followers of the target user account. Eventually, each user account in the separate set is evaluated to determine whether the user account has transitioned to a trusted user. If the user account is now trusted, it may be migrated to the set of trusted followers. However, if the user account is untrusted, it may be removed from the separate set, thereby reverting the activity.

METHOD AND DEVICE FOR REQUESTING REMOTE SERVICE
20190082019 · 2019-03-14 ·

The present application provides a method, device, and system for requesting remote services. The method includes determining, by one or more processors, a special request frame, the special request frame comprising an extensible field, the extensible field comprising remote service request information, and the special request frame being a frame for terminal-access point mutual discovery according to a communication protocol for communication between a terminal and an access point, communicating the special request frame to an access point, and obtaining, by the one or more processors, information pertaining to a remote service provided by a service, the information pertaining to the remote service being based at least in part on the remote service request information.

Method and system for authenticating a user using a mobile device having plural sensors

A method, system, and computer readable program code are disclosed for authenticating a user having a mobile device with plural sensors. The method includes recognizing a situation of the mobile device or the user; determining if the situation of the mobile device or the user is a predetermined situation; when the situation is the predetermined situation: determining a first action as an authentication action; determining a single sensor or a first combination of sensors among the plural sensors; and executing a first authentication for the user by using the single sensor or the first combination of sensors; and when the situation is not the predetermined situation: determining a second action as the authentication action; determining a second combination of sensors among the plural sensors; and executing a second authentication for the user by using the second combination of sensors.

Method for Enabling and/or Requesting Access by a First Network Subscriber to a Second Network Subscriber in a Network

A method for enabling access by a first network subscriber to a second network subscriber in a network includes receiving a communication request from the first network subscriber and determining whether the second network subscriber has carried out an authentication of the first network subscriber during a first phase. The second network subscriber allows communication with the first network subscriber when the second network subscriber has carried out authentication of the first network subscriber during the first phase. The second network subscriber receives an access request from the first network subscriber and determines a level of trustworthiness of the first network subscriber. The second network subscriber enables access of the first network subscriber based on the determination of the level of trustworthiness of the first network subscriber.

UTILIZING TRUST TOKENS TO CONDUCT SECURE MESSAGE EXCHANGES
20190068636 · 2019-02-28 ·

Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.

IDENTITY MANAGEMENT VIA A CENTRALIZED IDENTITY MANAGEMENT SERVER DEVICE
20190044940 · 2019-02-07 ·

A device can establish an identity for an individual by communicating with a first set of devices. The first set of devices can include a user device, a first server device associated with a certificate authority, or a second server device associated with an identity provider. The device can authenticate the identity of the individual by communicating with a second set of devices. The second set of devices can include the user device, or a third server device associated with a first service provider. The device can authorize the identity of the individual to be used by one or more service providers by communicating with a third set of devices. The third set of devices can include the user device, the third server device, or a fourth server device associated with a second service provider.