Patent classifications
H04W12/66
TRUST MANAGEMENT MECHANISMS
Systems, methods, and computer-readable media are provided for managing mutual and transitive trust relationships between resources, such as Fog/Edge nodes, autonomous devices (e.g., IoT devices), and/or analog/biological resources to provide collaborative, trusted communication over a network for service delivery. Disclosed embodiments include a subject resource configured to assign an observed resource to a trust zone based on situational and contextual information. The situational information may indicate a vector of the observed resource with respect to the subject resource. The contextual information may be based in part on whether a relationship exists between the subject resource and the observed resource. The subject resource is configured to determine a trust level of the observed resource based on the determined trust zone. Other embodiments are disclosed and/or claimed.
Enhanced secure authentication
A method for authenticating a user of a mobile electronic computing device to perform operations on a first electronic computing device includes receiving a request to access the first electronic computing device. In response to the request to access, a first identifier is sent to the mobile electronic computing device. A second identifier is received from a second electronic computing device. The second electronic computing device is different from the mobile electronic computing device. A determination is made as to whether the first identifier matches the second identifier. When the first identifier matches the second identifier, a trust score is calculated for the user. A determination is made as to whether the trust score is equal to or greater than a threshold. When the trust score is equal to or greater than the threshold, the user is authenticated to login to the first electronic computing device.
METHOD AND APPARATUS FOR OPTIMIZING MOBILE EDGE COMPUTING FOR NOMADIC COMPUTING CAPABILITIES AS A SERVICE
A system and method for operating an edge compute advisory system comprising a network adapter to receive a compute work request from a client device seeking edge computing resources of a mobile edge computing system, wherein the compute work request includes processing resource requirements to meet the compute work request. A processor to determine a plurality of mobile edge computing systems within a neighborhood range of an estimated client device location, and the network adapter to receive advertisement messages indicating availability of the plurality of mobile edge computing systems and including an address location for secured historical compute trust references for each advertising mobile edge computing system. The processor executing machine readable executable code instructions of the edge compute advisory system to access and receive the historical trust references for a plurality of candidate mobile edge computing resources accessible to the client device location, and determine an optimal candidate mobile edge computing resources partner from among the plurality of candidate mobile edge computing systems based on a minimal level of trust category or rating for the mobile edge computing system.
Managing Access Based on Activities of Entities
Concepts and technologies are disclosed herein for managing access based on activities of entities. A computing device can collect data that comprises an image. The computing device can identify an entity that is located in a range of a sensor. The computing device can determine an identity that is associated with the entity and an activity associated with the entity. The computing device can obtain a trust indicator associated with the entity. The computing device can determine, based on the trust indicator, if the activity should be allowed. If the computing device determines that the activity should be allowed, the computing device can initiate allowing of the activity. If the computing device determines that the activity should not be allowed, the computing device can initiate blocking of the activity.
METHODS FOR AUTOMATED SOCIAL PHISHING
A computer-implemented method includes scanning, by one or more processors, data that is maintained on one or more social networks, analyzing the scanned data using one or more machine learning techniques, generating custom content associated with a target social entity, initiating interaction with the target social entity, where initiating interaction with the target social entity includes, posting, by the one or more processors, a form of the generated custom content associated with the target social entity to one or more of the target social entity's social networks.
Systems and methods for disseminating location-based reputations for link-layer wireless attacks
The disclosed computer-implemented method for disseminating location-based reputations for link-layer wireless attacks may include (i) receiving, at a server from a first wireless client, a wireless-attack report for a location that includes (a) information that indicates that the first wireless client detected a link-layer wireless attack (e.g., a wireless-access-point spoofing attack or a deauthentication attack) at the location or (b) information that indicates that the first wireless client did not detect any link-layer wireless attacks at the location, (ii) using, at the server, the wireless-attack report to generate a reputation for link-layer wireless attacks for the location, (iii) receiving, at the server from a second wireless client, a request for the reputation of the location, and (iv) responding to the request with the reputation of the location. Various other methods, systems, and computer-readable media are also disclosed.
Step-up authentication for single sign-on
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.
FLEXIBLE SECURITY CHANNEL ESTABLISHMENT IN D2D COMMUNICATIONS
A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.
COMMUNICATION HANDLING IN A WIRELESS COMMUNICATIONS NETWORK
Systems, methods and computer program products for handling communications in a wireless network are described. A message requesting forwarding of communications for a first user device is received. A location of the first user device is determined. One or more second user devices associated with the first user device is identified. A second user device is selected to receive forwarded communications for the first user device. The selected second user device is located within a predefined distance of the location of the first user device. In example implementations, the one or more second user devices are trusted user devices.
COMMUNICATION HANDLING IN A WIRELESS COMMUNICATIONS NETWORK
Handling communications in a wireless network is described. A message requesting forwarding of communications for a first user device is received. A location of the first user device is determined. One or more second user devices associated with the first user device is identified. A second user device is selected to receive forwarded communications for the first user device. The selected second user device is located within a predefined distance of the location of the first user device. In example implementations, the one or more second user devices are trusted user devices.