H04W12/66

COMMUNICATION HANDLING IN A WIRELESS COMMUNICATIONS NETWORK

Systems, methods and computer program products for handling communications in a wireless network are described. A message requesting forwarding of communications for a first user device is received. A location of the first user device is determined. One or more second user devices associated with the first user device is identified. A second user device is selected to receive forwarded communications for the first user device. The selected second user device is located within a predefined distance of the location of the first user device. In example implementations, the one or more second user devices are trusted user devices.

STEREOTYPING FOR TRUST MANAGEMENT IN IOT SYSTEMS
20180367573 · 2018-12-20 ·

Methods, systems, and computer-readable storage media for a trust management system (TMS) in connected devices including a service provider device and a service consumer device, actions including receiving, by the TMS, side information associated with the service provider device, the side information including profile data and context data, processing, by the TMS, the side information using a computer-executable stereotype model to determine a prior trust value, determining, by the TMS, a trust value using a computer-executable experiential trust model, and at least partially based on the prior trust value, and selectively conducting a transaction between the service consumer device, and the service provider device based on the trust value.

ENHANCED MOBILE SUBSCRIBER PRIVACY IN TELECOMMUNICATIONS NETWORKS
20180367978 · 2018-12-20 ·

Techniques are disclosed for enhancing mobile subscriber privacy in telecommunications networks. In some embodiments, in the course of a registration process, a user device and an associated telecommunications network exchange trust indicators (TrIs), and respectively verify them. The user device and telecommunications network also transmit personally identifiable information (PII), such as an International Mobile Subscriber Identity (IMSI), in an encrypted form, and use a pseudo IMSI in place of the IMSI for the duration of the session.

PRIORITIZING NETWORK TRAFFIC FOR EMERGENCY SERVICES

A method, computer system, and computer program product are provided for prioritizing network traffic. An indication is received at a network controller that an alarm is activated at a physical site. A request is received from a user device to join a network at the physical site that is under control of the network controller, wherein the request includes a flag indicating an identity of a user of the user device and a priority status of the user. In response to authenticating the identity of the user via an identity provider server, the user device is authorized to join the network. Based on verifying the priority status of the user using the flag and authentication via the identity provider server, network traffic for the user device is prioritized.

Pathloss drop trusted agent misbehavior detection

V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.

Systems and methods for sensor trustworthiness

Systems, methods and products for determining the trustworthiness of anonymous sensors, including a sensor health check, a data ballpark check, a reputation comparison, and optional last resort procedures. The sensor health check examines sensor operating parameters to see if they fall within an envelope of expected values. If not, the sensor is unhealthy and is not trusted. The data ballpark check determines whether the sensor's traffic data falls within a predefined envelope of values. If the sensor is healthy and the traffic is within expected ranges, the sensor is trusted. If the traffic data is outside expected ranges, the reputation comparison, determines whether IP addresses, domains or other IOCs in the traffic data are found in the reputation list which may corroborate the traffic as trustworthy because it represents malicious or not-in-the-wild traffic. Last resort procedures may include applying safelists/blocklists, signature controls etc. to verify sensor/data trustworthiness.

Zero trust architecture for networks employing machine learning engines

A system for governing access to a network environment, including: at least one communication node communicatively coupled to a network infrastructure; a network assurance agent configured to monitor the at least one communication node, wherein the network assurance agent performs actions including: generating, in response to an access request for a network resource from the at least one communication node, an environmental model of the at least one communication node relative to the network environment, wherein the environmental model includes operational data of the at least one communication node or at least one other communication node in the network environment, calculating a risk score for the at least one communication node via a machine learning algorithm, based on the environmental model, and granting or denying the access request based on the risk score.

SOURCE VERIFICATION DEVICE

Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.

Trusted caller identification

A trusted caller ID authority receives registration data from a first communication device. The first communication device is authenticated by the trusted caller ID authority using the registration data and an authentication object is provided to the first communication device. A second communication device receives a call and the authentication object from the first communication device. The second communication device sends a validation request to the trusted caller ID authority that includes the authentication object. Validation information associated with the first communication device is provided to the second communication device. The validation information includes registration and authentication status of the first communication device.

Signal sharing between trusted groups of devices

Aspects of the technology described herein identify a trusted group of devices that collaborate to minimize device limitations (e.g., data use, bandwidth, battery life, and the like). Personal assistant services or cloud-based services utilize user data (e.g., web browsing, calendar entries, communication data, social networks, and the like) and device data (e.g., location data, Bluetooth beacons, Wi-Fi, and the like) provided by user devices to identify devices in the trusted group of devices. A handshake between the devices establishes a means of communication and a selected topology. A hub device is selected from the trusted group of devices to upload or download relevant data based on the selected topology. The hub device shares the relevant data with the member devices via the established means of communication.