H04W12/66

Data communication system to selectively and securely couple distributed ledgers with artificial intelligence (AI) engines

A wireless communication system generates Artificial Intelligence (AI) responses to network data. Computer circuitry hosts network functions, distributed ledgers, ledger clients, and AI engines. The network functions serve User Equipment (UEs) over Radio Access Networks (RANs), and in response, transfer the network data to the distributed ledgers. The distributed ledgers receive and store the network data. The ledger clients select some of the network data from the distributed ledgers and transfer the selected network data to the AI engines. The AI engines receive the selected network data, and in response, generate the AI responses. The ledger clients and the AI engines may comprise wireless network slices.

Multi-modal approach to a secure and closed solution for providing scheduled notifications
12120514 · 2024-10-15 · ·

A multi-modal portal system provides an authorization prior to establishing a visual interface connection between a support user or caller and a client user or receiving party. Once the caller is authorized, the caller is permitted to drop-in such that a visual interface connection is established with the receiving party. The authorization can be based on a profile configuration that indicates whether the caller has the credentials required for the visual interface. The authorization can require that a notification be sent to a trusted user or primary contact or the caller can be associated with a profile configuration that allows for a pre-authorization without requiring the notification. Also, security is enhanced by validating network devices and providing resiliency in data paths between network devices and data aggregators.

Methods and systems at a portable gateway of sending and receiving internet protocol (IP) data packets through a wireless gateway

The present invention discloses methods and systems of connecting a wide area network (WAN) to a portable gateway through at least one gateway. The portable gateway generates a web page where the web page comprises input fields that allow configuration of one or more WAN interfaces. The portable gateway stores the web page. The portable gateway receives one or more Internet Protocol (IP) data packets from at least one device. The IP data packets are not capable of being forwarded. The portable gateway sends the web page to the at least one device. The portable gateway receives information through the web page from the at least one device. The information is to configure at least one WAN interface and to connect to at least one gateway.

COMMUNICATION METHODS AND DEVICES IN INTELLIGENT TRANSPORT SYSTEMS
20240357012 · 2024-10-24 ·

According to some embodiments, there is provided a Collective Perception Message, CPM, characterizing a plurality of Vulnerable Road Users based on a plurality of received VAMs, thereby allowing an ITS station to efficiently aggregate VAM messages from VRUs and retransmit information about the VRUs to other ITS stations. Consequently, the security is improved as some ITS stations may not be able to detect or identify VRU stations by themselves but thanks to the CPM, these stations can still be informed of the VRUs. According to other aspects, congestion is avoided while maintaining safety vis--vis VRUs thanks to the use of a different transmission scheme when the VRU is already characterized in a CPM sent to the ITS stations. Also, a receiving station can evaluate whether the content of a CPM can be trusted or not. Safety is thus improved. This is achieved thanks to the CPM that references a certificate.

Utilizing trust tokens to conduct secure message exchanges
12126648 · 2024-10-22 · ·

Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.

NETWORK CYBER SECURITY PLATFORM

A security platform of a data network is provided that includes security services for computing devices in communication with the data network. The security platform may apply a security policy to the computing devices when accessing the Internet via a home network (or other customer network) and when accessing the Internet via a public or third party network. To provide security services to computing devices via the home network, the security platform may communicate with a security agent application executed on the router (or other gateway device) of the home network. In addition, each of the devices identified by the security profile for the home network may be instructed or otherwise be provided a security agent application for execution on the computing devices. The security agent application may communicate with the security platform when the computing device connects to the Internet over a third party or public access point.

SELECTIVE NETWORK ACCESS BASED ON TRUST LEVEL

This disclosure describes techniques for enabling selective connections between user devices and trusted network devices. An example method includes receiving a beacon from a network device. The beacon includes a trust level of the network device. The method further includes determining that the trust level of the network device satisfies a predetermined trust criterion. Based on determining that the trust level of the network device satisfies the predetermined trust criterion, the method includes transmitting a connection request to the network device. Further, user data is received from the network device.

METHOD AND SYSTEM FOR ESTABLISHING A SECURE ACCESS CONNECTION WITH ELECTRONIC DEVICES
20180191717 · 2018-07-05 ·

A technique is provided for establishing a secure access connection with electronic devices. The technique includes receiving a request for establishing the secure access connection, from an electronic device, via an access point associated with the electronic device. The technique further includes dynamically determining at least a local reputation score associated the access point, based on at least a plurality of parameters and pre-defined weights assigned to each of the plurality of parameters. The technique further includes establishing the secure access connection between the host device and the electronic device, via the access point, based on a comparison of an updated global reputation score with a pre-defined threshold. The global reputation score is updated based on the dynamically determined local reputation score.

WIRELESS NETWORK AUTHORIZATION USING A TRUSTED AUTHENTICATOR

A method of granting access to a wireless network is provided allowing approval by a trusted authenticator. The method includes receiving a request to join a wireless network at a gateway from a client device, determining with the gateway whether the client device is within a predefined trusted zone, sending a notification of a potential new connection with the client device from the gateway to the trusted authenticator. The trusted authenticator then provides a response regarding the potential new connection, wherein the gateway denies network access to the client device when the gateway determines that the client device is outside the trusted zone or when the response from the trusted authenticator rejects the potential new connection, and wherein the gateway grants network access to the client device when the gateway determines that the client device is inside the trusted zone and when the response from the trusted authenticator approves the potential new connection.

Safe handling of text messages

For a safe handling of text messages (MesT) received by a communication device (CD) owned by a user, an application server (AS) receives a request (Req) from the communication device (CD), the request containing an identifier (IdCD) of the communication device and presence data (DatP) indicating that the communication device is associated with a service entity (SE) via a wireless session, the service entity (SE) being a vehicle, receives a text message (MesT) having the user as recipient, and sends a message (MesC) to a network server (NS), the message (MesC) including at least a part of the content of the text message (MesT), the network server (NS) generating a voice message (MesV) from the content of the message (MesC) and providing the voice message (MesV) via an audio call to the communication device (CD).