Patent classifications
H04W12/66
Monitoring Wireless Data Consumption
Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a bearer, or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
Intelligent attestation of traffic using a routing engine
The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.
Source data secured on blockchains
Technologies are shown for secure management of evaluation data. An evaluation value is received from a source entity. The evaluation value relates to an evaluation entity. Trusted source data secured in one or more data blocks on a first blockchain is searched for an entry corresponding to the source entity. Based on finding the entry corresponding to the source entity in the trusted source data, an evaluation score for the evaluation entity is obtained from the first blockchain or a second blockchain. The evaluation score was previously calculated based on one or more previous evaluation values for the evaluation entity and stored on the first blockchain or the second blockchain. A new evaluation score for the evaluation entity is calculated using the evaluation score and the evaluation value. The new evaluation score for the evaluation entity is securely committed to a new data block on the first blockchain or the second blockchain.
Visual voicemail centralized authentication system for wireless networks
A method for authenticating a network entity to access restricted information. The method includes receiving a request to generate a visual voicemail message based on an analysis of network entity profile data and contextual information relating to the network entity. The method includes generating the visual voicemail message based on the network entity profile data and the contextual information, sending the visual voicemail message to the network entity and requesting authentication information included with the visual voicemail message. In response to receiving the requested authentication information, the network entity is authenticated to access to the restricted information.
MULTI-FACTOR AUTONOMOUS SIM LOCK
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
CALL METHOD, ELECTRONIC DEVICE, NETWORK DEVICE, AND SYSTEM
Embodiments of this application provide a call method, an electronic device, a network device, and a system. The system includes a first electronic device and a second electronic device. A first connection is set up between the first electronic device and the second electronic device, the first electronic device is configured with a subscriber identity module (SIM) card having a first number, and the second electronic device is configured with a SIM card having a second number. The second electronic device disables a cellular communication function. The first electronic device receives a first message, where the first message indicates a first incoming call. According to embodiments of this application, missing of an incoming call can be avoided, power can be saved, and the second electronic device does not need to support a multi-terminal with one number service.
Adaptive multi-agent cooperative computation and inference
In a first device, a local classification and a local classification confidence score corresponding to an event input are computed. At the first device in response to a broadcast request, a remote classification and a remote classification confidence score corresponding to the event input are received, the remote classification and the remote classification confidence score being computed at a second device. At the first device, a consensus classification including the most frequent classification from a set of all received remote classifications and the local classification is formed, provided the number of classifications including the most frequent classification exceeds a threshold. In response to a consensus classification confidence score corresponding to the consensus classification exceeding a confidence threshold, a local classification model is updated. Based on the local classification and the consensus classification, the event input is assigned to a classification.
DATA COMMUNICATION SYSTEM TO SELECTIVELY AND SECURELY COUPLE DISTRIBUTED LEDGERS WITH ARTIFICIAL INTELLIGENCE (AI) ENGINES
A wireless communication network wirelessly receives a slice indicator from a wireless communication device. The wireless communication network selects an Artificial Intelligence (AI) engine based on the slice indicator. The wireless communication network may select the AI engine by selecting a wireless network slice that comprises the AI engine based on the slice indicator. The wireless communication network wirelessly receives user data from the wireless communication device for the wireless network slice. The wireless communication network transfers the user data to the selected AI engine. The selected AI engine generates an AI output based on the user data.
TRUST POLICIES FOR A DATA PROVISIONING LAYER
Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.
NETWORK ARCHITECTURES UTILIZING CELLULAR NETWORK HOSTED ACCESS CONTROLLING SCHEMAS TO FACILITATE INTERNET ACTIVITIES, AND METHODS FOR USE THEREOF
In some embodiments, the present disclosure is directed to an exemplary process including: displaying, by a processor of a computing device, an access controller interface element and an access code on a screen of the computing device; where the access controller interface element is: communicatively coupled to a cellular network hosted access controlling schema and operationally linked to an access-restricted digital resource; transmitting, by the processor of the computing device, in response to the at least one activity, an access request having data that includes: the access code and an identity linked to the computing device; where at least one part of the data is configured to be accepted by the cellular network hosted access controlling schema; accessing, by the processor of the computing device, the access-restricted digital resource after the at least one part of the data has been accepted by the cellular network hosted access controlling schema.