Patent classifications
H04W12/66
Conveyance of stir/shaken attestation levels using carrier code
The present disclosure describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed. Determining the attestation level comprises comparing information associated with the communication with stored information and assigning a code based on the comparison. The code may be translated to a tag value that is used to direct the communication to a signing server for attesting the communication at the determined attestation level.
TRUST MANAGEMENT IN DISTRIBUTED SYSTEMS
Methods and systems for managing trust in distributed are disclosed. To manage trust, a behavior and characteristic based trust model may be used. The trust model may utilize similarity between devices and public activity of devices over time to ascertain levels of trust that should be afforded devices of the distributed system. The levels of trust may be used to ascertain whether requests from devices of the distributed systems should be honored, or rejected. The trust models may facilitate establishment of trust in environments where physical intrusion based threats are present.
Monitoring wireless data consumption
Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a bearer, or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
CALCULATING A TRUST SCORE
Systems, devices, and methods are described herein for calculating a trust score. The trust score may be calculated between entities including, but not limited to, human users, groups of users, organizations, or businesses/corporations. A system trust score may be calculated for an entity by combining a variety of factors, including verification data, a network connectivity score, publicly available information, and/or ratings data. A peer trust score targeted from a first entity to a second entity may also be calculated based on the above factors. In some embodiments, the peer trust score may be derived from the system trust score for the target entity and may take into account additional factors, including social network connections, group/demographic info, and location data. Finally, a contextual trust score may be calculated between the first and second entities based on a type of transaction or activity to be performed between the two entities.
METHOD FOR ASSISTING A USER OF A TERMINAL IN DECIDING TO APPROVE A COMMUNICATION, OR NOT, CORRESPONDING DECISION-MAKING ASSIST SYSTEM AND COMPUTER PROGRAM
A decision-making assist method for a user of a first terminal receiving a communication request originating from a second terminal, the user of the second terminal being unknown to the user of the first terminal. The method includes determining a trust score of the user of the second terminal and a trust deviation, the trust deviation providing information on a reliability of the trust score. The trust score and the trust deviation are determined from a list including at least one user of a third terminal to which the second terminal has already transmitted a communication request, the at least one user of the third terminal belonging to at least one user community.
STEP-UP AUTHENTICATION FOR SINGLE SIGN-ON
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.
DIGITAL KEY CONTROL SYSTEM
A control system for use at a mobile device to control a digital key system of a vehicle, wherein the digital key system is implemented according to a predetermined vehicle digital key specification to enable one or more vehicle functions to be performed at the vehicle without using a physical key for the vehicle, and wherein the control system, when executed by a processor of the mobile device, is arranged to: communicate, in accordance with the predetermined vehicle digital key specification, with the digital key system via at least one short range communication protocol to cause performance of at least one of the one or more vehicle functions; and provide a secured software runtime environment at the mobile device for the control system to perform one or more secured operations, the one or more secured operations including the control system acting as a software root of trust, in accordance with the predetermined vehicle digital key specification, for performance of at least one of the one or more vehicle functions.
Methods for trust information in communication network and related communication equipment and communication device
A method performed by a network equipment of a communication network to dynamically provide trust information to a communication device registered or being registered to the communication network is provided. The method includes determining a trust information for each of one or more access networks. The trust information indicates whether each of the one or more access networks is trusted. The method further includes indicating to the communication device whether the one or more access networks is trusted for a current session or a later session. A method performed by a communication device registered or being registered with a communication network to dynamically receive trust information is also provided. The method includes receiving a message including a protected trust information list from a network equipment. The method further includes verifying the protection of the message. The method further includes storing the protected trust information list.
SAFE HANDLING OF TEXT MESSAGES
For a safe handling of text messages (MesT) received by a communication device (CD) owned by a user, an application server (AS) receives a request (Req) from the communication device (CD), the request containing an identifier (IdCD) of the communication device and presence data (DatP) indicating that the communication device is associated with a service entity (SE) via a wireless session, the service entity (SE) being a vehicle, receives a text message (MesT) having the user as recipient, and sends a message (MesC) to a network server (NS), the message (MesC) including at least a part of the content of the text message (MesT), the network server (NS) generating a voice message (MesV) from the content of the message (MesC) and providing the voice message (MesV) via an audio call to the communication device (CD).
Method for securing accesses to a network, system and associated device
A securing method in a computing or communication network, the method making it possible to isolate a station connected to a wireless communication device of the network and identified as not complying with the security requirements defined for the network. The isolation of the connected station is performed automatically by a connection to a quarantine zone of the network, excluded from a so-called trusted zone. The device identified as not complying with the security requirements can, for example, access a wide-area network, such as the internet, but cannot access a secure local network.