Patent classifications
H04W12/66
METHOD FOR ENABLING AN EMERGENCY CALLER TO SELECTIVELY ACCESS INFORMATION ABOUT INCIDENT-RESPONSE RESOURCES
A process for enabling an emergency caller to selectively access information about incident-response resources. In operation, a public-safety answering point receives an emergency communication from a caller device associated with the emergency caller. The answering point obtains incident information relating to occurrence of an incident from the emergency communication and assigns one or more incident-response resources for responding to the incident. The answering point then verifies authenticity of the emergency caller and enables the emergency caller to selectively access information indicating a current status of the one or more of the incident-response resources as a function of verifying the authenticity of the emergency caller.
NETWORK CYBER-SECURITY PLATFORM
A security platform of a data network is provided that includes security services for computing devices in communication with the data network. The security platform may apply a security policy to the computing devices when accessing the Internet via a home network (or other customer network) and when accessing the Internet via a public or third party network. To provide security services to computing devices via the home network, the security platform may communicate with a security agent application executed on the router (or other gateway device) of the home network. In addition, each of the devices identified by the security profile for the home network may be instructed or otherwise be provided a security agent application for execution on the computing devices. The security agent application may communicate with the security platform when the computing device connects to the Internet over a third party or public access point.
Optimized security mode command procedure to reduce communication setup failures
Systems, devices, and techniques described herein relate to use of an optimized security mode command (SMC) procedure for securing communications. When connecting to a different cellular network (e.g., from a 5.sup.th generation (5G) Radio Access Network (RAN)) to a different cellular network (e.g., a 4.sup.th generation (4G) RAN), a User Equipment (UE) performs the SMC procedure without processing subsequent commands until a period of time has elapsed. Instead of allowing the UE to process subsequent commands received close in time to receiving the SMC, the subsequent commands may be delayed/suspended so that the UE has time to perform the SMC procedure and establish secure communications with the 4G LTE network. According to some examples, the delay is set to a period of time (e.g., 1 ms, 10 ms, or some other value) such that the subsequent command does not interfere with performing the SMC procedure.
METHOD AND DEVICE FOR PROCESSING INFORMATION, COMMUNICATION DEVICE, AND STORAGE MEDIUM
A method and device for processing information, a communication device, and a storage medium are provided. The method, performed by a first network element, includes: obtaining trusted location information of a user equipment (UE); and sending the trusted location information to a second network element or the UE.
Multi-link wireless communications connections
A method includes receiving, from a receiver, a broadcast probe request with a multi-link designator, determining that the receiver is multi-link capable based on the probe request, transmitting a probe response including a first multi-link upper Media Access Control (MAC) entity identity of a transmitter, receiving an authentication trigger from the receiver, and transmitting an authentication response to the receiver.
Calculating a trust score
Systems, devices, and methods are described herein for calculating a trust score. The trust score may be calculated between entities including, but not limited to, human users, groups of users, organizations, or businesses/corporations. A system trust score may be calculated for an entity by combining a variety of factors, including verification data, a network connectivity score, publicly available information, and/or ratings data. A peer trust score targeted from a first entity to a second entity may also be calculated based on the above factors. In some embodiments, the peer trust score may be derived from the system trust score for the target entity and may take into account additional factors, including social network connections, group/demographic info, and location data. Finally, a contextual trust score may be calculated between the first and second entities based on a type of transaction or activity to be performed between the two entities.
Systems and methods for dynamic communication channel switching for secure message propagation
Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.
SENSOR
A sensor for a vehicle, such as a commercial vehicle. The sensor includes a housing, a measurement interface configured to capture a measurement variable of the vehicle for generating a raw measurement data describing the measurement variable. The sensor includes a processing device which is configured to process the raw measurement data to generate a measurement data; a data interface in communication with the processing device and configured to exchange data between the sensor and other components; and a storage section configured to store at least one cryptographic key, wherein the processing device is configured to use the at least one cryptographic key to encrypt and/or decrypt and/or validate data sent or received via the data interface.
COMMUNICATION METHOD AND ELECTRONIC DEVICE
Example communication methods and apparatus are described. One example method includes determining, by a first electronic device when communicating with a second electronic device through a first application installed on the first electronic device, whether the second electronic device is authenticated by the first electronic device. If the second electronic device is not authenticated by the first electronic device, the first electronic device authenticates the second electronic device in a first authentication manner. If the second electronic device has been authenticated by the first electronic device, the first electronic device authenticates the second electronic device in a second authentication manner.
Method for guaranteeing reliability of packet and apparatus using the same in synchronous wireless distributed communication system
Disclosed herein are a method for ensuring trustworthiness of a packet in a distributed synchronous wireless communication system and an apparatus using the method. The method, performed by terminals and an apparatus for checking the trustworthiness of a packet, includes: transmitting, by a first terminal, a packet including a trust field to a second terminal using distributed wireless communication; receiving, by a third terminal, the packet from the first terminal; requesting, by the third terminal, checking of trustworthiness by delivering the packet and information about the packet reception time to the apparatus; checking, by the apparatus, the trustworthiness of the packet using the trust field and the information about the packet reception time; generating, by the apparatus, a trust result notification packet when the result of checking the trustworthiness indicates that the packet is untrusted; and transmitting, by the apparatus, the trust result notification packet to the second terminal.