Patent classifications
H04W12/66
Emergency vehicle interactions using external triggers
The subject disclosure relates to technologies for vehicle interactions with emergency vehicles. A process of the disclosed technologies can include steps for receiving a command from an emergency vehicle identifying an autonomous vehicle and initiating actions to cause the autonomous vehicle identified by the emergency vehicle to obey the command.
Transmitting a complement of user parameters to a communications device
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
SYSTEMS AND METHODS FOR ENABLING FABRIC DEVICE COMMISSIONING OVER WIRELESS LOCAL AREA NETWORK
A device includes a processor. The processor may be configured to: commission a fabric device over a Bluetooth Low Energy (BLE) connection between the device and the fabric device; and send a code to a router on a wireless local area network (WLAN) to enable the router to commission the fabric device for a fabric on the WLAN.
Method and apparatus for guaranteeing trust of packet in distributed communication system
An operation method of a first communication node in a wireless distributed communication system may comprise: providing a group code and a primary secret key to a third communication node via a second communication node; receiving, from the third communication node, a first packet including a first group trust field through wireless distributed communication, the first group trust field being generated using the group code and the primary secret key; and performing a trustworthiness check of the received first packet by using the first group trust field included in the received first packet, the group code, and the primary secret key.
ACCESS SECURITY APPARATUS AND METHOD FOR WIRELESS TELECOMMUNICATIONS NETWORK
Various aspects of the present disclosure relate to performing security monitoring and trust evaluation of network and application functions and network slices, creating access control security policies based on trust data from the trust evaluation, and enforcing the access control security policies over service providers and consumers. The access control security policies may be updated and enforced on an ongoing basis.
PRIORITIZING NETWORK TRAFFIC FOR EMERGENCY SERVICES
A method, computer system, and computer program product are provided for prioritizing network traffic. An indication is received at a network controller that an alarm is activated at a physical site. A request is received from a user device to join a network at the physical site that is under control of the network controller, wherein the request includes a flag indicating an identity of a user of the user device and a priority status of the user. In response to authenticating the identity of the user via an identity provider server, the user device is authorized to join the network. Based on verifying the priority status of the user using the flag and authentication via the identity provider server, network traffic for the user device is prioritized.
VERIFYING USER PREMISES EQUIPMENT IDENTITY WITH DEPLOYED FIRMWARE AND EXPIRED AUTHENTICATION
An authentication request is received from a User Premises Equipment (UPE). The authentication request is responsive to expiration of a prior authentication certificate provided to the UPE. The authentication request comprises a set of metadata information elements. A subset of metadata information elements are selected from the set, comprising a static element descriptive of a UPE establishment event, and environmental elements indicative of a physical environment of the UPE. The static element is validated based on validation information. A trust score for the UPE is generated based on a comparison between the environmental elements and a UPE environmental profile descriptive of a known physical environment of a geographic area associated with the UPE. An authentication certificate is provided to the UPE based on the trust score being greater than a threshold trust score.
Device for wireless communication with other devices
A device arranged for wireless communication according to a communication protocol has a processor to execute a connection sequence according to a discovery protocol. The connection sequence includes determining a current cluster identity and a current discovery window timing used by the device. Next, at least one other device within wireless range is detected, while further determining a detected cluster identity and a detected discovery window timing of the detected other device. Then it is detected whether the detected device is operating in a different cluster than the device by comparing the current cluster identity with the detected cluster identity or comparing the current discovery window timing with the detected discovery window timing. Finally, upon detecting said different cluster, a security process is executed, which may warn the user or abort the connection sequence. Thereby, a malicious device trying to manipulate the connection sequence is detected.
Network slice access control method and apparatus
This application provides a network slice access control method, including: determining, by an access and mobility management function network element, first allowed network slice selection assistance information of a terminal device in a registration process to register the terminal device to a network; learning, by the access and mobility management function network element, of an authentication failure of a first network slice corresponding to first single network slice selection assistance information from the first allowed network slice selection assistance information.
Reputation-based trust determination method
A method for determining, onboard a first mobile entity, a level of trust for a second mobile entity in communication with the first mobile entity, and a communication system implementing the method are described. The method includes determining), by the first mobile entity, direct trust data, calculating an initial reputation indicator based on the direct trust data, including a belief value, a disbelief value, an uncertainty value, and a base trust rate, calculating a confidence level based on the belief value, the base trust rate, and the uncertainty value, and determining an updated reputation indicator based on the initial reputation indicator and the confidence level. The base trust rate is indicative of the trust level for data transmitted from an unknown mobile entity not in contact with the first mobile entity. The updated reputation indicator indicates a level of trust of the first mobile entity in the second mobile entity.