Patent classifications
H04W12/66
MULTI-LINK WIRELESS COMMUNICATIONS CONNECTIONS
A method includes receiving, from a receiver, a broadcast probe request with a multi-link designator, determining that the receiver is multi-link capable based on the probe request, transmitting a probe response including a first multi-link upper Media Access Control (MAC) entity identity of a transmitter, receiving an authentication trigger from the receiver, and transmitting an authentication response to the receiver.
METHODS FOR USER-AWARE TRUSTWORTHY INDIRECT SERVICE INTERACTION IN WIRELESS NETWORKS
A trust-index-aware service communication proxy (TIASCP) may be configured to receive, from a function entity service consumer (FESC), a first service operation request message that comprises a service operation request, send, to a trust management function (TMF), a FESC trust index retrieval request message, and receive, from the TMF, a FESC trust index retrieval response message that comprises a trust index of the FESC. The TIASCP may be configured to select a function entity service provider (FESP) based on the trust index of the FESC and to authenticate the service operation request based on the trust index of the FESC. The TIASCP may be configured to send, to the TMF, a FESP trust index retrieval request message and receive, from the TMF, a FESP trust index retrieval response message that includes a trust index of the FESP and authenticate the FESP based on the trust index of the FESP.
Methods for Trust Index Aware Repository Functions and Systems Thereof
Various embodiments provide one or more methods for trust index aware repository functions (TIARFs) and systems thereof. A TIARF may reside in a core network (CN), an edge network, a radio access network, a local network, an enhanced network repository function in the CN, a wireless transmit/receive unit, a service enabler server, an edge application server, an application function, and/or a server in a data network. The TIARF provides mutual trust between one or more function entity service consumers (FESCs) and function entity service producer (FESPs). The TIARF utilizes one or more trust indexes associated with the one or more FESCs and/or FESPs, and matches the one or more FESPs and FESCs based on the one or more trust indexes. The TIARF utilizes a trust management function to determine the one or more trust indexes, and stores one or more FESP profiles associated with one or more registered FESPs.
METHODS AND APPARATUS FOR USER-AWARE TRUSTWORTHY SUBSCRIPTION-BASED SERVICE INTERACTION IN WIRELESS NETWORKS
A function entity service producer (FESP) hosts a service function and receives a subscription request message from a function entity service consumer (FESC) including an indication of requested services and an indication of a condition that the service function is to apply when determining whether to send a service notification pursuant to the subscription. The FESP receives the FESC's a trust index from a trust management function (TMF). The trust index is at least one of a trust index of the FESC or of a user of the FESC The FESP determines to authenticate the subscription request if the trust index is greater than a threshold. The FESP receives an updated trust index of the FESC from the TMF when the condition is met and sends the service notification to the FESC when the updated trust index of the FESC is greater than the threshold.
Certificate enrollment for shared network element
A method of providing secure connections between a shared network node and a plurality of network nodes of different mobile network operators (MNOs) is provided. The method includes: receiving, by a first network node of a first MNO among the different MNOs, a digital certificate issued to the first network node from a public key infrastructure (PKI) service provider, the PKI service provider having a trust relationship with the different MNOs; establishing, by the first network node, a secure connection with a second network node of the first MNO using the issued digital certificate and based on the trust relationship; and establishing, by the first network node, a secure connection with a third network node of a second MNO, among the different MNOs, using the issued digital certificate and based on the trust relationship.
Classification including correlation
Systems, methods, and related technologies for classification are described. Network traffic from a network may be accessed. One or more values associated with one or more properties associated with an entity may be determined. The one or more values may be determined from the network traffic. A first classification attribute is determined based on the one or more values associated with one or more properties associated with the entity. A second classification attribute is determined, by a processing device, based on the first classification attribute and the one or more values associated with one or more properties associated with the entity. The second classification attribute is stored.
METHOD, DEVICE, AND SYSTEM FOR CONTROLLING ACCESS TO SWITCH PORTS IN COMMUNICATION NETWORKS
A method, device, and system for controlling access to switch ports in communication networks is disclosed. The method may include receiving an authentication request associated with an end-device requesting access to a switch port of a switch within a communication network; comparing at least one device attribute associated with the end-device with an access policy associated with an access policy associated with the switch port; transmitting an authentication instruction associated with the end-device and the switch port to the switch based on a result of comparing. The authentication instruction comprises one of allowing the end-device access to the switch port based on the access policy and denying the end-device access to the switch port based on the access policy.
Secure and trusted conveyance from user computing device to merchant computing entity
A method includes obtaining, by a user computing device, a one-time use code from a merchant computing entity to initiate a data conveyance. The method further includes sending, by the user computing device, the one-time use code and a request to initiate the data conveyance. The method further includes translating, by the secure data conveyance device, the amount of the cryptocurrency to a substantially equivalent amount of the desired currency. The method further includes generating, by the trusted SVA device, an SVA representative of the substantially equivalent amount of the desired currency. The method further includes sending, by the secure data conveyance device, the one-time use code, the SVA, a merchant computing entity identifier (ID) associated with the merchant computing entity, and an expiration time frame to use the SVA to the user computing device. The method further includes verifying, by the merchant computing entity, the one-time use code.
Method and system for reduced V2X receiver processing load using network based application layer message processing
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
USER ACTIVITY MONITORING USING AVAILABLE WIRELESS SIGNAL STRENGTHS
A monitoring system can be utilized to provide remote services, for example, caregiving services, to a user. The monitoring system can perform a mapping of a site and then use this information along with sensor data to determine a status of the client user. Based on the status, the monitoring system sends a notification to a contact based on a profile configuration associated with the client user. The monitoring system can use any one or more training algorithms, such as a machine learning algorithm, to determine one or more locations of a site associated with a client user. Once these locations are determined the monitoring system is able to provide to the contact accurate and reliable information about the client user so as to improve the services and quality of experience associated with the client user.