Patent classifications
H04W12/66
TRUST-AWARE DECENTRALIZED RESOURCE PROVISIONING FOR 6G TASK ASSIGNMENT
In some implementations, a first entity may receive, from a second entity, a task assignment request including one or more of: an identifier of a first task, identifier of the first and second entity, execution instructions, set of trust evaluation criteria, a first smart contract, a specified trust level, a drafted first smart contract, and a preferred. The first entity may analyze requirements for executing the first task, decide on resource requirements for executing the first task and accept, conditionally accept, or reject the request based on the resource requirements and the set of trust evaluation criteria. The first entity may send a modified first smart contract when the first smart contract is conditionally accepted. The first entity may receive a notification that the first smart contract or modified first smart contract is recorded in a distributed ledger system via a DLS and may execute a first task accepted/conditionally accepted.
SYSTEM AND METHOD FOR SCALABLE AUTHENTICATION AND DATA MANAGEMENT IN A SMART CITY NETWORK
The present invention relates to the field of smart city networks, specifically to systems and methods for enhancing security, scalability, and data integrity. More particularly, the invention focuses on a decentralized system for authentication and data management in Internet of Things (IoT) ecosystems within a smart city context. The system addresses critical challenges in conventional centralized architectures, such as single points of failure, scalability bottlenecks, and vulnerabilities to malicious attacks. By integrating a multi-layered approach that combines elliptic curve cryptography for secure node registration, a trust analysis model for real-time behavioral and data trustworthiness assessment, and a blockchain network for decentralized, immutable transaction verification, this system provides a robust and resilient solution. The system ensures secure communication between IoT nodes and fog servers, validates data integrity, and maintains a transparent and tamper-proof ledger of activities, thereby facilitating reliable and efficient operation of various smart city services.
Fraud prevention leveraging webhooks to obtain third party fraud data identification
A method for using a fraud detection application running on a mobile device to monitor, in real-time, a telephonic communication on the mobile device. Data may be continuously extracted from the telephonic communication by the fraud detection application. The method may include determining from the extracted data, that the data includes a fraud indicator. In response to the determining, a webhook may be generated that includes a payload storing metadata of the telephonic communication. The method may include identifying a group of mobile devices that may be associated with the data and further transmitting the webhook to each of the group of mobile devices and an entity server supporting the fraud detection application. The method may include receiving a rating of the telephonic communication from at least some of the mobile devices and from an entity server and using the ratings to determine a threshold level of fraud.
LIGHTWEIGHT, BLOCKCHAIN-BASED REPUTATION SYSTEM FOR UNMANNED AERIAL VEHICLE NETWORKS
A system includes: one or more each of UAVs; UAV service requestors; UAV service providers; and ground stations. Using an identity authentication module, a reputation system module, and a blockchain fabric module, the UAVs, the UAV service requestors, the UAV service providers, and the ground stations are capable of sending and receiving electronic data via one or more remote connections, the identity authentication module identifies and authenticates UAVs such that only verified and authenticated UAVs can access the UAV network; the reputation system module evaluates and maintains a reputation of the UAV service requestors and the UAV service providers and assigns a reputation; and the blockchain fabric module implements a blockchain with respect to the UAV network to securely record flight data of the UAVs on the UAV network, which flight data includes one or more of a location, altitude, and one or more mission parameters of the UAV.
METHODS FOR TRUST INFORMATION IN COMMUNICATION NETWORK AND RELATED COMMUNICATION EQUIPMENT AND COMMUNICATION DEVICE
A method performed by a network equipment of a communication network to dynamically provide trust information to a communication device registered or being registered to the communication network is provided. The method includes determining a trust information for each of one or more access networks. The trust information indicates whether each of the one or more access networks is trusted. The method further includes indicating to the communication device whether the one or more access networks is trusted for a current session or a later session. A method performed by a communication device registered or being registered with a communication network to dynamically receive trust information is also provided. The method includes receiving a message including a protected trust information list from a network equipment. The method further includes verifying the protection of the message. The method further includes storing the protected trust information list.
Secure zero touch provisioning of network devices using Bluetooth application
A method for provisioning a network device can include, on a network device in a factory-default state and having a factory-installed Secure Zero Touch Provisioning (SZTP) agent, enabling a wireless communication capability of the network device. Upon detecting the wireless communication capability being enabled, the SZTP agent attempts to establish a connection with an SZTP application on a computing device in close proximity to the network device. Once connected, the SZTP agent requests SZTP bootstrap information from the SZTP Application, receives SZTP artifacts, and determines whether the SZTP artifacts contain redirect information to an SZTP bootstrap server. If so, the SZTP agent validates the redirect information and attempts to connect to the SZTP bootstrap server. Once connected, the SZTP agent attempts to retrieve network device provisioning artifacts from the SZTP bootstrap server and provisions the network device using the network device provisioning artifacts retrieved from the SZTP bootstrap server.
Secure Mobile Communication
Arrangements for providing secure mobile communications are provided. In some examples, a computing platform may receive or intercept an incoming call to a mobile device. In some examples, the call may be routed, via a wireless data network, to an internal cybersecurity evaluation system that may, e.g., be part of the computing platform. The computing platform may evaluate the call to determine a likelihood that the call is malicious. If it is determined that the call is likely malicious, the call may be routed to an internet entity computing device for further analysis, intelligence gathering, or the like. If the call is not likely malicious, the call may be routed, via the data network, to the intended mobile device and may be provided to the mobile device via an application executing on the mobile device.