Patent classifications
H04W12/67
Devices, systems, and methods for secure and adaptable transportation of goods and/or persons
A method includes receiving, by a first device of a transportation provider, a device ID of a particular device of a user and purchase information regarding a purchase, by the user, of one or more goods or services. The method includes sending, by the first device, the device ID of the particular user device to a central server. The method includes receiving, by the first device from the central server, information regarding the particular user device. The method includes determining, by the first device, a selected transportation vehicle based on the purchase information and the information regarding the particular user device. The method includes sending, by the first device, a vehicle ID of the selected transportation vehicle to the central server. The method includes providing a transportation service to the user using the particular user device and the selected transportation vehicle.
Devices, systems, and methods for secure and adaptable transportation of goods and/or persons
A method includes receiving, by a first device of a transportation provider, a device ID of a particular device of a user and purchase information regarding a purchase, by the user, of one or more goods or services. The method includes sending, by the first device, the device ID of the particular user device to a central server. The method includes receiving, by the first device from the central server, information regarding the particular user device. The method includes determining, by the first device, a selected transportation vehicle based on the purchase information and the information regarding the particular user device. The method includes sending, by the first device, a vehicle ID of the selected transportation vehicle to the central server. The method includes providing a transportation service to the user using the particular user device and the selected transportation vehicle.
Consensus-based online authentication
Methods and systems for consensus-based online authentication are provided. An encryption device may be authenticated based on an authentication cryptogram generated by the encryption device. The encryption device may transmit a request for security assessment to one or more support devices. The support devices may individually assess the encryption device, other security devices, and contextual information. The support devices may choose to participate in a multi-party computation with the encryption device based on the security assessments. Support devices that choose to participate may transmit one or more secret shares or partial computations to the encryption device. The encryption device may use the secret shares or partial computations to generate an authentication cryptogram. The authentication cryptogram may be transmitted to a decryption device, which may decrypt the authentication cryptogram, evaluate its contents, and authenticate the encryption device based on its contents.
Method and a device for detecting wireless network security
Embodiments of the present application are to provide a method for detecting wireless network security. The method comprises: establishing a wireless connection between a user equipment and a target wireless access point; obtaining security detection information on a wireless local area network where the user equipment is located; and classifying the security detection information and determining security status information corresponding to the wireless local area network based on the security detection information. The present application detects the connected wireless network, obtains corresponding security detection information based on security detection items, and classifies the security detection information and determines security status information corresponding to the wireless local area network according to the security detection information. In the present application, the security detections performed on the currently connected wireless network are more comprehensive, which reduces potential risks that users may encounter.
Flexible selection of security features in mobile networks
Various communication systems may benefit from appropriate security measures. For example, mobile networks may benefit from the flexible selection of security features. A method can include receiving an attach request. The method can also include sending a response to the request. The response can include information configured to allow selection of a control plane integrity algorithm independently of a user plane integrity algorithm.
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR QUANTIFYING THE PRIVACY RISK OF TRAJECTORY DATA
Embodiments described herein relate measuring and quantifying the privacy risk for disclosure of trajectory data based on one or more attributes of the trajectory data. Methods may include: receiving probe data points defining at least one trajectory; identifying attributes of the at least one trajectory, where the identified attributes include values for respective trajectories; calculating a privacy risk associated with the at least one trajectory based, at least in part, on a distribution of values of the identified attributes, where the privacy risk includes a measure of difficulty in identifying a source of the at least one trajectory; and providing information associated with the at least one trajectory for location-based services in response to the privacy risk satisfying a predetermined value.
Multi-factor authentication for mobile security protocol
In one example, a home network associated with a user equipment obtains an authentication request to authenticate the user equipment to a serving network. The home network generates an authentication vector of a mobile security protocol. The authentication vector includes an indication that the user equipment is to be authenticated using a multi-factor authentication process. The home network provides the authentication vector to the serving network to prompt a response from the user equipment that is in accordance with the multi-factor authentication process. The home network authenticates the user equipment to the serving network based on the response.
Multi-factor authentication for mobile security protocol
In one example, a home network associated with a user equipment obtains an authentication request to authenticate the user equipment to a serving network. The home network generates an authentication vector of a mobile security protocol. The authentication vector includes an indication that the user equipment is to be authenticated using a multi-factor authentication process. The home network provides the authentication vector to the serving network to prompt a response from the user equipment that is in accordance with the multi-factor authentication process. The home network authenticates the user equipment to the serving network based on the response.
System and method for providing an in-line and sniffer mode network based identity centric firewall
The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant system is adapted for installation inline or in sniffer mode. In various embodiments, defined rules are applied to network traffic to determine whether certain types of attacks are occurring on the network resources. If one such attack is detected, the system provides for several potential responses, including for example disconnecting the attacking remote machine, requiring the user at that machine to re-authenticate, and/or requiring a second factor of authentication from the user at that machine. In some example embodiments, regardless of any activity required of a user at the remote machine suspected of malicious behavior, the disclosed system generates an alarm or other alert for presentation as appropriate, such as via a graphical user interface or a third-party system using an API.
Enabling secure internet transactions in an unsecure home using immobile token
This specification discloses devices and methods for a security concept that includes an immobile hardware token (e.g., a “wall token” that is fixed within a wall) which ensures that the more sensitive actions of electronic banking (e.g., money transfers of large sums to foreign bank accounts) can only be done from the account owner's home, but not from a remote place. However, other less sensitive (and lower security risk) actions can still be done from anywhere else. In some embodiments, the hardware token includes sensors to ensure that the token is not moved or tampered with, interfaces to provide distance bounding, and a crypto-processor to provide secure authentication. The distance bounding can be used to determine if the authentication device is in close proximity to the hardware token, which can in turn ensure that the authentication device is within the account owner's home.