Patent classifications
H04W12/69
METHOD AND SYSTEM FOR MANAGING ACCESS TO ENTITY IDENTITY DATA
A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party.
METHODS AND SYSTEMS FOR CHARGING FOR DEVICE IDENTIFICATION, ADDITION AND/OR CHANGE
Systems and methods are provided for charging for a connection in a radiocommunication system that provides services to both a device which is directly connected to the radiocommunication system and one or more other devices which connect to the radiocommunication system using, e.g., the transceiver of the device which is able to directly connect to the radiocommunication system. A method for charging for a first device which is connected to a second device that has radiocommunication connectivity includes receiving, at a node in the radiocommunication system, a charging authorization message for the second device’s connection to the radiocommunication system, which charging authorization message includes the device identifier associated with the first device; adding, by the node in the radiocommunication system, the device identifier for the first device to a list associated with the second device; and sending an indication that a connection for the first and second device is authorized.
NETWORK ACCESS VIA DEVICE IDENTIFIER
An example computing device includes a processor to: determine a device identifier of a client device and connection information of a network; request access to the network using the device identifier of the computing device and the connection information; and in response to determining the request is successful, release the device identifier.
NETWORK ACCESS VIA DEVICE IDENTIFIER
An example computing device includes a processor to: determine a device identifier of a client device and connection information of a network; request access to the network using the device identifier of the computing device and the connection information; and in response to determining the request is successful, release the device identifier.
DRONE TELEMETRY SYSTEM
A device includes a processor. The processor is configured to execute instructions to: receive a request from an application to subscribe to a telemetry messaging service; grant a subscription to the telemetry messaging service, to the application based on the request; receive telemetry messages from drones over a radio access network (RAN); process the telemetry messages; and provide the processed telemetry messages to the application over the RAN.
Collaborative device address rotation
Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.
Collaborative device address rotation
Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.
Authorization of applications for direct discovery
Systems, methods, and software for authorizing an application in User Equipment (UE) for direct discovery. In one embodiment, an authorization mechanism receives information (e.g., application ID) for a discovery request sent by an application in a UE. In response to the discovery request, the authorization mechanism challenges the UE for information regarding security parameters that are mapped to the application ID. Based on the information provided by the UE, the authorization mechanism determines whether the application is authorized for direct discovery.
DEVICE-ENABLED ACCESS CONTROL IN A MESH NETWORK
A method including receiving, by a device in communication with a first endpoint and a second endpoint in a mesh network, a first communication from the first endpoint and a second communication from the second endpoint; selectively comparing, by the device, first observed connection state information associated with the first communication with the stored connection state information associated with outgoing communications transmitted by the device, and second observed connection state information associated with the second communication with the stored connection state information; and selectively processing, by the device, the first communication based at least in part on a result of selectively comparing the first observed connection state information with the stored connection state information, and the second communication based at least in part on a result of selectively comparing the second observed connection state information with the stored connection state information. Various other aspects are contemplated.
Network identifier and authentication information generation for building automation system controllers
Generating network identifier information and authentication information for wireless communication with a controller includes accessing, by the controller, identity information associated with the controller. The controller obfuscates the identity information and generates the network identifier information and the authentication information associated with the controller using the obfuscated identity information. The controller is configured for wireless communication using the generated network identifier information and the generated authentication information.