Patent classifications
H04W12/69
Dynamic wireless access point configuration
Methods and systems for dynamic wireless network configuration are provided. Aspects include receiving, by an application on a user device, a token, deriving, by the application, a unique identifier and passcode based at least in part on the token, and controlling remote access to a first computer system based on the unique identifier and passcode.
Anonymous verification process for exposure notification in mobile applications
The present disclosure relates exposure notification, and in particular to techniques for verification of positive test results from public health authorities where individuals submit notice using public health approved mobile applications for exposure notification and/or contact tracing. When an individual attempts to submit a positive test result notification in a mobile application, the associated device's mobile number will be requested. This mobile number will then be sent a verification code to be entered in the application. At this point, these codes shall be stored digitally in escrow. A regular data feed from a health authority shall be provided that shall include an agreed encryption (irreversibly encrypted or reversibly encrypted) of the mobile numbers associated with any reported test. Any results submitted in the application that have a matching encryption of the mobile numbers shall be released from the escrow for subsequent notification.
Anonymous verification process for exposure notification in mobile applications
The present disclosure relates exposure notification, and in particular to techniques for verification of positive test results from public health authorities where individuals submit notice using public health approved mobile applications for exposure notification and/or contact tracing. When an individual attempts to submit a positive test result notification in a mobile application, the associated device's mobile number will be requested. This mobile number will then be sent a verification code to be entered in the application. At this point, these codes shall be stored digitally in escrow. A regular data feed from a health authority shall be provided that shall include an agreed encryption (irreversibly encrypted or reversibly encrypted) of the mobile numbers associated with any reported test. Any results submitted in the application that have a matching encryption of the mobile numbers shall be released from the escrow for subsequent notification.
Automated proximity fraud account lock systems and methods
Methods and systems described in this disclosure for protecting one or more consumer accounts. In one implementation, the system includes a security device and a portable computing device. The portable computing device detects whether it is in proximity to the security device. When the portable computing device is in proximity to the security device, one or more consumer accounts associated with the portable computing device is permitted to be used in a transaction. When the portable computing device is not in proximity to the security device, one or more consumer accounts is prevented from being used in the transaction.
Updating a subscriber identity module
Updating a subscriber identity module, SIM, on a host device by deriving a pre-shared key by requesting a SIM identifier via communication module of the host device; receiving SIM identifier and deriving an agent identifier from SIM identifier; transmitting agent and SIM identifiers to SIM update server; receiving a random value from SIM update server and supplying it to the SIM to initiate SIM authentication procedure. In reply, receiving an authentication response from the SIM; and deriving pre-shared key from authentication response; transmitting an update request message to SIM update server, wherein the update request message comprises the agent identifier and is encrypted before transmission using the pre-shared key; receiving an update response message from the SIM update server which has update data and is encrypted using pre-shared key; and following decryption of update response message using derived pre-shared key, transmitting update data to communication module.
Device-enabled access control in a mesh network
A method including receiving, by a first device in communication with a second device in a mesh network, an incoming packet from the second device; determining, by the first device, that the incoming packet is an initiation packet requesting information or a response from the first device or a response packet providing a response to an outgoing packet transmitted by the first device; and processing, by the first device, the incoming packet based at least in part on determining that the incoming packet is the initiation packet or the response packet. Various other aspects are contemplated.
INFORMATION PROCESSING METHOD AND RELATED NETWORK DEVICE
Disclosed in the embodiments of the present disclosure are an information processing method and a related network device. The method comprises: the network device receiving a first message which is sent by an access and mobility management function (AMF) and is used for slice authentication, the first message comprising a first slice identification, a first slice user identification and a first card user identification; determining a first pseudo code corresponding to the first slice identification and a first address of an authentication server, and generating a second message comprising the first pseudo code, the first slice user identification and the first card user identification; and sending the second message to the authentication server on the basis of the first address.
INFORMATION PROCESSING METHOD AND RELATED NETWORK DEVICE
Disclosed in the embodiments of the present disclosure are an information processing method and a related network device. The method comprises: the network device receiving a first message which is sent by an access and mobility management function (AMF) and is used for slice authentication, the first message comprising a first slice identification, a first slice user identification and a first card user identification; determining a first pseudo code corresponding to the first slice identification and a first address of an authentication server, and generating a second message comprising the first pseudo code, the first slice user identification and the first card user identification; and sending the second message to the authentication server on the basis of the first address.
System and method for authenticating using a multi-provider platform
Aspects of the present disclosure involve systems, methods, devices, and the like for user authentication. In one embodiment, the user authentication occurs using a multi-provider platform. The multi-provider platform enables the use and retrieval of user information from the given provider for the use and assessment of information associated with the user. User information may also be received over a web link communicated at least in part by a risk checkpoint component to a user device, wherein the user information received and that retrieved may be jointly used for determining user authentication.
System and method for authenticating using a multi-provider platform
Aspects of the present disclosure involve systems, methods, devices, and the like for user authentication. In one embodiment, the user authentication occurs using a multi-provider platform. The multi-provider platform enables the use and retrieval of user information from the given provider for the use and assessment of information associated with the user. User information may also be received over a web link communicated at least in part by a risk checkpoint component to a user device, wherein the user information received and that retrieved may be jointly used for determining user authentication.