H04W12/69

Updating a Subscriber Identity Module
20230030698 · 2023-02-02 ·

Updating a subscriber identity module, SIM, on a host device by deriving a pre-shared key by requesting a SIM identifier via communication module of the host device; receiving SIM identifier and deriving an agent identifier from SIM identifier; transmitting agent and SIM identifiers to SIM update server; receiving a random value from SIM update server and supplying it to the SIM to initiate SIM authentication procedure. In reply, receiving an authentication response from the SIM; and deriving pre-shared key from authentication response; transmitting an update request message to SIM update server, wherein the update request message comprises the agent identifier and is encrypted before transmission using the pre-shared key; receiving an update response message from the SIM update server which has update data and is encrypted using pre-shared key; and following decryption of update response message using derived pre-shared key, transmitting update data to communication module.

MULTI-CHANNEL AUTHENTICATION USING DELEGATED CREDENTIALS
20220351202 · 2022-11-03 ·

Disclosed herein are methods and systems for electronic authentication using delegated credentials to complete checkout and payment operations on a trusted device of a user. A computing system is structured to perform operations comprising receiving transaction information corresponding to an incomplete checkout operation, transmitting at least a subset of transaction information to a customer device, causing the customer device to generate and display a notification comprising a request for user authorization to complete the incomplete checkout operation, receiving customer input indicative of instructions to complete the incomplete checkout operation, and, responsive to receiving customer input, completing the incomplete checkout operation.

COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE, AND TERMINAL DEVICE
20220353678 · 2022-11-03 ·

A communication device may be configured to receive a sending request by executing communication at a network layer or above of an Open System Interconnection reference model. The communication device may be configured to, in a case where the sending request is received, send a public key by executing communication at the network layer or above. The communication device may be configured to, after the public key has been sent, receive an authentication request. The communication device may be configured to, in a case where the authentication request is received, send an authentication response. The communication device may be configured to, after the authentication response has been sent, receive first connection information. The communication device may be configured to, in a case where the first connection information is received, establish a second wireless connection with an external device by using the first connection information.

Biometric identification of information recipients

A method may involve receiving, by a device operated by a user, at least one first input indicating that information is to be shared with at least one individual other than the user. The first device may acquire first biometric data from the at least one individual, and the information may be caused to be made accessible to at least one account that is associated with stored biometric data that matches the first biometric data.

Biometric identification of information recipients

A method may involve receiving, by a device operated by a user, at least one first input indicating that information is to be shared with at least one individual other than the user. The first device may acquire first biometric data from the at least one individual, and the information may be caused to be made accessible to at least one account that is associated with stored biometric data that matches the first biometric data.

Information processing apparatus and non-transitory computer readable medium storing program for service invitation
11616833 · 2023-03-28 · ·

An information processing apparatus includes an extracting unit that extracts, based on attribute information of an object necessary for using a service provided by a service system and information related to a user of the service system, a candidate for the user to be invited to the service, out of users who are yet to use the service.

SYSTEM FOR NETWORK SECURITY AND USER AUTHENTICATION VIA NETWORK AUGMENTATION

Aspects of the subject disclosure may include, for example, a device that includes a first wireless network transceiver; a second wireless network transceiver; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a wireless network connection to an access point via the first wireless network transceiver, wherein the access point provides a temporary network name for the wireless network connection, wherein the temporary network name is different from an original network name; providing wireless networking services via the second wireless network transceiver using the original network name; adjusting a coverage area of the wireless networking services; and connecting a network device in the coverage area to the wireless networking services via the second wireless network transceiver. Other embodiments are disclosed.

SYSTEM FOR NETWORK SECURITY AND USER AUTHENTICATION VIA NETWORK AUGMENTATION

Aspects of the subject disclosure may include, for example, a device that includes a first wireless network transceiver; a second wireless network transceiver; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a wireless network connection to an access point via the first wireless network transceiver, wherein the access point provides a temporary network name for the wireless network connection, wherein the temporary network name is different from an original network name; providing wireless networking services via the second wireless network transceiver using the original network name; adjusting a coverage area of the wireless networking services; and connecting a network device in the coverage area to the wireless networking services via the second wireless network transceiver. Other embodiments are disclosed.

DETECTION OF UNLIKELY TRAVEL OF MOBILE DEVICES INDICATIVE OF FRAUDULENT MOBILE DEVICE USAGE
20230087506 · 2023-03-23 ·

The disclosed technology is directed towards detecting improbable speeds of a mobile device, which can indicate fraudulent activity with respect to the mobile device. Radio access network events and call detail records are processed to determine when a mobile device “travel jumps” between locations at improbable speeds. Events corresponding to handovers between adjacent cells are filtered out. For events corresponding to changed cell towers that are non-adjacent, further processing is performed to determine the speed of the mobile device travel between the cells. A first speed threshold is selected based on possible air travel (a cell near an airport) or a second non-air travel speed threshold is selected. If the speed of the mobile device exceeds the selected speed threshold, a travel jump is determined. Exceptions can be made for gaps in connectivity due to topography (known inconsistent reception areas) and for a mobile device shutting down and restarting.

USER EQUIPMENT AND CORE NETWORK APPARATUS
20220345997 · 2022-10-27 ·

According to an aspect of the present invention, provided are a procedure and a communicator for initial registration of UE or periodic or mobility-based registration for achieving Network Slice Specific Authentication and Authorization in 5GS. Furthermore, a communicator for achieving a function related to Network Slice Specific Authentication and Authorization in 5GS is provided by providing Network Slice Specific Authentication and Authorization initiated by a network, a procedure, initiated by the network and initiated based on completion of the Network Slice Specific Authentication and Authorization, for changing a UE configuration, a de-registration procedure initiated by the network, and a communicator.