H04L63/0414

Proximity discovery, authentication and link establishment between mobile devices in 3GPP LTE

The invention enables a device to discover one or more other devices within range for a device-to-device mode of communication. This proximity discovery may trigger a target device, e.g. to start listening to signals from a source device or perform any other action based on the proximity discovery like e.g. charging at a toll gate. A source device that wants to be discovered broadcasts a message including an identifier or a representation of the identifier. This identifier may be an identifier of the target device to be contacted or of the source device or a derivation thereof or a common security association used by a set of peers. The target device compares the broadcast identifier with a known identifier to establish proximity discovery.

Encrypted indentifiers in a wireless communication system
09768961 · 2017-09-19 · ·

A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.

Refreshing security credentials used to invoke an external function
11249829 · 2022-02-15 · ·

A query referencing a function associated with a remote software component is received by a network-based data warehouse system. Temporary security credentials corresponding to a role at a cloud computing service platform are obtained. The role has permission to send calls to a web endpoint corresponding to the remote software component. A request comprising input data and electronically signed using the temporary security credentials is sent to a web Application Programming Interface (API) management system of the cloud computing service platform. The request, when received by the web API management system, causes the web API management system to invoke external functionality provided by the remote software component at the web endpoint with respect to the input data. A response comprising a result of invoking the external functionality is received from the web API management system, and the result data is processed according to the query.

Server and data management method

Provided is a data management method of a server, including receiving, from a first server, first data, in which a first identification (ID) associated with a device and a first encryption identification (ID) that encrypts an ID associated with an advertisement are mapped and second data, in which a second ID associated with the advertisement and a second encryption ID that encrypts an ID associated with the device are mapped; converting a second encryption ID associated with an electronic device, received from a second server, to the second ID based on the second data, and transmitting the converted second ID and third data to an advertisement service server; and converting a first encryption ID associated with the electronic device, received from a third server, to the first ID based on the first data, and transmitting the converted first ID and fourth data to a general service server.

METHOD FOR MODULATING ACCESS TO A RESOURCE, CORRESPONDING PROGRAM AND DEVICE
20170255787 · 2017-09-07 ·

A method for controlling access to preliminarily identified resources is disclosed. The method is implemented by an electronic device having means of access to said resources to be controlled. The method has: a step for receiving a request, coming from a program, for access to a current resource; a step for obtaining at least one access parameter for access to said current resource within a resource-characterizing data structure; and a step for modulating access to said current resource as a function of said at least one preliminarily obtained access parameter.

DYNAMICALLY MODIFYING FUNCTIONALITY OF A REAL-TIME COMMUNICATIONS SESSION

The invention discloses a method for modifying functionality of a real-time communications system. The method comprises establishing a real-time communication session (100) between a first participant (A) and a second participant (B); responsive to detecting a trigger event, selecting a first redaction algorithm (112) of a plurality of redaction algorithms; and adding the first redaction algorithm to the real-time communication session as a virtual participant (C). The first redaction algorithm is configured to redact data appearing in a data stream to be transmitted from the first participant to the second participant during the real-time communication session.

Method for Accessing Wireless Local Area Network and Terminal
20220232466 · 2022-07-21 ·

A method for accessing a wireless local area network (WLAN) includes a terminal receiving type information of the WLAN and identification information of the WLAN from an access point. The terminal determines a type of the WLAN based on the type information. The terminal sends, to the access point when the terminal determines that the type is a type I, a message requesting to access the WLAN. The message carries a virtual media access control (MAC) address, where the virtual MAC address identifies the terminal, and where the virtual MAC address is different from a device MAC address of the terminal.

User identity privacy protection in public wireless local access network, WLAN, access

Systems and methods relating to providing identity privacy over a trusted or untrusted non-3GPP access network in a wireless communication system are disclosed. In some embodiments, a method of operation of a wireless device comprises sending a message to a gateway (ePDG, N3IWF or TWAG) where the message comprises an anonymous user identity; receiving a request for obfuscating the user identity wherein the request comprises a server certificate; and validating the server certificate and sending a response message back to the gateway, comprising the user identity obfuscated by a public key associated with the server certificate. Similar methods are provided on the gateway side and AAA server side. In this manner, the user identity is protected when establishing the connection to the core network and protects against a man in the middle attack.

Real-time privacy filter
11210461 · 2021-12-28 · ·

A masking system prevents a human agent from receiving sensitive personal information (SPI) provided by a caller during caller-agent communication. The masking system includes components for detecting the SPI, including automated speech recognition and natural language processing systems. When the caller communicates with the agent, e.g., via a phone call, the masking system processes the incoming caller audio. When the masking system detects SPI in the caller audio stream or when the masking system determines a high likelihood that incoming caller audio will include SPI, the caller audio is masked such that it cannot be heard by the agent. The masking system collects the SPI from the caller audio and sends it to the organization associated with the agent for processing the caller's request or transaction without giving the agent access to caller SPI.

Systems and devices for encrypting, converting and interacting with medical images

A network device and a peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a secure and standardized image file format as well as the communication of the encrypted and/or converted image to a secure server on a remote network. The devices may detect an unencrypted medical image file transmitted and encrypt and convert selected medical image files associated with the medical data based on standardized medical data format specifications that correlate with an output destination type. An encryption and conversion unit may be incorporated within the hardware and software of a medical imaging device or another network device in order to provide the capability for encrypting a medical image for transmission that is compatible with a destination device or network.