Patent classifications
H04W12/64
METHOD AND APPARATUS FOR PROVIDING A PRIVACY-PRESERVING YET TARGETED DELIVERY OF LOCATION-BASED CONTENT
An approach is provided for providing a privacy-preserving yet targeted delivery of location-based content. The approach involves, for example, initiating a first transmission of content consumer public key(s) associated with content consumer(s) to a content provider. The approach also involves, in response to the transmission, receiving encrypted content encrypted with the content consumer public key(s). The encrypted content is cryptographically signed with a content provider private key associated with the content provider. The approach further involves initiating a second transmission of the encrypted content to a consumer device. A content provider public key for decrypting the encrypted content is made available based on (1) the consumer device scanning the content provider public key at a location designated by the content provider, or (2) detecting that the consumer device is located within a threshold proximity of the location.
METHOD AND SYSTEM FOR VERIFYING THE ELIGIBILITY OF A USER BASED ON LOCATION
A method and system for carrying out a security processes between a client and a relying party. in more particular, to location-based security processes
Access control via a mobile device
Systems, devices, and methods for access control via a mobile device are described herein. One method includes receiving location information associated with a mobile device in a facility, determining that the mobile device is within a particular distance of an area of the facility based on the location information, determining whether a user of the mobile device is allowed access to the area, and allowing access to the area via a relay associated with the area responsive to a determination that the user is allowed access.
Access control via a mobile device
Systems, devices, and methods for access control via a mobile device are described herein. One method includes receiving location information associated with a mobile device in a facility, determining that the mobile device is within a particular distance of an area of the facility based on the location information, determining whether a user of the mobile device is allowed access to the area, and allowing access to the area via a relay associated with the area responsive to a determination that the user is allowed access.
Authenticated device assisted user authentication
A system for user authentication includes an authenticated device with a restricted-access function that a user is able to access in response to verification of an identity of the user by the authenticated device and a proximate device with a restricted-access function that the user is able to access in response to the proximate device receiving authentication data that includes the identity of the user from the authenticated device. The authenticated device is operable to identify an absence of intent of the user to access the restricted-access function of the proximate device, and in response to identifying the absence of intent to access the restricted-access function of the proximate device, emit a locking signal such that, in response to detecting the locking signal, the proximate device enters a locked state and the restricted-access function of the proximate device is inaccessible to the user.
Authenticated device assisted user authentication
A system for user authentication includes an authenticated device with a restricted-access function that a user is able to access in response to verification of an identity of the user by the authenticated device and a proximate device with a restricted-access function that the user is able to access in response to the proximate device receiving authentication data that includes the identity of the user from the authenticated device. The authenticated device is operable to identify an absence of intent of the user to access the restricted-access function of the proximate device, and in response to identifying the absence of intent to access the restricted-access function of the proximate device, emit a locking signal such that, in response to detecting the locking signal, the proximate device enters a locked state and the restricted-access function of the proximate device is inaccessible to the user.
Machine learning-based platform for user identification
A system and method are disclosed for identifying a user based on the classification of user movement data. An identity verification system receives a sequence of motion data from a mobile device operated by a target user. From the sequences of motion data, the identity verification system identifies a plurality of identity blocks representing different movements performed by the target user and encodes a set of signature sequences from each identity block into a feature vector. Each feature vector is input to a confidence model to output an identity confidence value for an identity block. An identity confidence value describes a confidence that the movement in the identity block was performed by the target user. The identity confidence value is compared to an operational security threshold and if identity confidence value is above the threshold, the target user is granted access to an operational context.
GLOBAL REGISTRATION SYSTEM FOR AERIAL VEHICLES
Systems and methods for vehicle registration are disclosed. A server computer and at least one database are constructed and configured for network communication with at least one vehicle. The at least one vehicle transmits a registration request to the server computer. The server computer assigns a unique registration ID for the at least one vehicle. The at least one database comprises a geofence database storing information of a multiplicity of registered geofences. Each of the multiplicity of registered geofences comprises a plurality of geographic designators defined by a plurality of unique Internet Protocol version 6 (IPv6) addresses. One of the plurality of unique IPv6 addresses is encoded as a unique identifier for each of the multiplicity of registered geofences. The server computer caches the information of the multiplicity of registered geofences on the at least one vehicle.
GLOBAL REGISTRATION SYSTEM FOR AERIAL VEHICLES
Systems and methods for vehicle registration are disclosed. A server computer and at least one database are constructed and configured for network communication with at least one vehicle. The at least one vehicle transmits a registration request to the server computer. The server computer assigns a unique registration ID for the at least one vehicle. The at least one database comprises a geofence database storing information of a multiplicity of registered geofences. Each of the multiplicity of registered geofences comprises a plurality of geographic designators defined by a plurality of unique Internet Protocol version 6 (IPv6) addresses. One of the plurality of unique IPv6 addresses is encoded as a unique identifier for each of the multiplicity of registered geofences. The server computer caches the information of the multiplicity of registered geofences on the at least one vehicle.
FACILITATION OF PROTECTION FROM 5G OR OTHER NEXT GENERATION NETWORK USER EQUIPMENT DENIAL OF SERVICE ATTACKS
Misconfigured user equipment (UE) can cause additional traffic generation to server devices (e.g., 911 server device) and overload the server devices. Thus, detecting these UEs and blocking them before they hit the application servers in the mobility network can be facilitated via an identification and blocking approach. The system can comprise an identification correlator that can correlate S1 interface application protocol identification (S1-APID) associated with the UE to an international mobile subscriber identity (IMSI) of the UE. When the identification correlator collects data feeds from a network, the identification correlator can share this data with a call data record engine to determine if the UE is a misconfigured UE and prompt the network core to drop/block the misconfigured UE from a communication.