H04W12/71

Bluetooth mesh network provisioning
11563631 · 2023-01-24 · ·

Information reported by one or more gateway nodes in a Bluetooth mesh network regarding an unprovisioned Bluetooth device is received. Provisioning data for the unprovisioned Bluetooth device is generated. A destination Bluetooth gateway node to which to issue the generated provisioning data is determined from among the one or more gateway nodes reporting the received information. The generated provisioning data is issued to the destination Bluetooth gateway node so that the destination Bluetooth gateway node can perform a provisioning operation directed at the unprovisioned Bluetooth device.

MULTI-PERSPECTIVE SECURITY CONTEXT PER ACTOR

A flexible security system has been created that allows for fluid security operations that adapt to the dynamic nature of user behavior while also allowing the security related operations themselves to be dynamic. This flexible system includes ongoing collection and/or updating of multi-perspective “security contexts” per actor and facilitating consumption of these multi-perspective security contexts for security related operations on the users. These security related operations can include policy-based security enforcement and inspection. A security platform component or security entity uses a multi-perspective security context for a user or actor. Aggregating and maintaining behavioral information into a data structure for an actor over time from different sources allows a security platform component or entity to have historical context for an actor from one or more security perspectives. Descriptors that form a security context can originate from various sources having visibility of user behavior and/or user attributes.

Firewall coordination in a network

Embodiments are directed to host discovery for firewall coordination. An embodiment of a storage medium includes instructions for discovering a network topology for a network branch, the network branch including multiple access points including a first access point, the first access point having an interface to a network, the discovery of the network topology including identifying any access point that is linked to the first access point directly or via one or more intermediary access points; discovering one or more host devices that are connected by wireless or wired connections to one or more access points in the network branch; and generating a firewall coordination plan for the network branch based on the discovered network topology and the discovered one or more hosts, the firewall coordination plan including applying a firewall process for an access point to which a first host device is attached and bypassing one or more other firewall processes.

SYSTEM AND METHOD OF DYNAMIC AND SCALABLE IoT FRAMEWORK

A method and a system for providing one or more services to one or more user devices

in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].

Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
11564266 · 2023-01-24 · ·

In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.

Cellular wireless service preferences transfer

Apparatus and methods to transfer user preferences for cellular wireless service associated credentials transferred from a source device to a target device. Transfer of credentials can include physically moving a physical subscriber identity module (SIM) card between devices, transfer of cellular wireless service from a first SIM card at the source device to a second SIM card at the target device, and/or transfer of cellular wireless services for one or more electronic SIMs (eSIMs) from the source device to the target device. Preferences associated with some or all of the transferred SIMs/eSIMs can be applied at the target device when certain matching criteria are satisfied. Exemplary matching criteria include matching identifiers, such as integrated circuit card identifier (ICCID) values, mobile station international subscriber directory number (MSISDN) values, and/or mappings thereof. Transfer of preferences can occur via a local peer-to-peer connection, a secure cloud-based service, and/or a backup and restore process.

Cellular wireless service preferences transfer

Apparatus and methods to transfer user preferences for cellular wireless service associated credentials transferred from a source device to a target device. Transfer of credentials can include physically moving a physical subscriber identity module (SIM) card between devices, transfer of cellular wireless service from a first SIM card at the source device to a second SIM card at the target device, and/or transfer of cellular wireless services for one or more electronic SIMs (eSIMs) from the source device to the target device. Preferences associated with some or all of the transferred SIMs/eSIMs can be applied at the target device when certain matching criteria are satisfied. Exemplary matching criteria include matching identifiers, such as integrated circuit card identifier (ICCID) values, mobile station international subscriber directory number (MSISDN) values, and/or mappings thereof. Transfer of preferences can occur via a local peer-to-peer connection, a secure cloud-based service, and/or a backup and restore process.

Electronic device and method for generating attestation certificate based on fused key

An electronic device and method of operating an electronic device are provided. The electronic device includes an integrated circuit including at least one key, at least one processor including the integrated circuit, and a memory operatively connected to the at least one processor. The memory stores instructions that, when executed, cause the at least one processor to obtain at least one piece of hardware information related to the electronic device, generate a signed certificate signing request including the at least one piece of hardware information, based on the at least one key, transmit the signed certificate signing request to an external electronic device, receive an attestation certificate generated based on the signed certificate signing request, from the external electronic device, and store the received attestation certificate in the memory.

SYSTEM AND METHOD FOR DETERMINING AUTHENTICITY OF A MOBILE DEVICE
20230015049 · 2023-01-19 · ·

The present invention provides a system and process for determining the authenticity of a mobile device [101]. Upon a request initiated on an application of a mobile device [101], a first set of information is retrieved relating to at least one hardware component [203], which is transmitted to a remote server [104]. The remote server [104] then retrieves a second set of information based on first set of information from a data store [105]. The first, and second set of information are analyzed to determine a binary value for at least one hardware component [203]. Thereafter, a first value is obtained based on said binary value and at least one pre-assigned weighed value assigned to at least one hardware component. An authentication value is obtained by comparing the first value with a mobile phone specific threshold value. The authentication value is then transmitted to the mobile device [101].

SYSTEM AND METHOD FOR DETERMINING AUTHENTICITY OF A MOBILE DEVICE
20230015049 · 2023-01-19 · ·

The present invention provides a system and process for determining the authenticity of a mobile device [101]. Upon a request initiated on an application of a mobile device [101], a first set of information is retrieved relating to at least one hardware component [203], which is transmitted to a remote server [104]. The remote server [104] then retrieves a second set of information based on first set of information from a data store [105]. The first, and second set of information are analyzed to determine a binary value for at least one hardware component [203]. Thereafter, a first value is obtained based on said binary value and at least one pre-assigned weighed value assigned to at least one hardware component. An authentication value is obtained by comparing the first value with a mobile phone specific threshold value. The authentication value is then transmitted to the mobile device [101].