Patent classifications
H04W12/73
Location-based mobile device authentication
A computer server is disclosed that may include a processing unit and a computer-readable memory that may store computer-executable instructions that are executable by the processing unit to cause the computer server to perform various operations. The computer server may receive location data from a mobile client device and may compare the location data to predefined secure location definitions, which may be trusted or private locations. The computer server may receive a request from the mobile client device to access network resources or services, and the computer server may determine, using a result of comparing the location data and the one or more predefined secure location definitions, an authentication process for providing the mobile client device with access to the network resources or services. The computer server may execute the authentication process and may provide the mobile client device with access to the network resources or services.
SYSTEMS AND METHODS FOR SECURING WIRELESS COMMUNICATION WITH DEVICE PINNING
Systems and methods of the present disclosure are directed to a method performed by a Wireless Communication Device (WCD) for securing wireless communication. The method includes obtaining a configuration descriptive of network entity(s) comprising (a) Legitimate Network Entity (LNE(s)); (b) or Illegitimate Network Entity (INE(s)); or (c) both LNE(s) and INE(s). The method includes determining that a trigger condition for applying the configuration has occurred. The method includes, responsive to making the determination, applying the configuration to the WCD such that connection related procedure(s) of the WCD related to connection between the WCD and the network entity(s) are adjusted in such a manner that the WCD is permitted to connect to only the LNE(s), not permitted to connect to the INE(s), both permitted to connect to only the LNE(s) and not permitted to connect to the INE(s), or not permitted to connect to any network entity.
SYSTEMS AND METHODS FOR SECURING WIRELESS COMMUNICATION WITH DEVICE PINNING
Systems and methods of the present disclosure are directed to a method performed by a Wireless Communication Device (WCD) for securing wireless communication. The method includes obtaining a configuration descriptive of network entity(s) comprising (a) Legitimate Network Entity (LNE(s)); (b) or Illegitimate Network Entity (INE(s)); or (c) both LNE(s) and INE(s). The method includes determining that a trigger condition for applying the configuration has occurred. The method includes, responsive to making the determination, applying the configuration to the WCD such that connection related procedure(s) of the WCD related to connection between the WCD and the network entity(s) are adjusted in such a manner that the WCD is permitted to connect to only the LNE(s), not permitted to connect to the INE(s), both permitted to connect to only the LNE(s) and not permitted to connect to the INE(s), or not permitted to connect to any network entity.
PHYSICAL CHANNEL ENCRYPTION USING SECRET KEYS
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine, based at least in part on a key derivation function and a set of physical layer parameters, a secret key for encrypting a unicast physical channel at a physical layer, wherein the secret key is a UE-specific secret key. The UE may transmit, to a base station, an encrypted transmission over the unicast physical channel based at least in part on the secret key. Numerous other aspects are described.
GENERATION OF A UNIQUE DEVICE IDENTIFIER FOR A CLIENT DEVICE IN A WIRELESS NETWORK
To improve the network experience in a network, a unique device identifier (UDID) can be generated by a UDID generation module of a client device. The UDID generation module utilizes one or more device parameters as well as a service set identifier (SSID) as input(s) to the UDID generation module. The UDID can be reported to an access point device of the network so that the access point device can track, monitor, control, etc. the client device within the network, for example, when media access control randomization (rMAC) is utilized by the network to protect the privacy of the client device or a user of the client device. The same UDID is generated each time the client device joins the network so that the client device need not store the UDID.
Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication
An authorization process employs a network ID as a possession factor for a secure account, such as a bank account or e-mail account, and determines one or more risk indicators associated with the possession factor. The authorization process is successfully completed when a risk score that is based on the risk indicators is less than a certain risk threshold. The risk indicators include a device history of the network ID and/or at least one attribute of a cellular account associated with the network ID. The device history identifies other mobile devices and/or SIM cards, if any, that have been previously activated with the network ID, while the one or more attributes can further indicate potentially fraudulent activity associated with the cellular account through which wireless services for the network ID are currently provided.
USING MULTIPLE RADIO STREAMS TO THWART MAN-IN-THE-MIDDLE ATTACKS
The present disclosure generally relates to apparatus, software and methods for thwarting radio spoofing techniques by requiring and sending data from multiple radios positioned such that the receiving client can determine that it came from multiple spatially separated radios due to the Angle of Arrival of each radio's signal.
VARIABLE AUTHENTICATION IDENTIFIER (AID) FOR ACCESS POINT (AP) PRIVACY
This disclosure provides methods, devices and systems for using a pseudonym service set identifier (pSSID) for access point (AP) and station (STA) privacy. For example, a pSSID is included by a STA or AP in place of a persistent SSID for over the air communications used for various functions (such as for the STA to determine the SSID of the AP before connecting to the AP). The pSSID is generated using a hash function that is defined at both the AP and the STA. An input to the hash function includes the SSID. Other inputs may include a temporary media access control (MAC) address of the device generating the pSSID, a time value associated with a time when the pSSID is generated, or a location value associated with a position measurement of the device generating the pSSID.
VARIABLE AUTHENTICATION IDENTIFIER (AID) FOR ACCESS POINT (AP) PRIVACY
This disclosure provides methods, devices and systems for using a pseudonym service set identifier (pSSID) for access point (AP) and station (STA) privacy. For example, a pSSID is included by a STA or AP in place of a persistent SSID for over the air communications used for various functions (such as for the STA to determine the SSID of the AP before connecting to the AP). The pSSID is generated using a hash function that is defined at both the AP and the STA. An input to the hash function includes the SSID. Other inputs may include a temporary media access control (MAC) address of the device generating the pSSID, a time value associated with a time when the pSSID is generated, or a location value associated with a position measurement of the device generating the pSSID.
LOCATION-BASED MOBILE DEVICE AUTHENTICATION
A computer server may receive location data from a mobile client device and may compare the location data to predefined secure location definitions, which may be trusted or private locations. The computer server may receive a request from the mobile client device to access network resources or services, and the computer server may determine, using a result of comparing the location data and the one or more predefined secure location definitions, an authentication process for providing the mobile client device with access to the network resources or services. The computer server may execute the authentication process and may provide the mobile client device with access to the network resources or services.