Patent classifications
H04W12/76
METHOD OF USING HARDWARE IDENTIFIERS TO DETECT IoT SECURITY INCIDENTS
A computer-implemented method and system for identifying and managing security incidents for IoT devices operating on a cellular network are disclosed. The method includes receiving device hardware identifier from one or more devices operating on a cellular network; using the received device hardware identifier to retrieve additional device information from the device information storage database; and initiating an action for the one or more devices when the retrieved additional device information does not match expected additional device information, wherein the expected additional device information is based on the received device hardware identifier.
METHOD OF USING HARDWARE IDENTIFIERS TO DETECT IoT SECURITY INCIDENTS
A computer-implemented method and system for identifying and managing security incidents for IoT devices operating on a cellular network are disclosed. The method includes receiving device hardware identifier from one or more devices operating on a cellular network; using the received device hardware identifier to retrieve additional device information from the device information storage database; and initiating an action for the one or more devices when the retrieved additional device information does not match expected additional device information, wherein the expected additional device information is based on the received device hardware identifier.
Secure device management
Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.
FACILITATION OF PREDICTIVE INTERNET-OF-THINGS DEVICE IDENTIFICATION
Internet-of-things (IOT) devices can be identified based on specific behavioral patterns when their identification data is unknown. Previously identified IOT devices with similar behavioral patterns can be used as a baseline from which to compare data that is available about unknown IOT devices. For example, an IOT device can be pooled with a group of IOT devices based on the frequency with which they connect to a wireless network. Additionally, a confidence level of the unknown device being associated with the group of IOT devices can be generated based on such comparison data.
FACILITATION OF PREDICTIVE INTERNET-OF-THINGS DEVICE IDENTIFICATION
Internet-of-things (IOT) devices can be identified based on specific behavioral patterns when their identification data is unknown. Previously identified IOT devices with similar behavioral patterns can be used as a baseline from which to compare data that is available about unknown IOT devices. For example, an IOT device can be pooled with a group of IOT devices based on the frequency with which they connect to a wireless network. Additionally, a confidence level of the unknown device being associated with the group of IOT devices can be generated based on such comparison data.
Non-Public Network Overload and Congestion Control
A base station receives, from an access and mobility management function (AMF) of a core network, a message indicating an overload start of the core network, the message comprising an identifier of a first non-public network (NPN). The base station sends, to a wireless device and based on the overload start, barring information indicating that access to the first NPN is barred.
Non-Public Network Overload and Congestion Control
A base station receives, from an access and mobility management function (AMF) of a core network, a message indicating an overload start of the core network, the message comprising an identifier of a first non-public network (NPN). The base station sends, to a wireless device and based on the overload start, barring information indicating that access to the first NPN is barred.
METHODS AND APPARATUSES FOR MANAGING EXTERNAL APPROVAL PROVISIONING AND EXTERNAL MESSAGING COMMUNICATION REQUESTS IN A GROUP-BASED COMMUNICATION SYSTEM
Various embodiments of the present disclosure are directed to a group-based communication system that is configured to more efficiently manage resource sharing requests. In particular, in some embodiments, the group-based communication system is configured to enable admin users to use an external service, such as an external approval provisioning service, that is separate and distinct from the group-based communication system to manage group-based communication resource sharing requests. In other embodiments, the group-based communication system is configured to allow communication with external users and to trigger new user onboarding protocols through the ingestion of external user directories associated with a sponsor user.
Methods and apparatuses for managing external approval provisioning and external messaging communication requests in a group-based communication system
Various embodiments of the present disclosure are directed to a group-based communication system that is configured to more efficiently manage resource sharing requests. In particular, in some embodiments, the group-based communication system is configured to enable admin users to use an external service, such as an external approval provisioning service, that is separate and distinct from the group-based communication system to manage group-based communication resource sharing requests. In other embodiments, the group-based communication system is configured to allow communication with external users and to trigger new user onboarding protocols through the ingestion of external user directories associated with a sponsor user.
Access and mobility function (AMF) data storage in cellular network registration
A system and method may improve latency for user equipment (UE) registration in cellular networks. UE registration may retrieve the UE's configuration and subscription data locally rather than from a network or cloud-based unified data management (UDM) entity that manages a unified data repository (UDR). For example, the UE may send a unique identification (e.g., a UE ID) for the UE to a registering entity of a cellular network system. The UE ID may then be used to identify a UE Group Identification for the UE at the UDM. The UE Group Identification may be a pointer to the locally-stored configuration and subscription data for the UE. The entity requesting registration may then use the pointer to retrieve the configuration and subscription data locally rather than a remote entity such as the UDM.