H04W12/48

Multi-factor autonomous sim lock

Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.

METHOD AND RELATED APPARATUS FOR LOGGING IN TO IN-VEHICLE SYSTEM
20230006991 · 2023-01-05 ·

Establishing, by a mobile terminal, a near field communication link to a vehicle, where the vehicle corresponds to the in-vehicle system; negotiating a login binding code with the vehicle through the near field communication link; and providing the login binding code to a network side device, where the login binding code is used by the network side device to verify whether the in-vehicle system can be logged in to with the first user account.

Electronic device and method for generating attestation certificate based on fused key

An electronic device and method of operating an electronic device are provided. The electronic device includes an integrated circuit including at least one key, at least one processor including the integrated circuit, and a memory operatively connected to the at least one processor. The memory stores instructions that, when executed, cause the at least one processor to obtain at least one piece of hardware information related to the electronic device, generate a signed certificate signing request including the at least one piece of hardware information, based on the at least one key, transmit the signed certificate signing request to an external electronic device, receive an attestation certificate generated based on the signed certificate signing request, from the external electronic device, and store the received attestation certificate in the memory.

SPLIT INPUT/OUTPUT SYSTEM AND METHOD FOR MULTIMEDIA COMMUNICATIONS

Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.

SPLIT INPUT/OUTPUT SYSTEM AND METHOD FOR MULTIMEDIA COMMUNICATIONS

Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.

Security appliance for protecting power-saving wireless devices against attack

Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.

Security appliance for protecting power-saving wireless devices against attack

Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RESOURCE CLEANUP IN COMMUNICATIONS NETWORKS
20230007456 · 2023-01-05 ·

Methods, systems, and computer readable media for resource cleanup in communications networks are disclosed. One method for resource cleanup in a communications network comprises: at a policy control function (PCF) comprising at least one processor: receiving, from a binding support function (BSF), a first notification indicating a potentially stale or inactive first binding record, wherein the first notification includes context data associated with the first binding record; determining that resource cleanup associated with the first binding record should be performed; and initiating, using the context data, resource cleanup associated with the first binding record at one or more network entities.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RESOURCE CLEANUP IN COMMUNICATIONS NETWORKS
20230007456 · 2023-01-05 ·

Methods, systems, and computer readable media for resource cleanup in communications networks are disclosed. One method for resource cleanup in a communications network comprises: at a policy control function (PCF) comprising at least one processor: receiving, from a binding support function (BSF), a first notification indicating a potentially stale or inactive first binding record, wherein the first notification includes context data associated with the first binding record; determining that resource cleanup associated with the first binding record should be performed; and initiating, using the context data, resource cleanup associated with the first binding record at one or more network entities.

Provisioning of secure application

Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.