H04W12/61

Method and Device for Determining a Definite Distance

A method for determining a definite safe distance between a wirelessly communicating object transponder and at least one anchor gateway in accordance with a two-way ranging method, wherein transmission and reception timestamps are detected for each communication message via the transponder and the at least one anchor gateway, each of the timestamps from the transponder and the at least one anchor gateway together with at least one respective piece of timestamp monitoring information are transmitted to a failsafe computing device, at least one check is implemented via the failsafe computing device, and the definite safe distance is determined via the failsafe computing device aided by the checked timestamps, where timestamp errors occurring during the detection of the timestamps are caused solely by the transponder or alternatively solely the one anchor gateway.

Method and Device for Determining a Definite Distance

A method for determining a definite safe distance between a wirelessly communicating object transponder and at least one anchor gateway in accordance with a two-way ranging method, wherein transmission and reception timestamps are detected for each communication message via the transponder and the at least one anchor gateway, each of the timestamps from the transponder and the at least one anchor gateway together with at least one respective piece of timestamp monitoring information are transmitted to a failsafe computing device, at least one check is implemented via the failsafe computing device, and the definite safe distance is determined via the failsafe computing device aided by the checked timestamps, where timestamp errors occurring during the detection of the timestamps are caused solely by the transponder or alternatively solely the one anchor gateway.

CERTIFICATE BASED APPLICATION DESCRIPTORS FOR NETWORK SLICE SELECTION
20230049987 · 2023-02-16 ·

Various aspects of the present disclosure generally relate to certificate based application descriptors for network slice selection. In some aspects, a user equipment (UE) may receive a first certificate associated with obtaining a network slice for executing an application. The UE may transmit, to a device, a request for the network slice with the first certificate, and receive an indication that the network slice is available to the UE for the application, based at least in part on the request. Numerous other aspects are provided.

CERTIFICATE BASED APPLICATION DESCRIPTORS FOR NETWORK SLICE SELECTION
20230049987 · 2023-02-16 ·

Various aspects of the present disclosure generally relate to certificate based application descriptors for network slice selection. In some aspects, a user equipment (UE) may receive a first certificate associated with obtaining a network slice for executing an application. The UE may transmit, to a device, a request for the network slice with the first certificate, and receive an indication that the network slice is available to the UE for the application, based at least in part on the request. Numerous other aspects are provided.

SYSTEM AND METHOD FOR IMPROVING CYBERSECURITY FOR TELECOMMUNICATION DEVICES

Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be determined. The number of proximate telecommunication devices that satisfy a density threshold condition may be determined. Responsive to the number of telecommunication devices satisfying a density threshold condition, services of telecommunication devices may be disabled.

Geographically secure access to container controller

An illustrative example embodiment of a controller associated with a container includes a processor and memory. The controller is configured to generate a derived key based on global positioning system information corresponding to a location of the controller. The controller uses the derived key to authenticate a user device.

Geographically secure access to container controller

An illustrative example embodiment of a controller associated with a container includes a processor and memory. The controller is configured to generate a derived key based on global positioning system information corresponding to a location of the controller. The controller uses the derived key to authenticate a user device.

Vehicle and control method thereof

A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.

Wireless user equipment (UE) authorization based on UE type and network identifier

Network circuitry authorizes User Equipment (UEs) for wireless services from wireless networks. The network circuitry stores lists of network identifiers that are associated with UE types. The network circuitry receives an authorization request that indicates a network identifier and a UE type. The UE type comprises model, operating system, user application, and/or radio frequency. The network circuitry retrieves a networks list for the UE type and compares the network identifier from the authorization request to the network identifiers on the network list. The authorization circuitry authorizes the UE responsive to a match between the network identifier from the authorization request and a network identifier on the network list.

SYSTEM FOR DETERMINING NETWORK MEMBERSHIP
20230039480 · 2023-02-09 ·

Aspects described herein may allow for determining network membership to facilitate detecting fraudulent messages. A computing device may receive, from one or more terminals at a first location, a plurality of interactive messages during a pre-determined time period. Each interactive message may comprise personally identifiable information of a user. The computing device may store a first record and a second record that indicate interactive messages were received from a group of users in temporal proximity to each other at the first location and the second location respectively. The computing device may send a request to confirm users in the subset are members of a network and update a membership list based on a reply received from the user. If further messages are received from devices outside the membership list, an alert may be sent to alert the possibility of a fraudulent message.