H04W12/66

SYSTEM AND METHOD FOR ENABLING AND VERIFYING THE TRUSTWORTHINESS OF A HARDWARE SYSTEM

To determine whether an IoT system connected with a network environment (e.g., the internet) is compromised, a networked Trust as a Service (TaaS) server receives system data indicative of various characteristics of the IoT system, wherein the system data is harvested by a software agent installed on the IoT system. The TaaS server initially establishes a baseline characteristics profile for the IoT system, such that subsequently received system data from the software agent may be compared against the baseline characteristics profile to quickly identify discrepancies between the originally established baseline characteristics profile and current operating characteristics of the system. Such discrepancies may be caused by desirable software updates, in which case the discrepancies may be integrated into the baseline characteristics profile, or the discrepancies may result from the IoT system being undesirably compromised.

Adverse User Behavior Detection and Mitigation

Aspects of the present disclosure relate to adverse user behavior detection and mitigation. In examples, a user account of a social platform may be trusted or untrusted. If the user account is untrusted, activity of the user account may be buffered so as to not directly affect social metrics of the social platform. For example, if the untrusted user account follows a target user account, the untrusted user account may be added to a separate set of followers or otherwise separated from a set of trusted followers of the target user account. Eventually, each user account in the separate set is evaluated to determine whether the user account has transitioned to a trusted user. If the user account is now trusted, it may be migrated to the set of trusted followers. However, if the user account is untrusted, it may be removed from the separate set, thereby reverting the activity.

SHARED SPECTRUM-CONTROLLER ENFORCEMENT OF A SANCTION CRITERION
20220141668 · 2022-05-05 · ·

During operation, a computer may receive information specifying a trusted identity of an electronic device in a network that uses a shared-license-access band of frequencies. Then, the computer may access a sanction criterion, which is stored in memory, where the sanction criterion comprises: a qualifying criterion in the shared-license-access band of frequencies associated with the electronic device, a disqualifying criterion in the shared-license-access band of frequencies associated with the electronic device, or both. Moreover, the computer may calculate compliance of the electronic device with the sanction criterion based at least in part on the trusted identity. Next, the computer may selectively perform a remedial action based at least in part on the calculated compliance. Notably, the computer may exclude the electronic device from operating or may allow the electronic device to operate in the shared-license-access band of frequencies in the geographic region or the network.

Methods and systems for accessing a network
11323445 · 2022-05-03 · ·

A method of accessing a network comprises providing, via a first container establishing a first tunnel between a computing device and a network server, a health-check status of the computing device to the network server, and accessing, via a second container establishing a second tunnel between the computing device and the network server, the network at a level of access based on the health-check status of the computing device.

INTELLIGENT ATTESTATION OF TRAFFIC USING A ROUTING ENGINE

The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.

TRANSACTION AUTHENTICATION, AUTHORIZATION, AND/OR AUDITING UTILIZING SUBSCRIBER-SPECIFIC BEHAVIORS

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.

REPUTATION SCORE ASSIGNMENT FOR VEHICLE-BASED COMMUNICATIONS
20230300616 · 2023-09-21 ·

Systems and techniques are described for assigning a reputation score for vehicle-to-everything (V2X) communications. For example, a process may include receiving, at a receiving device (e.g., a vehicle, network entity, etc.), vehicle-based messages from a transmitting device (e.g., a vehicle, network-equipped infrastructure, etc.). Each of the vehicle-based messages includes information associated with the transmitting device. The process may include determining, at the receiving device, a reputation score for the transmitting device based on at least a portion of the information associated with the transmitting device from each vehicle-based message of the plurality of vehicle-based messages.

Systems, Methods and Computer Program Products for Secure Contactless Payment Transactions
20230298019 · 2023-09-21 ·

The invention provides methods, systems and computer program products for implementing an electronic payment transaction between mobile communication device and a NFC enabled merchant device, both of which are configured to implement a defined communication protocol. The invention implements the required functionality by (i) receiving a request for a trust token from a merchant device, (ii) determining whether the merchant device is trustworthy, (iii) responsive to a determination that the merchant device is trustworthy, generating and transmitting a first displayable trust token to the merchant device, (iv) receiving a second displayable token from the mobile communication device, (v) comparing the received second displayable token against the first displayable token, and generating a merchant device validation message based on the comparison, and (vi) transmitting the merchant validation decision message to the mobile communication device.

SYSTEMS AND METHODS FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING FOR SECURE MESSAGE PROPAGATION

Systems, computer program products, and methods are described herein for dynamic communication channel switching for secure message propagation. The present invention may be configured to receive wireless signals from a plurality of devices and identify, from the plurality of devices and based on the wireless signals, a trusted device. The present invention may be configured to receive, from another device, a secure message, where the secure message includes information identifying a vulnerability in a network to which the trusted device is connected. The present invention may be configured to establish, based on receiving the secure message and using a first wireless communication interface, a communication link with a second wireless communication interface of the trusted device to establish a wireless data channel with the trusted device and transmit, via the wireless data channel, the secure message to the trusted device.

DEVICE BEHAVIOR ANALYTICS
20220030022 · 2022-01-27 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.