H04W12/66

Method, device and system for utilizing block chain to define trusted circle

A method for utilizing a block chain infrastructure to define a trusted circle including at least two nodes of a plurality of nodes, the method includes receiving, by a first node, notification information identifying a trusted user circle including the first node and a second node, wherein the first node and the second node are configured to define a private block chain; and maintaining private block chain data within the trusted user circle according to pre-defined settings, wherein the private block chain data is divided between nodes of the trusted user circle based on the pre-defined settings.

Method and communication device for determining a score relating to a first agent module

A method and a communication device for determining a score relating to a first agent module are described. The communication device receives information relating to at least one request, performed by another agent module separate from the first agent module, for consumption of a capability of the first agent module. The information relating to the at least one request includes information about the capability of the first agent module, information about an intention of the first agent module, and information about a policy for the capability. The communication device calculates the score in relation to the first agent module based on the information relating to the at least one request, wherein the score further is specified with respect to the capability.

Mitigating fake cell imprisonment

In various embodiments, a wireless device processor may determine a threat score for a first cell, determine whether the first cell threat score is below a first threat score threshold, update a good neighbor cell data structure using neighbor cell information from the first cell in response to determining that the first cell threat score is below the first threat score threshold, performing cell reselection to a second cell, determine whether the second cell transmits a system information block message indicating fake neighbor cell information, and increase a threat score for the second cell in response to determining that the second cell provides the SIB message indicating fake neighbor cell information and that a good neighbor cell data structure includes an indication of one or more good neighbor cells that are within the time threshold and the location threshold and doing countermeasures in a response to the determination.

COMMUNICATION METHOD AND APPARATUS FOR TRUSTED OR UNTRUSTED RELAY, TERMINAL, AND NETWORK SIDE DEVICE
20230328532 · 2023-10-12 · ·

A communication method and apparatus for a relay, a terminal, and a network side device are provided. The communication method includes: receiving, by first user equipment (UE), relationship information delivered from a network side, where the relationship information is used to indicate a trust relationship of the first UE; receiving, by the first UE, identification information sent by second UE; and based on the relationship information and the identification information, performing, by the first UE, relay connection or relay communication with the second UE, or refusing, by the first UE, to perform relay connection or relay communication with the second UE.

Detecting mistrusted user equipment (UE) in sidelink

Aspects relate to techniques for enabling a UE to detect a potential mistrusted UE that may be sharing inaccurate sidelink assistance information with other UEs. In an aspect, a first UE may receive a plurality of sidelink assistance information from other UEs. The first UE can further identify an amount of the plurality of sidelink resources for which a second UE provides respective inconsistent sidelink assistance information with respect to other UEs. In response to the amount exceeding a mistrust detection threshold, the first UE can transmit a report indicating that the second UE is a potential mistrusted UE to a centralized node. Based on the received reports associated with the second UE, the centralized node can transmit a mistrust indication indicating that the second UE is an actual mistrusted UE with respect to subsequent sidelink assistance information associated with the second UE.

Method and device for requesting remote service

The present application provides a method, device, and system for requesting remote services. The method includes determining, by one or more processors, a special request frame, the special request frame comprising an extensible field, the extensible field comprising remote service request information, and the special request frame being a frame for terminal-access point mutual discovery according to a communication protocol for communication between a terminal and an access point, communicating the special request frame to an access point, and obtaining, by the one or more processors, information pertaining to a remote service provided by a service, the information pertaining to the remote service being based at least in part on the remote service request information.

System and Method for Trustworthy Internet Whitelists
20230319046 · 2023-10-05 ·

Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.

Trusted client security factor-based authorizations at a server

Trusted client security factor-based authorizations at a server. The techniques allow the server to authorize client requested operations to access a protected resource or service based on trusted client security factors that are obtained at client machines and provided to the server.

SYSTEMS AND METHODS FOR DETECTING MISBEHAVIOR BEHAVIOR AT AN AUTONOMOUS DRIVING SYSTEM

An automated driving system (ADS) of an autonomous vehicle includes a communication module, a perception module, a misbehavior detection module, and a processor. The communication module is configured to receive a vehicle-to-vehicle (V2V) message comprising message-based vehicle data. The perception module configured to receive sensor data from at least one vehicle sensing device. The misbehavior detection module is configured to determine whether the V2V message is one of a legitimate message and a malicious message based at least in part on a comparison of the message-based vehicle data with sensor-based vehicle data generated based on the sensor data. The processor is configured to manage performance of the autonomous vehicle in accordance with the message-based vehicle data based on the determination. Other embodiments are described and claimed.

Complex composite tokens
11758406 · 2023-09-12 · ·

Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.