Patent classifications
H04W12/66
Network slice access control method and apparatus
The present disclosure relates to network slice access control methods. One example method includes receiving, by an access and mobility management function network element, first information from a session management function network element, where the first information is associated with an authentication failure of a network slice, and sending, by the access and mobility management function network element, second information to a terminal device based on the first information, where the second information is used to reject access of the terminal device to the network slice.
Voice-based time-sensitive task processing over a high generation cellular network
Aspects of the disclosure relate to voice-based time-sensitive task processing over a high generation cellular network. A computing platform may establish a communication channel with a computing device. The computing platform may authenticate a user of the computing device, where the user is authorized to access the enterprise server. Then, the computing platform may detect, via the communication interface, a voice-based interaction from the authenticated user. The computing platform may cause the voice-based interaction to be captured as audio data. Subsequently, the computing platform may transform the audio data to textual data. The computing platform may analyze the textual data to identify a time-sensitive task related to an entity. Then, the computing platform may generate, based on the identified time-sensitive task, one or more instructions to execute the time-sensitive task. Subsequently, the computing platform may send, to an enterprise server, the one or more instructions to execute the time-sensitive task.
METHODS AND SYSTEMS FOR 5G SLICING BASED ON DYNAMIC SECURITY PROPERTIES
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
System and process for locking a subscriber identity module (SIM) card to a wireless device
The disclosure is directed to a device configured to implement a SIM lock to control network access associated with a wireless device. The device including a processor configured to interrogate a host wireless device and obtain a host wireless device identification from the host wireless device. The processor further configured to retrieve from a memory a stored wireless device identification, determine if a host wireless device identification matches the stored wireless device identification, prevent access of the host wireless device to network wireless services if the host wireless device identification does not match the stored wireless device identification, and enable access of the host wireless device to network wireless services if the host wireless device identification matches the stored wireless device identification. An associated process is also disclosed.
MOBILITY MANAGEMENT METHOD AND DEVICE
A mobility management method includes: obtain a terminal a first position of a terminal from a geo-synchronous orbit (GEO) positioning satellite; the terminal searches for a first communication calendar according to the first position, and determines a network connection mode of the terminal; when it is determined that the network connection mode is an NGSO satellite connection, the terminal accesses a network by means of a first NGSO satellite and sends, by means of the first NGSO satellite, a first request message carrying the first position to the network.
DETECTING MISTRUSTED USER EQUIPMENT (UE) IN SIDELINK
Aspects relate to techniques for enabling a UE to detect a potential mistrusted UE that may be sharing inaccurate sidelink assistance information with other UEs. In an aspect, a first UE may receive a plurality of sidelink assistance information from other UEs. The first UE can further identify an amount of the plurality of sidelink resources for which a second UE provides respective inconsistent sidelink assistance information with respect to other UEs. In response to the amount exceeding a mistrust detection threshold, the first UE can transmit a report indicating that the second UE is a potential mistrusted UE to a centralized node. Based on the received reports associated with the second UE, the centralized node can transmit a mistrust indication indicating that the second UE is an actual mistrusted UE with respect to subsequent sidelink assistance information associated with the second UE.
Vehicle system for sharing information among smart vehicles
A smart car system that exchanges information between different vehicles. An embodiment exchanges information one for the other. Another embodiment determines or sends information from one vehicle to the other, and then receives information from a different vehicle and keeps a score of a ratio between the amount of information that is set in an amount of information received. The information is checked for trust.
CONDUCTING SECURE INTERACTIONS UTILIZING RELIABILITY INFORMATION
Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.
Establishing Trust With Network Device
Systems, apparatuses, and methods are described for establishing, or re-establishing, trust for a network device. A user device may send, via a network device, a service request to establish trust for the network device in a network. The service request may comprise, or may allow look up of, identifying information for the network device, such as a network address. Trust of the network device may be established, at least in part, by confirming the network address (or other identifying information) associated with the network device, and/or by confirming certain devices that are in communication with the network device. An authentication token may be sent to the network device for reconnecting to the network.
COMPLEX COMPOSITE TOKENS
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first partner actor is received that includes the first token, and in response, the first partner actor is linked to the subject client in a trust stack and a second token is sent to the first actor with second permissions, the second token identifying the subject client and the first partner actor. A third request from a second partner actor is received that includes the second token, and in response, the second partner actor is linked to the first partner actor in the trust stack and a third token is sent to the second partner actor with third permissions, the third token identifying the first partner actor and the second partner actor.