Patent classifications
H04W12/66
Review recordation and evaluation systems and methods
A computer-implemented system and method for generating and displaying an authority score through a software application executed by a process or a computing device. The processor may receive visit data indicative of a user's presence and review data describing an entity at a location. The processor may determine an authority score for the review data and perform a calculation using at least a portion of the visit data as at least one input. The processor may generate and cause a visual indication of the authority score to be displayed by a display device.
SECURE CHANNEL FORMATION USING EMBEDDED SUBSCRIBER INFORMATION MODULE (ESIM)
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.
Selecting a non-3GPP access network
Apparatuses, methods, and systems are disclosed for selecting a non-3GPP access network. One apparatus includes a processor and a transceiver for communicating with one or more non-3GPP access networks. The processor creates a first list of available PLMNs connectable via non-3GPP access networks. Here, the first list indicates one or more trusted connectivity types supported for each PLMN. The processor selects a first PLMN and a first connectivity type supported by the first PLMN. The processor creates a second list of available non-3GPP access networks. The processor selects a highest priority available non-3GPP network that supports the first connectivity type to the first PLMN. The processor begins a connectivity procedure with the first PLMN using the first connectivity type over the selected non-3GPP access network.
Wireless communication device management
A system, for managing wireless devices within a restricted area is disclosed, wherein the system constructs models, containing attributes/characteristics and at least prior history data information associated with wireless devices, wherein the information is used to determine whether the wireless devices are allowed to operate within the area by the device responding to a plurality of inquiries that require the device and/or the user to provide information which is compared to the modeled data.
Fake base station detection
A mobile device collects received information and processes it. In some instances, the mobile device detects, based on the collected information, that a base station is likely not legitimate, i.e., it is likely a fake base station, and the mobile device bars communication with the base station for a time. In some embodiments, the mobile device determines, based on the received information, that the base station is a genuine base station. When the mobile device determines that the base station is a genuine base station or the mobile device does not determine that it is likely the base station is a fake base station, the mobile device allows or continues communication with the base station.
COMPLEX COMPOSITE TOKENS
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.
SOURCE DATA SECURED ON BLOCKCHAINS
Technologies are shown for secure management of evaluation data. An evaluation value is received from a source entity. The evaluation value relates to an evaluation entity. Trusted source data secured in one or more data blocks on a first blockchain is searched for an entry corresponding to the source entity. Based on finding the entry corresponding to the source entity in the trusted source data, an evaluation score for the evaluation entity is obtained from the first blockchain or a second blockchain. The evaluation score was previously calculated based on one or more previous evaluation values for the evaluation entity and stored on the first blockchain or the second blockchain. A new evaluation score for the evaluation entity is calculated using the evaluation score and the evaluation value. The new evaluation score for the evaluation entity is securely committed to a new data block on the first blockchain or the second blockchain.
Local IMS selection for trusted network operators
A first carrier may support inbound roaming requests for subscribers of a trusted second carrier. For example, the first carrier may receive an inbound roaming request from a UE. The first carrier may determine a second carrier that is a home carrier of the UE is a trusted carrier associated with the first carrier. In response, an IMS procedure associated with the UE may be performed including communicating, by a first CSCF node of the first carrier, with a first HSS of the second carrier, using a same protocol as used by the first CSCF node to communicate with a second HSS of the first carrier and communicating, by the first CSCF node, with a first AS of the second carrier, using a same protocol as used by the first CSCF node to communicate with a second AS of the first carrier.
SECURING COMMUNICATION OF DEVICES IN THE INTERNET OF THINGS
It is recognized herein that current messaging protocols for internet of things (IoT) architectures are often weak from a security perspective, and are often poorly suited for resource-constrained devices. An example IoT system described herein combines device authentication and application-layer key establishment using facilities of IoT messaging protocols. The IoT system may include a Trust Broker, which acts as a registration point for devices, and an edge gateway, which manages communication between a given device and the trust broker (and IoT servers). The edge gateway may acquire a trusted role, such that it may be a secure intermediary for device-server messaging, and such that it can facilitate authentication of devices to services.
Method for joining a Zigbee device to a Zigbee network and corresponding Zigbee device
A method for joining a Zigbee device to a Zigbee network, includes starting a Zigbee protocol stack and a Bluetooth protocol stack on the Zigbee device, sending out Zigbee requests to seek for Zigbee networks, sending out Bluetooth beacon messages containing a Zigbee install code, wherein the Zigbee requests and the Bluetooth beacon messages are sent out in a time division multiplex manner.