Patent classifications
H04W12/66
Data communication system to selectively and securely couple distributed ledgers with artificial intelligence (AI) engines
A data communication system generates Artificial Intelligence (AI) responses to distributed ledger data. In the data communication system, ledger clients discover distributed ledgers and establish hardware-trust with the distributed ledgers. The ledger clients discover AI engines and establish hardware-trust with the AI engines. The ledger clients read ledger information from the top data blocks of the distributed ledgers and select top-block ledger information. The ledger clients select AI engines to receive the selected top-block ledger information and transfer the selected ledger information to the selected AI engines. The selected AI engines process the selected top-block ledger information and generate the AI responses.
CONVEYANCE OF STIR/SHAKEN ATTESTATION LEVELS USING CARRIER CODE
The present disclosure describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed. Determining the attestation level comprises comparing information associated with the communication with stored information and assigning a code based on the comparison. The code may be translated to a tag value that is used to direct the communication to a signing server for attesting the communication at the determined attestation level.
Device for wireless communication with other devices
A device (110) arranged for wireless communication (130) according to a communication protocol has a processor (112) to execute a connection sequence according to a discovery protocol. The connection sequence comprises determining a current cluster identity and a current discovery window timing used by the device. Next, at least one other device (120,120′) within wireless range is detected, while further determining a detected cluster identity and a detected discovery window timing of the detected other device. Then it is detected whether the detected device is operating in a different cluster than the device by comparing the current cluster identity with the detected cluster identity or comparing the current discovery window timing with the detected discovery window timing. Finally, upon detecting said different cluster, a security process is executed, which may warn the user or abort the connection sequence. Thereby, a malicious device trying to manipulate the connection sequence is detected.
Method and system for reduced V2X receiver processing load using network based application layer message processing
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
Intelligent attestation of traffic using a routing engine
The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.
Systems and methods of executing a chain of trust with an embedded controller to secure functionalities of an integrated subscriber identification module (iSIM)
A method of securing functionalities of an integrated subscriber identification module (iSIM) on an information handling system may include with an embedded controller (EC), detecting a powering-up process at the information handling system and determine a chain of trust access keys during bootup; with the execution of the EC, detecting and activating a wireless wide area network (WWAN) module; with the execution of the EC, detecting and accessing an integrated subscriber identity module (iSIM); with the execution of the EC, authenticating access to iSIM content including authorization information and carrier profile information with the chain of trust access keys generated from encryption keys based on digital signatures; and sending the authorization information and carrier profile information form the iSIM to the WWAN module for authentication, wirelessly, with a switched multimegabit data service (SM-DS) server associated with the carrier profile.
TRANSMITTING PARAMETERS TO A COMMUNICATIONS DEVICE RESPONSIVE TO DIGITIZATION OF A MACHINE-READABLE CODE FROM A TANGIBLE OBJECT
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, via a communications network, one or more signals representing an indication of value encoded utilizing a machine-readable code available at a tangible object. The communications network may additionally obtain one or more signals representing an identifier of a communications device. The communications device may be authenticated based, at least in part, on the one or more signals representing the identifier. One or more signals that represent a complement of subscriber-specific parameters may be transmitted in response to the authenticating.
MULTI-FACTOR AUTONOMOUS SIM LOCK
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Confidence based network provisioning of devices
Techniques for establishing a data connection are described. In an example, a computer system receives, from a second device of a computer network, first data associated with a first device and second data associated with the second device. The first device is not connected to the computer network. The computer system determines third data generated by one or more devices other than the first device and the second device and associated with at least one of: the first device, the second device, a user account, or the computer network. The computer system generates, based on the first data, the second data, and the third data, a confidence score indicating a likelihood of a user authorization to connect the first device to the computer network. The computer system sends, to the second device based on the confidence score, instructions associated with connecting the first device to the computer network.
MULTI-LINK WIRELESS COMMUNICATIONS CONNECTIONS
A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.