H04W12/66

SYSTEMS AND METHODS FOR SEAMLESSLY CONNECTING DEVICES BASED ON RELATIONSHIPS BETWEEN THE USERS OF THE RESPECTIVE DEVICES
20220368968 · 2022-11-17 ·

Systems and methods are described for seamlessly connecting devices based on relationships between the users of the respective devices. A media guidance application may determine that a first user has entered an environment (e.g., his/her mother's home) and may determine a frequency with which the first user enters the environment (e.g., daily). In response to determining that the first user visits frequently, the media guidance application may identify a second device in the environment (e.g., a smart TV) that a second user (e.g., the first user's mother) is authorized to grant access rights for. The media guidance application may determine a likelihood that the second user will grant the access rights for the second device to the first user, based on interaction data between the first user and the second user. In response to determining a high likelihood, the media guidance application may transmit the access rights.

SECURE AND TRUSTED DATA COMMUNICATION SYSTEM

A method includes obtaining, by a secure data conveyance device of a data communication system, information pertaining to a data conveyance between a user computing device and a target computing entity. The data conveyance involves the user computing device providing data in a first format and the target computing entity accepting data in a second format. The information includes an amount of the data in the first format. The secure data conveyance device stores the data in the first format on behalf of the user computing device. The method further includes converting the amount of the data in the first format to an amount of data in the second format via a secure data conversion process where the amount of data in the second format is only usable by the target computing entity, and providing the amount of data in the second format to the user computing device.

EGO ACTIONS IN RESPONSE TO MISBEHAVING VEHICLE IDENTIFICATION

Systems, apparatus, methods, and techniques for an ego vehicle to respond to detecting misbehaving information from remote vehicles are provided. An ego vehicle, in addition to reporting misbehaving vehicles to a misbehavior authority via a vehicle-to-anything communication network, can, take additional actions based in part on how confident the ego vehicle is about the evidence of misbehavior. Where the confidence is high the ego vehicle can simply discard the misbehaving data and provide an alternative estimate for such data from alternative sources. Where the confidence is not high the ego vehicle can request assistance from neighboring vehicles and roadside units to provide independent estimates of the data to increase confidence in the evidence of misbehavior.

System and methods of sending and receiving a relay notification

A system for sending a relay notification comprises a transceiver and a processor. The processor is configured to use the transceiver to receive a request for allowing a mobile device to be used by a further mobile device as a relay to a mobile communication network. The processor is further configured to determine whether the mobile device is to act as a relay for the further mobile device based on the unique identifier of the further mobile device, and to use the transceiver to notify the mobile device that it is to act as a relay for the further mobile device in dependence on the determination. The mobile device is configured to receive the notification from the system. The processor is further configured to start relaying data received from the further mobile device to the mobile communication network upon receiving the notification.

System and method for enabling and verifying the trustworthiness of a hardware system

To determine whether an IoT system connected with a network environment (e.g., the internet) is compromised, a networked Trust as a Service (TaaS) server receives system data indicative of various characteristics of the IoT system, wherein the system data is harvested by a software agent installed on the IoT system. The TaaS server initially establishes a baseline characteristics profile for the IoT system, such that subsequently received system data from the software agent may be compared against the baseline characteristics profile to quickly identify discrepancies between the originally established baseline characteristics profile and current operating characteristics of the system. Such discrepancies may be caused by desirable software updates, in which case the discrepancies may be integrated into the baseline characteristics profile, or the discrepancies may result from the IoT system being undesirably compromised.

Intuitive resource management platform

A system for making specified resource management services available to a user through a mobile application and/or online portal based on the user's determined level of resource management competency. Further, an intuitive platform for resource management is provided that can provide instinctual guidance throughout the entire lifecycle of a user's engagement with the resource management entity, including but, not limited to, onboarding, providing services to the users, allowing the user to conduct resource interactions and the like.

Secure and trusted data communication system

A method includes storing, by a secure data conveyance device, a certified data object for a user computing device. The method further includes receiving a request from the user computing device that at least a portion of the certified data object be conveyed to a target computing entity. When authenticated, the method further includes data translating the at least a portion from a first data representation into a universal data representation, sending the universal data representation to a trusted data securing device, and data translating the universal data representation into a specific data representation. The method further includes sending the specific data representation to the secure data conveyance device, where the secure data conveyance device adds an expiration time frame and forwards it to user computing device. The method further includes conveying, by the user computing device, the specific data representation with the expiration time frame to target computing entity.

METHOD FOR GUARANTEEING RELIABILITY OF PACKET AND APPARATUS USING THE SAME IN SYNCHRONOUS WIRELESS DISTRIBUTED COMMUNICATION SYSTEM

Disclosed herein are a method for ensuring trustworthiness of a packet in a distributed synchronous wireless communication system and an apparatus using the method. The method, performed by terminals and an apparatus for checking the trustworthiness of a packet, includes: transmitting, by a first terminal, a packet including a trust field to a second terminal using distributed wireless communication; receiving, by a third terminal, the packet from the first terminal; requesting, by the third terminal, checking of trustworthiness by delivering the packet and information about the packet reception time to the apparatus; checking, by the apparatus, the trustworthiness of the packet using the trust field and the information about the packet reception time; generating, by the apparatus, a trust result notification packet when the result of checking the trustworthiness indicates that the packet is untrusted; and transmitting, by the apparatus, the trust result notification packet to the second terminal.

Using PKI for security and authentication of control devices and their data

Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.

System and method for rapid check-in and inheriting trust using a mobile device
11252573 · 2022-02-15 · ·

A system and method for rapid check-in and inheriting trust using a user entity device. The system and method described herein allows an identity to be continuously proven because of user entity's behavior and their biometrics. With all the fraud and risk that exists today, if someone has a user entity's driver's license they can do a lot of harm. By tying a user entity's identity to their user entity device (e.g., a mobile smartphone), then when a user entity checks into a location (e.g., airport, hotel, bank), an identity provider continues a process of continuous authentication while the user entity device travels about a location and interacts with the services offered by the location.