-
公开(公告)号:US20220230490A1
公开(公告)日:2022-07-21
申请号:US17714843
申请日:2022-04-06
申请人: ASSA ABLOY AB
发明人: Frans LUNDBERG , Peter STENLUND
IPC分类号: G07C9/00 , H04L9/40 , H04L9/32 , H04W12/084
摘要: It is provided a method for controlling access to an access object. The method is performed in an electronic key device and comprises the steps of: communicating with an access control device to obtain an identity of the access control device; sending an access request to a server, the access request comprising an identity of the electronic key device and the identity of the access control device; receiving a response from the server, the response comprising a key delegation to the electronic key device; and sending a grant access request to the access control device, the grant access request comprising the key delegation, to allow the access control device to evaluate whether to grant access to the access object based on a plurality of delegations comprising a sequence of delegations.
-
公开(公告)号:US20220217539A1
公开(公告)日:2022-07-07
申请号:US17568144
申请日:2022-01-04
IPC分类号: H04W12/084 , H04W12/02 , H04W12/082 , H04W12/60 , H04W8/18
摘要: According to an example aspect of the present invention, there is provided an apparatus comprising means for receiving, by a network function configured to provide centralized user consent authorization in a cellular communication system, a user consent authorization request from a logical network entity, wherein the user consent authorization request comprises an identity of at least one user equipment whose user consent is requested by the logical network entity, the logical network entity being a network function service consumer or an application function, means for retrieving user consent information concerning the at least one user equipment whose user consent is requested by the logical network entity, wherein said user consent information indicates individually whether the logical network entity is authorized to access data related to each of the at least one user equipment, means for determining, based on said user consent information, whether the logical network entity is authorized to access data related to each of the at least one user equipment and means for transmitting, based on said determination, a response signed by the network function to the logical network entity.
-
公开(公告)号:US20220217134A1
公开(公告)日:2022-07-07
申请号:US17701163
申请日:2022-03-22
发明人: Stephen Miu , Daniel Poder , Yecheng Wu
IPC分类号: H04L9/40 , G06Q50/26 , G09C5/00 , H04L9/32 , H04W12/06 , H04W12/08 , H04W12/062 , H04W12/084
摘要: A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.
-
公开(公告)号:US20220210257A1
公开(公告)日:2022-06-30
申请号:US17576282
申请日:2022-01-14
发明人: Jason MARASS , Brian PETERS , Garth JOHNSON , Stephen Lee HODGE
IPC分类号: H04M1/18 , H04W4/50 , H04W12/08 , H04W12/082 , H04W12/084 , H04W12/088
摘要: A layered security suite is disclosed wherein multiple security barriers that prevent the unsanctioned use of a mobile device issued by a controlled-environment facility. The security barriers are implemented along multiple points within the communication path between the mobile device with outside networks, including on the mobile device, on wireless access points that serve data traffic for the mobile device, and a firewall device that monitors all data coming to and from the wireless access points. The barriers on the mobile device prevent the user from performing unsanctioned application and settings changes, including both software and hardware components, while the barrier on the wireless access point detects and prevents unauthorized connections between mobile devices and unsanctioned wireless access points. The firewall device discards packets with unsanctioned internet addresses. The layers work in concert to prevent all manner of tampering with the mobile device by members of the controlled-environment facility.
-
公开(公告)号:US20220191697A1
公开(公告)日:2022-06-16
申请号:US17606335
申请日:2019-04-25
发明人: Tommy Arngren , Bernard Smeets , Tomas Thyni , Daniel Bergström
IPC分类号: H04W12/084 , H04W12/041 , H04W12/0431 , H04W12/03
摘要: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network. The method also comprises cryptographically signing the obtained and signed token by a private key associated with the user equipment to generate a double-signed token, and sending the double-signed token to a network node of the visited network, which validates the double-signed token for enabling the user equipment to access data communication services via the user data transport functions of the visited network.
-
公开(公告)号:US11337070B2
公开(公告)日:2022-05-17
申请号:US16613741
申请日:2018-01-11
申请人: Intel Corporation
发明人: Nathan Heldt-Sheller , Ned M. Smith
摘要: Various systems and methods for user-authorized onboarding of a device using a public authorization service (310) are described herein. In an example, a 3-way authorization protocol is used to coordinate device onboarding among several Internet of Things (IoT) Fog users (e.g., devices in a common network topology or domain) with principles of least privilege. For instance, respective onboarding steps may be assigned for performance by different Fog ‘owners’ such as respective users and clients (350A, 350B, . . . , 350N). Each owner may rely on a separate authorization protocol or user interaction to be notified of and to give approval for the specific onboarding action(s) assigned. Further techniques for implementation and tracking such onboarding actions as part of an IoT network service are also disclosed.
-
公开(公告)号:US11336333B2
公开(公告)日:2022-05-17
申请号:US16299166
申请日:2019-03-12
申请人: Sony Corporation
发明人: Stephen Tiedemann
摘要: An NFC device comprises a function unit configured to execute a function based on related command code, a storage unit configured to store the command code, a communication unit configured to communicate with another NFC device, and a processing unit configured, if an update of the command code shall be made by the another NFC device, to calculate a checksum over at least part of the command code, to compare the calculated checksum with a checksum received from the another NFC device and to authorize the update if the received checksum matches the calculated checksum.
-
公开(公告)号:US20220141755A1
公开(公告)日:2022-05-05
申请号:US17526803
申请日:2021-11-15
发明人: Sukhjinder Singh , John Carvalho
IPC分类号: H04W48/02 , H04W84/12 , H04L47/10 , H04W12/084 , H04W12/086 , H04W12/088
摘要: An interface device may provide a first wireless network and a second wireless network in a user's premise. The interface device may encourage some user devices to connect to the second wireless network without controlling the user devices. For example, the interface device may receive a request from a device to access its first wireless network. The interface device may then determine whether the device is a premise device by, for example, searching a database of device registration information. The interface device may determine that the device is a premise device and deny the request to access the first wireless network. The device may then be available to access the second wireless network.
-
公开(公告)号:US11265710B2
公开(公告)日:2022-03-01
申请号:US16995503
申请日:2020-08-17
IPC分类号: H04W12/06 , H04L29/06 , H04W8/04 , H04W8/08 , H04W8/24 , G06F21/32 , H04L9/08 , H04W12/084 , H04W60/00
摘要: This document discloses a solution for enabling biometric authentication of a station. According to an aspect, the solution comprises transmitting, from the station, a trigger to include biometric data of a user of the station in authentication; a logic at a network node to handle the trigger and cause execution of an authentication procedure that employs the biometric data when performing said authentication procedure in a wireless access network; and indicating a result of the authentication to the station.
-
公开(公告)号:US11238457B2
公开(公告)日:2022-02-01
申请号:US16681692
申请日:2019-11-12
发明人: Kim Wagner , John F. Sheets , Mark Nelsen , Jing Jin
IPC分类号: G06Q20/40 , G06Q20/32 , H04L29/06 , H04W12/08 , H04W12/06 , H04W12/069 , H04W12/084
摘要: When a user enters a resource provider location with a portable communication device, the portable communication device provides an indication to a transaction processing system that the portable communication device is currently at the resource provider location. At a later time when the user conducts a transaction with a portable transaction device, the fact that the user's portable communication device had been detected at the resource provider a short time ago is taken into account as a positive indicator that the transaction is not fraudulent. By verifying that both the portable communication device and the portable transaction device are present at the resource provider, the risk of approving a fraudulent transaction from a stolen portable transaction device can be reduced.
-
-
-
-
-
-
-
-
-