KEY DELEGATION FOR CONTROLLING ACCESS

    公开(公告)号:US20220230490A1

    公开(公告)日:2022-07-21

    申请号:US17714843

    申请日:2022-04-06

    申请人: ASSA ABLOY AB

    摘要: It is provided a method for controlling access to an access object. The method is performed in an electronic key device and comprises the steps of: communicating with an access control device to obtain an identity of the access control device; sending an access request to a server, the access request comprising an identity of the electronic key device and the identity of the access control device; receiving a response from the server, the response comprising a key delegation to the electronic key device; and sending a grant access request to the access control device, the grant access request comprising the key delegation, to allow the access control device to evaluate whether to grant access to the access object based on a plurality of delegations comprising a sequence of delegations.

    AUTHORIZATION IN CELLULAR COMMUNICATION SYSTEMS

    公开(公告)号:US20220217539A1

    公开(公告)日:2022-07-07

    申请号:US17568144

    申请日:2022-01-04

    摘要: According to an example aspect of the present invention, there is provided an apparatus comprising means for receiving, by a network function configured to provide centralized user consent authorization in a cellular communication system, a user consent authorization request from a logical network entity, wherein the user consent authorization request comprises an identity of at least one user equipment whose user consent is requested by the logical network entity, the logical network entity being a network function service consumer or an application function, means for retrieving user consent information concerning the at least one user equipment whose user consent is requested by the logical network entity, wherein said user consent information indicates individually whether the logical network entity is authorized to access data related to each of the at least one user equipment, means for determining, based on said user consent information, whether the logical network entity is authorized to access data related to each of the at least one user equipment and means for transmitting, based on said determination, a response signed by the network function to the logical network entity.

    ONBOARD VEHICLE DIGITAL IDENTIFICATION TRANSMISSION

    公开(公告)号:US20220217134A1

    公开(公告)日:2022-07-07

    申请号:US17701163

    申请日:2022-03-22

    摘要: A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.

    SECURITY SYSTEM FOR INMATE WIRELESS DEVICES

    公开(公告)号:US20220210257A1

    公开(公告)日:2022-06-30

    申请号:US17576282

    申请日:2022-01-14

    摘要: A layered security suite is disclosed wherein multiple security barriers that prevent the unsanctioned use of a mobile device issued by a controlled-environment facility. The security barriers are implemented along multiple points within the communication path between the mobile device with outside networks, including on the mobile device, on wireless access points that serve data traffic for the mobile device, and a firewall device that monitors all data coming to and from the wireless access points. The barriers on the mobile device prevent the user from performing unsanctioned application and settings changes, including both software and hardware components, while the barrier on the wireless access point detects and prevents unauthorized connections between mobile devices and unsanctioned wireless access points. The firewall device discards packets with unsanctioned internet addresses. The layers work in concert to prevent all manner of tampering with the mobile device by members of the controlled-environment facility.

    TRUSTED SOLUTIONS FOR ENABLING USER EQUIPMENT BELONGING TO A HOME NETWORK TO ACCESS DATA COMMUNICATION SERVICES IN A VISITED NETWORK

    公开(公告)号:US20220191697A1

    公开(公告)日:2022-06-16

    申请号:US17606335

    申请日:2019-04-25

    摘要: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network. The method also comprises cryptographically signing the obtained and signed token by a private key associated with the user equipment to generate a double-signed token, and sending the double-signed token to a network node of the visited network, which validates the double-signed token for enabling the user equipment to access data communication services via the user data transport functions of the visited network.

    User-authorized onboarding using a public authorization service

    公开(公告)号:US11337070B2

    公开(公告)日:2022-05-17

    申请号:US16613741

    申请日:2018-01-11

    申请人: Intel Corporation

    摘要: Various systems and methods for user-authorized onboarding of a device using a public authorization service (310) are described herein. In an example, a 3-way authorization protocol is used to coordinate device onboarding among several Internet of Things (IoT) Fog users (e.g., devices in a common network topology or domain) with principles of least privilege. For instance, respective onboarding steps may be assigned for performance by different Fog ‘owners’ such as respective users and clients (350A, 350B, . . . , 350N). Each owner may rely on a separate authorization protocol or user interaction to be notified of and to give approval for the specific onboarding action(s) assigned. Further techniques for implementation and tracking such onboarding actions as part of an IoT network service are also disclosed.

    Wireless Gateway Supporting Public and Private Networks

    公开(公告)号:US20220141755A1

    公开(公告)日:2022-05-05

    申请号:US17526803

    申请日:2021-11-15

    摘要: An interface device may provide a first wireless network and a second wireless network in a user's premise. The interface device may encourage some user devices to connect to the second wireless network without controlling the user devices. For example, the interface device may receive a request from a device to access its first wireless network. The interface device may then determine whether the device is a premise device by, for example, searching a database of device registration information. The interface device may determine that the device is a premise device and deny the request to access the first wireless network. The device may then be available to access the second wireless network.

    Multi-device transaction verification

    公开(公告)号:US11238457B2

    公开(公告)日:2022-02-01

    申请号:US16681692

    申请日:2019-11-12

    摘要: When a user enters a resource provider location with a portable communication device, the portable communication device provides an indication to a transaction processing system that the portable communication device is currently at the resource provider location. At a later time when the user conducts a transaction with a portable transaction device, the fact that the user's portable communication device had been detected at the resource provider a short time ago is taken into account as a positive indicator that the transaction is not fraudulent. By verifying that both the portable communication device and the portable transaction device are present at the resource provider, the risk of approving a fraudulent transaction from a stolen portable transaction device can be reduced.