-
公开(公告)号:US20230354008A1
公开(公告)日:2023-11-02
申请号:US17732917
申请日:2022-04-29
Applicant: Verizon Patent and Licensing Inc.
Inventor: Warren Hojilla Uy , Thomas W. McArtney , Taussif Khan , Alexandre De Melo , Mary Williams
CPC classification number: H04W8/183 , G06Q20/3229 , G06Q20/347
Abstract: A method, a device, and a non-transitory storage medium are described in which a third party subscription management of end device profiles service is provided. The service may include obtaining a profile for a card of an end device from a third party device in which the profile includes a temporary element. For example, the temporary element may be a temporary keyset or a temporary USIM. During initial connectivity and activation with a core network, the card logic may obtain and update the profile with a permanent element for registration and activation procedures with the core network. In this way, security exposure with a third party device relating to a profile may be eliminated or minimized.
-
公开(公告)号:US20220368521A1
公开(公告)日:2022-11-17
申请号:US17321378
申请日:2021-05-14
Applicant: Verizon Patent and Licensing Inc.
Inventor: John M. Stokes , Manuel Enrique Caceres , Young Rak Choi , Warren Hojilla Uy , Mun Wei Low , Dayong He
Abstract: A system described herein provide for the secure maintaining and providing of information, such as public keys used in Public Key Infrastructure (“PKI”) techniques or other techniques, using a secure distributed ledger (e.g., “blockchain”) system. A blockchain system may be utilized in lieu of a key escrow system in the exchange and/or providing of public keys in a Diffie-Hellman key exchange technique or other type of technique in which public keys are provided from one entity to another. A first entity may generate an asymmetric key pair that includes a public key and a private key, and may provide the public key to a blockchain system for retrieval by one or more other entities. For example, the entities may be engaged in a secure messaging session, in which messages are encrypted and may be decrypted using one or more keys, including the public key.
-
公开(公告)号:US11477036B2
公开(公告)日:2022-10-18
申请号:US16947848
申请日:2020-08-20
Applicant: Verizon Patent and Licensing Inc.
Inventor: Manuel Enrique Caceres , Bruno Mendez , Mauricio Pati Caldeira De Andrada , Warren Hojilla Uy , Young R. Choi
Abstract: A device receives, from an application, a request to access an attestation key stored in a secure element of the device. The device obtains an attestation policy, by which to verify an identity of the application. The device examines an application file associated with the application, to determine whether the application file satisfies the attestation policy. The device selectively generates a temporary key based on a result of examining the application file. The temporary key may be used to access the attestation key. The temporary key may be generated based on the application file satisfying the attestation policy, and may not be generated based on the application file not satisfying the attestation policy.
-
公开(公告)号:US11445374B2
公开(公告)日:2022-09-13
申请号:US16949956
申请日:2020-11-20
Applicant: Verizon Patent and Licensing Inc.
Inventor: Warren Hojilla Uy , Mun Wei Low , Young Rak Choi , Manuel Enrique Caceres , Taussif Khan
Abstract: A first user device may provide, to a provisioning device, a request for a subscriber identity module (SIM) swap that causes provisioning data to be provided to a first SIM card of the first user device and from a second SIM card of a second user device. The first user device may generate a first encrypted token based on a first identifier associated with the first SIM card. The first user device may provide, to the provisioning device, the first encrypted token and a user identifier. The first user device may selectively receive the provisioning data when the first encrypted token matches a second encrypted token generated by the second user device based on a second identifier associated with the second SIM card, or receive a message indicating that the first user device cannot be provisioned, when the first encrypted token fails to match the second encrypted token.
-
公开(公告)号:US11444788B2
公开(公告)日:2022-09-13
申请号:US16847082
申请日:2020-04-13
Applicant: Verizon Patent and Licensing Inc.
Inventor: Warren Hojilla Uy , Young R. Choi , Manuel Enrique Caceres , Emilia C. Quijano
IPC: H04L9/32 , H04L9/40 , G06F16/245 , H04W76/10 , H04L41/22 , H04W12/06 , H04W12/069 , H04L61/50 , H04L101/622
Abstract: A method or system for authentication and access control in for network device management is disclosed. The method or system may include establishing a communication channel between a user device and a network device and receiving, by the network device, a public-key certificate including a specified identity of the user device. The method or system may include determining whether the public-key certificate is valid against a root certificate stored in the network device, and determining an actual identity of the user device. The method or system may include indicating that the user device is authentic and authorized when the received public-key is valid against the root certificate and when the actual identity of the user device matches the specified identity in the public-key certificate.
-
公开(公告)号:US11388594B2
公开(公告)日:2022-07-12
申请号:US16191130
申请日:2018-11-14
Applicant: Verizon Patent and Licensing Inc.
Inventor: Warren Hojilla Uy , Young R. Choi , Samirkumar Patel
IPC: H04L9/08 , H04L9/30 , H04L9/32 , H04L9/40 , H04W12/06 , H04W12/04 , H04W12/08 , H04W76/10 , H04W84/12 , H04W92/20 , H04W12/069
Abstract: A first wireless access device, associated with a wireless service provider, establishes a wireless local area network connection with a second wireless access device and receives a certificate including a unique identifier associated with the second wireless access device. The first wireless access device determines whether the second wireless access device is authorized to connect to the first wireless access device. For example, if the certificate is signed by a certificate authority associated with the wireless service provider and the unique identifier appears in a whitelist stored at the first wireless access device, the first wireless access device and the second wireless access device perform a mutual authentication procedure based on one or more ephemeral keys. The first wireless access device provides the second wireless access device with access to a wide area network based on successful completion of the mutual authentication procedure.
-
公开(公告)号:US11166211B2
公开(公告)日:2021-11-02
申请号:US16506278
申请日:2019-07-09
Applicant: Verizon Patent and Licensing Inc.
Inventor: Manuel Enrique Caceres , Taussif Khan , Warren Hojilla Uy , Mauricio Pati Caldeira de Andrada
Abstract: Systems, methods, and computer-readable media described herein provide for obtaining, mobility information associated with an end device, wherein the mobility information includes a starting location and a destination location; identifying multiple mobility routes from the starting location to the destination location; identifying a set of wireless resources accessible along each of the mobility routes; selecting, from the multiple mobility routes, a predetermined mobility route based on the sets of wireless resources; selecting, from the sets of wireless resources, wireless resources handover targets in the predetermined mobility route; generating mobility control information including the set of wireless station handover targets; and transmitting a mobility control message including the mobility control information to the end device and at least one of wireless resources handover targets.
-
公开(公告)号:US20210320807A1
公开(公告)日:2021-10-14
申请号:US16847082
申请日:2020-04-13
Applicant: Verizon Patent and Licensing Inc.
Inventor: Warren Hojilla Uy , Young R. Choi , Manuel Enrique Caceres , Emilia C. Quijano
Abstract: A method or system for authentication and access control in for network device management is disclosed. The method or system may include establishing a communication channel between a user device and a network device and receiving, by the network device, a public-key certificate including a specified identity of the user device. The method or system may include determining whether the public-key certificate is valid against a root certificate stored in the network device, and determining an actual identity of the user device. The method or system may include indicating that the user device is authentic and authorized when the received public-key is valid against the root certificate and when the actual identity of the user device matches the specified identity in the public-key certificate.
-
公开(公告)号:US10965643B2
公开(公告)日:2021-03-30
申请号:US16423823
申请日:2019-05-28
Applicant: Verizon Patent and Licensing Inc.
Inventor: Andrew Youtz , Warren Hojilla Uy , Siegfried Erhard Eichinger , James Mathison , Christopher M. Schmidt
Abstract: A computer device may include a memory configured to store instructions and a processor configured to execute the instructions to select to use an access point name (APN) table to be received from a wireless access network and attach to the wireless access network. The processor may be further configured to execute the instructions to receive a Protocol Configuration Options (PCO) message from the wireless access network; retrieve the APN table from the received PCO message; select an APN from the retrieved APN table; and connect to a packet data network associated with the selected APN via the wireless access network using the selected APN.
-
公开(公告)号:US10778444B2
公开(公告)日:2020-09-15
申请号:US16032994
申请日:2018-07-11
Applicant: Verizon Patent and Licensing Inc.
Inventor: Manuel Enrique Caceres , Bruno Mendez , Mauricio Pati Caldeira De Andrada , Warren Hojilla Uy , Young R. Choi
Abstract: A device receives, from an application, a request to access an attestation key stored in a secure element of the device. The device obtains an attestation policy, by which to verify an identity of the application. The device examines an application file associated with the application, to determine whether the application file satisfies the attestation policy. The device selectively generates a temporary key based on a result of examining the application file. The temporary key may be used to access the attestation key. The temporary key may be generated based on the application file satisfying the attestation policy, and may not be generated based on the application file not satisfying the attestation policy.
-
-
-
-
-
-
-
-
-