-
公开(公告)号:US11082459B2
公开(公告)日:2021-08-03
申请号:US16175430
申请日:2018-10-30
Applicant: BlackBerry Limited
Inventor: Jan Hendrik Lucas Bakker , Andrew Michael Allen , Adrian Buckley
IPC: H04L29/06 , H04L29/14 , H04W12/10 , H04L29/12 , H04L29/08 , H04L12/58 , G06F11/20 , G06F3/12 , H04L9/08
Abstract: A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
-
公开(公告)号:US20210235235A1
公开(公告)日:2021-07-29
申请号:US14377083
申请日:2013-02-04
Applicant: Mauro Goldenstein , Rogério Passy , Luiz Victor Passy , Igor Marques Carneiro da Silva
Abstract: The present invention relates to a system for rerouting independent traffic on the networks of the mobile telephony operators, such as the GSM network, as well as the use of methods for user authentication and activation, traffic control and user access on a 3G-traffic rerouting Wi-Fi network. The rerouting Wi-Fi network proposed is independent of the mobile telephony network operators and enables the data traffic rerouting service to be provided to users of several operators simultaneously. The system includes its own database containing user information, obviating the need to consult operator databases. The system proposed also enables a user of operator A to purchase a Wi-Fi data plan from operator B using the International Mobile Subscriber Identity (IMSI) authentication of operator A, thereby obviating the need to replace the SIM card. Access to roaming users, i.e. users outside their native numbering area, is also permitted.
-
公开(公告)号:US11070355B2
公开(公告)日:2021-07-20
申请号:US16024025
申请日:2018-06-29
Applicant: Apple Inc.
Inventor: Li Li , Dennis D. Conway
IPC: H04L29/06 , H04L9/00 , H04L9/14 , H04L9/32 , H04W12/04 , H04L9/08 , H04W12/08 , H04W12/30 , H04W12/37 , H04W12/069 , H04W12/10 , H04W12/40
Abstract: A secure element (SE) determines a profile type and a privilege level. The privilege level, in some embodiments, is associated with a key used successfully by the SE to verify a cryptographic signature. In some embodiments, the privilege level is indicated by a privilege value read from an extension field of a root certificate. The SE determines, in some instances, whether to accept or reject a profile installation after comparing the profile type with the determined privilege level. Thus, a test server is allowed to provision a test profile to an SE even if the test server does not have commercial certification required of an electronic subscriber identity module (eSIM) server that provisions operational profiles. Because the test profile does not include credentials useful for network access, the lower-security test server does not create a risk of improper access to the network of a mobile network operator (MNO).
-
公开(公告)号:US20210219105A1
公开(公告)日:2021-07-15
申请号:US17213911
申请日:2021-03-26
Applicant: Huawei Technologies Co., Ltd.
Inventor: Qiang Fan , Jun Wang , Mingzeng Dai
Abstract: A communications method that meets QoS requirements of services of different communication types, including: an application layer entity of a first terminal device delivers communication type information and a target side identifier to a control layer entity of the first terminal device; the control layer entity of the first terminal device establishes, based on the communication type information, a radio bearer group that is of a sidelink and that corresponds to a communication type, where the radio bearer group of the sidelink corresponds to the target side identifier.
-
公开(公告)号:US20210204134A1
公开(公告)日:2021-07-01
申请号:US16728794
申请日:2019-12-27
Applicant: SIGNIFY HOLDING B.V.
Inventor: Altan Stalker , Peyton Riley
Abstract: A system for identifying an illegitimate communication tag can include a first communication tag that transmits first communication signals, where the first communication signals include a first identification of the first communication tag. The system can also include a second communication tag that transmits second communication signals, where the second communication signals include the first identification. The system can further include electrical devices having receivers that receive the first communication signals and the second communication signals. The system can also include a controller communicably coupled to the electrical devices, where the controller analyzes the first communication signals to generate first information. The controller also updates a table using the first information and analyzes the second communication signals to generate second information. The controller further determines that the second communication tag is illegitimate based on at least one difference between the second information relative to the first information.
-
公开(公告)号:US20210136574A1
公开(公告)日:2021-05-06
申请号:US17033719
申请日:2020-09-26
Applicant: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHO
Inventor: Masateru FURUTA , Shigenori NITTA , Yuki KONO , Yosuke OHASHI
Abstract: [Object] To provide a mechanism that makes it possible to avoid inconveniences when the authentication process has abnormality.
[Solution] A communication device comprising a control section configured to control each of a first process that achieves a prescribed function, and a second process that authenticates another communication device and that is different from the first process, wherein the control section performs control in such a manner that the second process is not performed in a case where abnormality is recognized.-
公开(公告)号:US10979899B2
公开(公告)日:2021-04-13
申请号:US16323498
申请日:2017-08-04
Applicant: TENDYRON CORPORATION
Inventor: Ming Li
IPC: H04L29/06 , H04W12/037 , H04L9/06 , H04W12/06 , H04W12/10
Abstract: The present disclosure relates to a data communication method and system. The method includes: a first terminal continuously generating a communication carrier signal; sending by the first terminal a communication data signal carrying a data packet to be processed, beginning to record the first number of pulses when the first terminal completes sending the data packet to be processed; receiving by the second terminal the communication data signal, beginning to record the second number of pulses when the second terminal completes receiving the data packet to be processed, generating a response data packet sending, by the second terminal, the response data packet to the first terminal when detecting that the second number reaches a pulse number threshold N; and allowing, by the first terminal, to begin receiving the response data packet when detecting that the first number is within a threshold range.
-
公开(公告)号:US10979408B2
公开(公告)日:2021-04-13
申请号:US16744767
申请日:2020-01-16
Applicant: NEC Corporation
Inventor: Xiaowei Zhang , Anand Raghawa Prasad
IPC: H04L29/06 , H04L29/08 , H04L9/08 , H04L9/32 , H04W12/02 , H04W12/04 , H04W76/14 , H04W12/00 , H04W12/10 , H04W76/10 , H04W4/80
Abstract: A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device which sends a request of a communication and a receiving device which receives the request from the requesting device, the method including deriving session keys Kpc and Kpi from an unique key Kp at the requesting and receiving devices, using the session keys Kpc and Kpi for ProSe communication setup and direct communication between the requesting and receiving devices, starting the direct communication with the requesting and receiving devices. The key Kpc is confidentiality key and the key Kpi is integrity protection key.
-
公开(公告)号:US20210103920A1
公开(公告)日:2021-04-08
申请号:US16593311
申请日:2019-10-04
Applicant: Bank of America Corporation
Inventor: Katherine Dintenfass , Maria Carolina Barraza Enciso , Elena Kvochko
Abstract: Aspects of the disclosure relate to a system that provides enhanced security of information transmitted by connected devices. The system may be used to request resources from members of a donee's virtual group. Donated funds or line of credit may be loaded to the donee's digital wallet with no link to any of the donee's personal accounts. The request for resources may utilize secure correspondence between the donee and the prospective donors. The secure correspondence may be locked and prevented from being forwarded or captured via a screenshot to ensure confidentiality. If an attempt is made to forward or copy the secure correspondence, the secure correspondence may be deleted. Donated funds/line of credit may be allocated for specific use, and may not be owned by the donee until used.
-
公开(公告)号:US10972497B1
公开(公告)日:2021-04-06
申请号:US16138957
申请日:2018-09-21
Applicant: Symantec Corporation
Inventor: Shrikant Pawar , Sharad Mhaske
Abstract: The disclosed computer-implemented method for recovering an infected endpoint may include receiving an acoustic signal having an embedded command for executing a security application at the infected endpoint, decoding the acoustic signal to obtain the embedded command, and executing the embedded command to start a security application at the infected endpoint, where the security application is operable to mitigate the infected endpoint. Various other methods, systems and computer-readable media are also disclosed.
-
-
-
-
-
-
-
-
-