Abstract:
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP (SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
Abstract:
Aspects of the present disclosure involve a mobile or computer reader application that obtains articles or other computer files from a central database and displays the articles to a user of the device. The reader application may be customizable around one or more characteristics of the user of the device. In one embodiment, the type and number of articles provided to the device and displayed in the reader application may be based on the determination of a category or type of usage of the application is performed by the user. Further, the determination of the use of the reader application on the device is performed by and contained within the device such that usage information is not shared with overall article providing system. In another embodiment, the article providing system and/or device may determine recommendations to provide to a user of the reading application. These recommendations may be based on one or more selected interests or topics of the user of the reading application.
Abstract:
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP (SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
Abstract:
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
Abstract:
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
Abstract:
Aspects of the present disclosure involve a mobile or computer reader application that obtains articles or other computer files from a central database and displays the articles to a user of the device. The reader application may be customizable around one or more characteristics of the user of the device. In one embodiment, the type and number of articles provided to the device and displayed in the reader application may be based on the determination of a category or type of usage of the application is performed by the user. Further, the determination of the use of the reader application on the device is performed by and contained within the device such that usage information is not shared with overall article providing system. In another embodiment, the article providing system and/or device may determine recommendations to provide to a user of the reading application. These recommendations may be based on one or more selected interests or topics of the user of the reading application.
Abstract:
Aspects of the present disclosure involve a mobile or computer reader application that obtains articles or other computer files from a central database and displays the articles to a user of the device. The reader application may be customizable around one or more characteristics of the user of the device. In one embodiment, the type and number of articles provided to the device and displayed in the reader application may be based on the determination of a category or type of usage of the application is performed by the user. Further, the determination of the use of the reader application on the device is performed by and contained within the device such that usage information is not shared with overall article providing system. In another embodiment, the article providing system and/or device may determine recommendations to provide to a user of the reading application. These recommendations may be based on one or more selected interests or topics of the user of the reading application.
Abstract:
The embodiments set forth techniques for managing advertisement attributions. A first technique can be implemented by an “app store” application, and include the steps of (1) receiving, from a first user application, a request to view a second user application, where the request includes a set of digitally-signed parameters that are specific to an advertising campaign (provided by an advertisement network) for the second user application that is presented by the first user application. In turn, and in response to identifying that the second user application satisfies at least one criterion, the app store application provides the set of digitally-signed parameters to an advertisement metrics manager that: (i) verifies the set of digitally-signed parameters, and (ii) indicates, to the advertisement network, that business logic should be carried out in association with the first user application and the second user application. A second technique for managing advertisement attributions is also disclosed.
Abstract:
A wireless device determines a location, identifies a mobile network operator (MNO), and/or experiences a network event. In some instances, the wireless device recognizes a base station as being operated by the MNO. Based on the location, the MNO and/or the network event, the wireless device determines a security action. The security action can include one or more of: (i) ignoring a network command associated with the network event, (ii) providing an alert notification via a user interface of the wireless device alerting a user of a security risk associated with the location, MNO, and/or network event, or (iii) ignoring communication from the base station temporarily or for an indefinite period of time. In some instances, the security action includes proceeding with normal communication with the base station at the location using network services of the MNO.
Abstract:
Aspects of the present disclosure involve a mobile or computer reader application that obtains articles or other computer files from a central database and displays the articles to a user of the device. The reader application may be customizable around one or more characteristics of the user of the device. In one embodiment, the type and number of articles provided to the device and displayed in the reader application may be based on the determination of a category or type of usage of the application is performed by the user. Further, the determination of the use of the reader application on the device is performed by and contained within the device such that usage information is not shared with overall article providing system. In another embodiment, the article providing system and/or device may determine recommendations to provide to a user of the reading application. These recommendations may be based on one or more selected interests or topics of the user of the reading application.