Methods and Systems for Network Authentication Using a Unique Authentication Identifier

    公开(公告)号:US20240357349A1

    公开(公告)日:2024-10-24

    申请号:US18304237

    申请日:2023-04-20

    CPC classification number: H04W12/06

    Abstract: A core network comprises a data store is configured to store a record associated with a wireless communication device, wherein the record comprises a plurality of pre-provisioned security parameters related to the wireless communication device. A core authentication application at the core network is configured to receive an authentication request comprising at least one security parameter stored at both the wireless communication device and in a record at the data store, obtain a registration identifier in response to inputting the at least one security parameter received in the authentication request into a first security application, obtain a network-side authentication identifier in response to inputting the registration identifier into a second security application, and determine whether the wireless communication device is authenticated and authorized to access the carrier network when a device-side authentication identifier matches the network-side authentication identifier.

    Customer capture using dynamically generated customized webpages

    公开(公告)号:US12126752B2

    公开(公告)日:2024-10-22

    申请号:US18483670

    申请日:2023-10-10

    Applicant: IQX CORP.

    CPC classification number: H04M1/72445 H04M1/72436 H04W4/14 H04W4/20 H04W12/06

    Abstract: A computer that dynamically generates a customized second document is described. During operation, the computer receives information specifying activation of a hosted field in a document associated with a third party, where the information specifies a willingness to receive one or more messages from the computer and specifies a telephone number. In response, the computer dynamically generates the customized second document that includes information about one or more transactions (such as one or more upcoming events) of interest to an individual associated with the telephone number. Then, the computer sends a message to an address corresponding to the telephone number, where the message includes a link to the customized second document. Next, when the computer receives information specifying activation of the link from an electronic device, the computer provides information specifying the customized second document to the electronic device for display on the electronic device.

    METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PERFORMING LOCATION AND VELOCITY CHECK AT SECURITY EDGE PROTECTION PROXY (SEPP) TO AVOID SPOOFING

    公开(公告)号:US20240349057A1

    公开(公告)日:2024-10-17

    申请号:US18135105

    申请日:2023-04-14

    CPC classification number: H04W12/122 H04W12/06 H04W12/104

    Abstract: A method for performing a location and velocity check at an SEPP to protect against a spoofing attack includes receiving an SBI request message relating to authentication of UE. The method further includes querying a database NF to obtain previous authentication information for the UE, the previous authentication information including a previous network identifier and a previous authentication time for the UE. The method further includes receiving a response from the database NF, the response including the previous network identifier and the previous authentication time. The method further includes reading, a current network identifier from the SBI request message, performing, using the current network identifier from the SBI request message, the previous network identifier, the previous authentication time, and a time of receipt by the SEPP of the SBI request message, a location and velocity check for the UE, and performing a network security action for the SBI request message based on results of the location and velocity check.

Patent Agency Ranking