-
公开(公告)号:US12126648B2
公开(公告)日:2024-10-22
申请号:US17845049
申请日:2022-06-21
Applicant: Visa International Service Association
Inventor: Quan Wang
IPC: H04L29/06 , G06Q20/22 , G06Q20/32 , G06Q20/34 , G06Q20/38 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40 , H04W12/108 , H04W12/0431 , H04W12/069 , H04W12/122 , H04W12/47 , H04W12/60
CPC classification number: H04L63/1466 , G06Q20/223 , G06Q20/32 , G06Q20/352 , G06Q20/38215 , H04L9/14 , H04L9/30 , H04L9/3213 , H04L9/3247 , H04L63/06 , H04L63/062 , H04W12/108 , H04L63/0823 , H04L2209/56 , H04W12/0431 , H04W12/069 , H04W12/122 , H04W12/47 , H04W12/66
Abstract: Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.
-
公开(公告)号:US20240314571A1
公开(公告)日:2024-09-19
申请号:US18589219
申请日:2024-02-27
Applicant: QUALCOMM Incorporated
Inventor: Giridhar Dhati MANDYAM
IPC: H04W12/63 , H04W12/03 , H04W12/108
CPC classification number: H04W12/63 , H04W12/03 , H04W12/108
Abstract: Systems and techniques are provided for delegated attestation. For example, a process by an apparatus can include receiving an indication to attest to a property of a target device; generating a measurement associated with the property of the target device; generating data regarding an integrity of the apparatus; generating attestation data, the attestation data including information associated with the generated measurement and the generated data regarding the integrity of the apparatus; and transmitting the attestation data to a verifier device.
-
公开(公告)号:US20240244434A1
公开(公告)日:2024-07-18
申请号:US18290248
申请日:2022-03-15
Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
Inventor: Pinar Comak , Christine Jost , Ferhat Karakoc , Stefan Håkansson , Ulf Mattsson , Zhang Fu
IPC: H04W12/106 , H04W12/033 , H04W12/0431 , H04W12/084 , H04W12/108
CPC classification number: H04W12/106 , H04W12/033 , H04W12/0431 , H04W12/084 , H04W12/108
Abstract: A data collection coordination function, DCCF, network node receives (1a) a request for data from a data consumer, determines (2) a data source for the requested data, verifies (3a, 3b) with a network node that the data consumer and the DCCF are authorized by the data source, receives (3b) a message container for the data consumer from the network node, the message container for the data consumer including a data encryption key KE and a data integrity key Ki, and receives (3b) a message container for the data source from the network node, the message container for the data source including the data encryption key KE and the data integrity key Ki. The DCCF network node transmits (4a) the message container for the data consumer to the data consumer and transmits (5) the message container for the data source to the data source.
-
公开(公告)号:US20240098498A1
公开(公告)日:2024-03-21
申请号:US18527167
申请日:2023-12-01
Applicant: QUALCOMM Incorporated
Inventor: Ravi AGARWAL , Gavin Bernard HORN , Naga BHUSHAN
IPC: H04W12/122 , H04B7/06 , H04L5/00 , H04W12/108 , H04W12/61 , H04W48/12 , H04W56/00 , H04W76/11
CPC classification number: H04W12/122 , H04B7/0626 , H04L5/0051 , H04W12/108 , H04W12/61 , H04W48/12 , H04W56/001 , H04W76/11
Abstract: In a wireless access network, a false base station (FBS) may imitate a legitimate base station by repeating the transmissions of the legitimate base station at a higher power level such that one or more user equipment (UEs) synchronize with the FBS instead of the legitimate base station. The present disclosure provides a UE that detects an FBS. The UE may estimate a time of arrival of different multipath components of a downlink signal corresponding to a physical cell identity. The UE may determine an existence of FBS based on a difference between the times of arrival of two of the different multipath components exceeding a threshold amount of time. The UE may perform a mitigation operation in response to determining the existence of the FBS.
-
公开(公告)号:US11889313B2
公开(公告)日:2024-01-30
申请号:US17086267
申请日:2020-10-30
Applicant: QUALCOMM Incorporated
Inventor: Ravi Agarwal , Gavin Bernard Horn , Naga Bhushan
IPC: H04L29/06 , H04L29/08 , H04W12/122 , H04W76/11 , H04W48/12 , H04B7/06 , H04L5/00 , H04W56/00 , H04W12/61 , H04W12/108
CPC classification number: H04W12/122 , H04B7/0626 , H04L5/0051 , H04W12/108 , H04W12/61 , H04W48/12 , H04W56/001 , H04W76/11
Abstract: In a wireless access network, a false base station (FBS) may imitate a legitimate base station by repeating the transmissions of the legitimate base station at a higher power level such that one or more user equipment (UEs) synchronize with the FBS instead of the legitimate base station. The present disclosure provides a UE that detects an FBS. The UE may estimate a time of arrival of different multipath components of a downlink signal corresponding to a physical cell identity. The UE may determine an existence of FBS based on a difference between the times of arrival of two of the different multipath components exceeding a threshold amount of time. The UE may perform a mitigation operation in response to determining the existence of the FBS.
-
公开(公告)号:US20230308877A1
公开(公告)日:2023-09-28
申请号:US18018897
申请日:2021-08-04
Applicant: KONINKLIJKE PHILIPS N.V.
Inventor: Oscar Garcia Morchon
IPC: H04W12/108 , H04W12/122 , H04W12/06 , H04L9/32
CPC classification number: H04W12/108 , H04W12/122 , H04W12/06 , H04L9/3247
Abstract: The present invention relates to a method for a secondary station to obtain a time reference in a cellular network in order to verify the freshness of received messages. The method comprises the steps of receiving a plurality of system information, SI, messages from a plurality of primary stations, said SI messages including each a respective time reference information related to the corresponding primary station, checking the validity of a received signature for each of the primary stations, checking a cell identifier for each of the primary stations with a valid signature, and ignoring time reference information from primary stations with a cell identifier being identical to another primary station and having an earlier value than the one from the other primary station, and deducing a local time reference from one or more of the time reference information originating from primary stations with a valid signature.
-
公开(公告)号:US20230269219A1
公开(公告)日:2023-08-24
申请号:US17677134
申请日:2022-02-22
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Robert E. Barton , Jerome Henry
IPC: H04L101/622 , H04L61/5014 , H04W12/108 , H04W12/71
CPC classification number: H04L61/6022 , H04L61/2015 , H04W12/108 , H04W12/71
Abstract: An authorization device obtains a registration request associated with an end device, the registration request including a new randomized media access control (MAC) address associated with the end device; determines whether the end device is authorized to use the new randomized MAC address; transmits a message to the end device with a first randomly generated number when it is determined that the end device is authorized to use the new randomized MAC address; obtains integrity information associated with the end device, the first integrity information being computed based on the first randomly generated number; transmits a request to a validation system to validate the end device based on the first integrity information; obtains an indication that the end device is validated; determines policies associated with the end device when it is determined that the end device is validated; and applies the policies to the end device.
-
公开(公告)号:US11729624B2
公开(公告)日:2023-08-15
申请号:US17495313
申请日:2021-10-06
Applicant: Capital One Services, LLC
Inventor: Jeffrey Rule , Gaurang Bhatt , Rocky Guo , Lukiih Cuan
IPC: H04W12/50 , H04W12/12 , H04W12/03 , H04W12/069 , H04W12/108 , H04M3/493
CPC classification number: H04W12/50 , H04W12/03 , H04W12/069 , H04W12/108 , H04W12/12 , H04M3/493
Abstract: Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
-
9.
公开(公告)号:US11695782B2
公开(公告)日:2023-07-04
申请号:US17362713
申请日:2021-06-29
Applicant: ULedger, Inc.
Inventor: Joshua R. McIver , Taulant Ramabaja
IPC: H04L9/40 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/08 , H04W12/06 , H04W12/10 , H04W12/069 , H04W12/106 , H04W12/108
CPC classification number: H04L63/123 , H04L9/0861 , H04L9/14 , H04L9/30 , H04L9/3231 , H04L9/3247 , H04L9/3268 , H04L63/0428 , H04L63/0823 , H04L63/0861 , H04W12/06 , H04W12/069 , H04W12/10 , H04W12/106 , H04W12/108
Abstract: Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels. The split secret is generated based on a public key of a public-private key pair generated by the client computing device based on a unique identifier. Validity of the public key can authenticate source identity.
-
10.
公开(公告)号:US20230208918A1
公开(公告)日:2023-06-29
申请号:US18117713
申请日:2023-03-06
Applicant: FedEx Corporate Services, Inc.
Inventor: Ole-Petter Skaaksrud
IPC: H04L67/12 , G08B17/10 , G06Q10/0832 , A62C37/36 , A62C3/00 , B65D90/48 , A62C3/08 , A62C3/10 , A62C31/22 , A62C37/44 , G01J5/00 , G01J5/02 , G06Q10/0833 , B64D9/00 , G08B21/18 , H04Q9/00 , B65D90/06 , B65D90/22 , H04W4/38 , H04W4/35 , G06K19/07 , G06K19/077 , B60Q9/00 , G01C5/06 , G01K3/00 , G01K3/10 , G01N33/00 , G01T1/17 , H04Q9/02 , H04W4/021 , B64D25/00 , B64D45/00 , G08B23/00 , G08B25/00 , A62C3/07 , A62C37/40 , G08B25/10 , H04W24/08 , H04W12/06 , H02J7/00 , G08B17/06 , H04L41/04 , H04L41/06 , B65D25/02 , H04W12/108 , B60C9/00
CPC classification number: H04L67/12 , G08B17/10 , G06Q10/0832 , A62C37/04 , A62C3/002 , B65D90/48 , A62C3/08 , A62C3/10 , A62C31/22 , A62C37/44 , G01J5/0014 , G01J5/0066 , G01J5/025 , G06Q10/0833 , B64D9/003 , G08B21/182 , H04Q9/00 , B65D90/06 , B65D90/22 , H04W4/38 , H04W4/35 , G06K19/0717 , G06K19/07758 , B60Q9/00 , G01C5/06 , G01K3/005 , G01K3/10 , G01N33/004 , G01T1/17 , H04Q9/02 , H04W4/021 , B64D9/00 , B64D25/00 , B64D45/00 , G01N33/0075 , G08B23/00 , G08B25/001 , G08B25/009 , A62C3/07 , A62C37/40 , G08B25/10 , H04W24/08 , H04W12/06 , H02J7/00036 , G06K19/0702 , H02J7/0047 , G08B17/06 , H04L41/04 , H04L41/06 , B65D25/02 , H04W12/108 , B60C9/00 , H04Q2209/40 , H04W84/18
Abstract: Systems and methods are described for securely monitoring a shipping container for an environmental anomaly using elements of a wireless node network of sensor-based ID nodes disposed within the container and a command node associated with the container. The method has the command node identifying which of the ID nodes are confirmed as trusted sensors based upon a security credential specific to each of the ID nodes; monitoring only the confirmed ID nodes for sensor data broadcast those ID nodes; detecting the anomaly based upon the sensor data from at least one of the confirmed ID nodes; automatically generating an alert notification related to the detected environmental anomaly for the shipping container; and transmitting the alert notification to the external transceiver to initiate a mediation response related to the detected environmental anomaly.
-
-
-
-
-
-
-
-
-