-
1.
公开(公告)号:US12120514B2
公开(公告)日:2024-10-15
申请号:US17480309
申请日:2021-09-21
发明人: Navneeth N. Kannan
IPC分类号: H04W12/084 , H04W4/50 , H04W4/80 , H04W8/00 , H04W12/00 , H04W12/50 , H04W12/60 , H04W12/69 , H04W68/00 , H04W84/08 , H04W84/18 , H04W40/32
CPC分类号: H04W12/084 , H04W4/50 , H04W4/80 , H04W8/005 , H04W12/009 , H04W12/50 , H04W12/66 , H04W12/69 , H04W68/005 , H04W84/08 , H04W40/32
摘要: A multi-modal portal system provides an authorization prior to establishing a visual interface connection between a support user or caller and a client user or receiving party. Once the caller is authorized, the caller is permitted to drop-in such that a visual interface connection is established with the receiving party. The authorization can be based on a profile configuration that indicates whether the caller has the credentials required for the visual interface. The authorization can require that a notification be sent to a trusted user or primary contact or the caller can be associated with a profile configuration that allows for a pre-authorization without requiring the notification. Also, security is enhanced by validating network devices and providing resiliency in data paths between network devices and data aggregators.
-
公开(公告)号:US12120513B2
公开(公告)日:2024-10-15
申请号:US18093234
申请日:2023-01-04
发明人: Renato Cantini , Paul Aebi
CPC分类号: H04W12/08 , H04L63/0853 , H04L63/0876 , H04L63/105 , H04L63/20 , H04W8/183 , H04W12/00 , H04W12/06 , H04W12/128 , H04L63/1416 , H04L63/1466 , H04W88/02
摘要: A method for adapting the security settings of a communication station (12) depending on a security relevant event is disclosed, wherein the communication station (12) comprises a mobile terminal (16) with an identification module (18). In a first step, the security relevant event occurring in said communication station and/or said mobile terminal (16) is identified in an event handler (26, 261, 262, 27) and stored in an event registry (28). In a second step, a security registry (30) in the identification module (18) is updated according to the identified event. In a third step, the security level of the communication station (12) and/or the mobile terminal (16) is adapted according to the security registry (30) of the identification module (18). The invention also relates to a communication station (12) and to an identification module (18).
-
公开(公告)号:US20240323694A1
公开(公告)日:2024-09-26
申请号:US18189242
申请日:2023-03-24
IPC分类号: H04W12/122 , H04W12/00
CPC分类号: H04W12/122 , H04W12/009
摘要: Various embodiments include methods and computing devices implementing such methods for detecting and responding to a non-acknowledgment message (NACK) attack. In some embodiments, a device vehicle processing system may perform an operation to determine whether a NACK attacker is present in response to a quantity of NACK messages received within a time interval exceeding a threshold quantity that is based on a vehicle communication environment proximate to the vehicle. The vehicle processing system may perform an operation to mitigate adverse effects of NACK messages received from the NACK attacker in response to determining that the NACK attacker is present.
-
公开(公告)号:US12101636B2
公开(公告)日:2024-09-24
申请号:US17649770
申请日:2022-02-02
申请人: LinkXess GmbH
发明人: Frank Paetsch
摘要: A method, including: assigning a SIM card to a telecommunications terminal and recording this assignment on a server; providing the SIM card to a mobile radio gateway; logging in a radio module of the mobile radio gateway to the mobile radio network using the provided SIM card; setting up a mobile radio data connection by the logged in radio module of the mobile radio gateway via the mobile radio network to the Internet; setting up a first secure data connection between the mobile radio gateway and the server; setting up a second secure data connection between the telecommunications terminal and the server; and connecting the first secure data connection and the second secure data connection by the server for the provision of a data connection of the telecommunications terminal to the Internet via the second secure data connection, the first secure data connection and the mobile radio data connection.
-
公开(公告)号:US12096206B2
公开(公告)日:2024-09-17
申请号:US18497125
申请日:2023-10-30
发明人: Ankur Kamthe , Jian Dong , Berend Dunsbergen
IPC分类号: H04L29/06 , G06N20/00 , G16Y30/10 , G16Y40/35 , H04L9/40 , H04L43/065 , H04L43/0811 , H04L43/10 , H04W12/00
CPC分类号: H04W12/009 , G06N20/00 , G16Y30/10 , G16Y40/35 , H04L43/065 , H04L43/0811 , H04L43/10 , H04L63/123
摘要: Systems and methods are provided for receiving, from an access point, attributes of an Internet of Things (IoT) device connected to the access point, determining a stored device, in a database of a server, sharing a subset of the attributes of the IoT device, and generating a code bundle based on the subset of the shared attributes between the stored device and the IoT device.
-
公开(公告)号:US12081983B2
公开(公告)日:2024-09-03
申请号:US17683459
申请日:2022-03-01
申请人: HERC RENTALS INC.
发明人: Tamir Peres , Sunil Gupta , Vanessa Layson , Suraj Pandya
IPC分类号: H04W12/00 , G06Q10/0631 , H04W12/06 , H04W12/08
CPC分类号: H04W12/08 , G06Q10/063112 , H04W12/06
摘要: A system for controlling access to equipment. The system establishes that a user of a mobile device has authorization to access an equipment and generates an encrypted digital key. The system sends the encrypted digital key to the mobile device. The system also sends an encrypted corresponding digital key to a controlling unit of the equipment. When a distance between the mobile device and the controlling unit is within a threshold, and the encrypted digital key transmitted by the mobile device is authenticated by the encrypted corresponding key on the controlling unit, the controlling unit unlocks the equipment so that the user of the mobile device takes control of the equipment in accordance with terms and conditions as set forth in a contract for operating the equipment between the user and an owner of the system.
-
公开(公告)号:US12075246B2
公开(公告)日:2024-08-27
申请号:US16911111
申请日:2020-06-24
申请人: SonicWALL Inc.
发明人: Zhuangzhi Duo , Atul Dhablania
摘要: Securely setting up mesh networks in a secure manner that does not require a physical network cable being attached to a wireless device and that do not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus may use different communication interfaces and different types of channels to ensure that devices included in or being added to a wireless mesh network always communicate securely. Methods and apparatus may use a combination of conventional secure communication methods, such as secure hypertext transfer protocol (HTTPS) communications, low power signals that travel over short distances, and other types of communications to create a system that only uses secure communications when setting up or expanding a wireless mesh network.
-
8.
公开(公告)号:US20240281535A1
公开(公告)日:2024-08-22
申请号:US18110667
申请日:2023-02-16
申请人: DELL PRODUCTS L.P.
发明人: Vivekanandh Narayanasamy Rajagopalan , Anand Prakash Joshi , Hemanth Venkatesh Murthy , Ibrahim Sayyed
CPC分类号: G06F21/572 , G06F9/4401 , G06F9/4416 , G06F15/177 , H04W12/009
摘要: Systems and methods are provided to perform BIOS recovery for a first information handling system that is in a no-boot state, i.e., in which the original equipment manufacturer (OEM) boot block (OBB) on the first information handling system is corrupted or damaged and thus does not properly execute. OBB BIOS recovery may be achieved using logic executing on a second and different information handling system that is wirelessly communicating with initial boot block (IBB) BIOS firmware that is executing on the first information handling system. The logic executing on the second information handling system may select and download (e.g., from a remote server) a correct uncorrupted and undamaged copy of the BIOS recovery firmware version for the first information handling system, and then wirelessly transfer the downloaded new copy of the OBB BIOS firmware version to the first information handling system via an established secure wireless connection.
-
9.
公开(公告)号:US20240276211A1
公开(公告)日:2024-08-15
申请号:US18637260
申请日:2024-04-16
IPC分类号: H04W12/041 , H04L9/08 , H04W12/00 , H04W12/0433 , H04W36/00 , H04W36/14
CPC分类号: H04W12/041 , H04L9/0861 , H04W12/0433 , H04W36/0055 , H04W36/14 , H04W12/009
摘要: A key management is provided that enables security activation before handing over a user equipment from a source 5G wireless communication system, i.e., a Next Generation System (NGS), to a target 4G wireless communication system, i.e., a Evolved Packet System (EPS)/Long Term Evolution (LTE). The key management achieves backward security, i.e., prevents the target 4G wireless communication system from getting knowledge of 5G security information used in the source 5G wireless communication system.
-
公开(公告)号:US20240276175A1
公开(公告)日:2024-08-15
申请号:US18645242
申请日:2024-04-24
申请人: Tile, Inc.
发明人: Arunkumar Puppala , Liuyin Cheng , Wayne Patterson
IPC分类号: H04W4/021 , G01S5/02 , H04W4/00 , H04W4/02 , H04W4/029 , H04W4/16 , H04W4/18 , H04W4/23 , H04W4/30 , H04W4/38 , H04W4/42 , H04W4/70 , H04W4/80 , H04W8/00 , H04W8/10 , H04W8/12 , H04W8/14 , H04W8/16 , H04W12/00 , H04W48/04
CPC分类号: H04W4/021 , G01S5/02 , G01S5/0205 , G01S5/0294 , H04W4/00 , H04W4/02 , H04W4/025 , H04W4/029 , H04W4/16 , H04W4/30 , H04W12/00 , H04W4/023 , H04W4/185 , H04W4/23 , H04W4/38 , H04W4/42 , H04W4/70 , H04W4/80 , H04W8/00 , H04W8/10 , H04W8/12 , H04W8/14 , H04W8/16 , H04W48/04
摘要: Tracking devices can be associated with safe zones, smart zones, and high risk zones. Safe zones correspond to regions where a likelihood that a tracking device is lost within the safe zone is lower than outside the safe zone. High risk zones correspond to regions where a likelihood that a tracking device is lost within the high risk zone is higher than outside the high risk zone. Smart zones correspond to an expected tracking device, mobile device, or user behavior. Home areas are geographic regions in which a user resides, and travel areas are geographic regions in which a user does not reside. A tracking device can be configured to operate in a mode selected based on a presence of the tracking device within a safe zone, a smart zone, a high risk zone, a home area, or a travel area.
-
-
-
-
-
-
-
-
-