Abstract:
An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (SID). The application identifier identifies the application and the SID uniquely identifies a session between the application and a destination network device. The authentication device decrypts, using a first private key of a first public/private key pair, the encrypted SID to produce a decrypted SID; and determines a first hash value of certain data that includes the application identifier and session information associated with the session. The authentication device further encrypts, using a second public key of a second public/private key pair, the determined first hash value and the decrypted SID to produce an authentication token comprising the encrypted first hash value and the SID; and sends the authentication token to the application at the mobile device.
Abstract:
A device includes an audio capture device for receiving an audio signal in an ultrasonic frequency range. The device includes a processor to determine whether the received audio signal corresponds to an ultrasonic message. The processor extracts a content of the ultrasonic message, when it is determined that the received audio signal corresponds to an ultrasonic message, automatically handles the ultrasonic message based on the extracted content, stores at least a portion of the content of the ultrasonic message, and displays the portion of the content of the ultrasonic message to a user of the mobile device at a time subsequent to a time of the receipt of the audio signal.
Abstract:
Attributes of a session, between a source device and a verification device, for sending first verification data, such as a password and an account identifier, are determined. The verification device generates user device data based on an identifier, such as a mobile device number (MDN), for a user device associated with the account identifier. An identifier, such as an MDN, associated with the source device and an encryption key associated with the verification device are determined based on session attributes. Second verification data is generated based on the identifier associated with the source device. The second verification data is encrypted using the encryption key and forwarded to the verification device. The verification device decrypts the second verification data and compares the identifier for the user device to the identifier for the source device to determine whether the first verification data was sent from the user device.
Abstract:
A network device receives a definition for a data product of consumer Internet-of-Things (IoT) data and registers multiple machine-type communications (MTC)-devices for collection of consumer IoT data. The MTC devices provide the consumer IoT data with heterogeneous formats. The registering identifies a profile for each MTC device and particular data types authorized for collection. The network device receives consumer IoT data generated by the multiple MTC devices and extracts the particular data types from the IoT data. The network device normalizes the extracted data to include a uniform data format, and aggregates the normalized IOT data into clusters that exclude device identifiers. The network device constructs the clusters into a data portfolio that meets the definition for the data product.
Abstract:
A first device may receive a request from a second device. The request may include a device identifier associated with the second device. The request may be transmitted by the second device to obtain a signature, based on which to access a third device. The first device may determine that the device identifier is associated with a secure authentication service. The first device may generate a signature based on determining that the device identifier is associated with the secure authentication service. The first device may provide the signature to the third device. The signature may permit the third device to selectively permit or deny access by the second device based on a result of authenticating the signature. Access may be permitted when the third device successfully authenticates the signature, and access may be denied when the third device fails to authenticate the signature.
Abstract:
An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (SID). The application identifier identifies the application and the SID uniquely identifies a session between the application and a destination network device. The authentication device decrypts, using a first private key of a first public/private key pair, the encrypted SID to produce a decrypted SID; and determines a first hash value of certain data that includes the application identifier and session information associated with the session. The authentication device further encrypts, using a second public key of a second public/private key pair, the determined first hash value and the decrypted SID to produce an authentication token comprising the encrypted first hash value and the SID; and sends the authentication token to the application at the mobile device.
Abstract:
A method is performed in a service provider network. The method includes a network device receiving registration records for multiple machine-type communication (MTC) devices, each of the registration records including a connection profile that indicates a level of delay tolerance for connections. The method also includes receiving, by a fixed-location accepter device and via wireless signals, connection requests from the multiple MTC devices, wherein each of the connection requests includes a connection profile indicator. The method further includes the network device receiving an indication of inadequate capacity to accept all the connection requests from the multiple MTC devices; and directing, in response to receiving the indication, a mobile accepter device into a geographic area wherein the mobile accepter device is configured to accept at least a portion of the connection requests, via wireless signals, the portion of the connection requests including connection profile indicators that indicate a tolerance for delay.
Abstract:
A method, a device, and a non-transitory storage medium provides to receive a packet from an Internet of Things (IoT) device, wherein the packet carries IoT data; determine a classification of the IoT device from which the first packet is received, in response to a receipt of the packet, wherein the classification indicates a type of IoT device; select standard data types assigned to the classification of the IoT device, in response to a determination of the classification of the IoT device; determine whether the IoT data includes all of the standard data types based on the standard data types selected; convert the IoT data into an IoT standard format in response to a determination that the IoT data includes all of the standard data types; generate another packet that includes the IoT data in the IoT standard format in response to a conversion of the IoT data; and transmit the other packet to a network device.
Abstract:
A device may determine a condition for providing customer information to a mobile device. The device may detect the mobile device, and may request, from the mobile device and based on detecting the mobile device, information that identifies a user communication preference associated with providing the customer information to the mobile device. The device may receive, from the mobile device and based on the request, the information that identifies the user communication preference. The device may determine whether the customer information is to be provided to the mobile device based on the user communication preference and the condition, and may selectively provide the customer information and an instruction to the mobile device based on determining whether the customer information is to be provided to the mobile device. The instruction may cause the mobile device to relay the customer information to a network storage device.
Abstract:
A network device receives, from a node in an Internet-of-Things (IoT) network, an access request for a user authenticated via the node and identifies the access request as from either of a trusted node or an untrusted node in the IoT network. When the access request is from an untrusted node, the network device identifies a hash key for the access request, wherein the hash key is derived from an access list for the IoT network; broadcasts the hash key to other trusted nodes in the IoT network; and validates the access request based on a solution consensus from the other trusted nodes. When the access request is from a trusted node, the network device confirms mutual trust with the trusted node via an encrypted key exchange, and validates the access request based on the mutual trust with the trusted node.