MITIGATING THE EFFECTS OF DISINFORMING ROGUE ACTORS IN PERCEPTIVE WIRELESS COMMUNICATIONS

    公开(公告)号:US20240214812A1

    公开(公告)日:2024-06-27

    申请号:US18069994

    申请日:2022-12-21

    IPC分类号: H04W12/122 H04W12/082

    CPC分类号: H04W12/122 H04W12/082

    摘要: An apparatus configured to revoke, for one or more wireless devices, access to at least one service for at least one context in response to the one or more wireless devices providing incorrect data elements for a wireless communication service, and output an indication for data from the one or more wireless devices to be excluded from subsequent processing for the at least one service in the at least one context. An additional apparatus configured to provide a first set of data elements for processing by a set of service entities, receive an indication that at least one component of the first wireless device provides incorrect data elements for a wireless communication service, and omit information derived from the at least one component of the first wireless device in subsequent sets of data elements corresponding to the first set of data elements provided for the set of service entities.

    Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts

    公开(公告)号:US12021854B2

    公开(公告)日:2024-06-25

    申请号:US18061948

    申请日:2022-12-05

    申请人: Plaid Inc.

    摘要: A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account.

    Forcing re-authentication of users for accessing online services

    公开(公告)号:US11943618B2

    公开(公告)日:2024-03-26

    申请号:US17137277

    申请日:2020-12-29

    发明人: Kanakrai Chauhan

    摘要: Described herein are techniques for preventing a user from continuing to access an online service once access rights have been revoked. In some embodiments, the techniques comprise receiving a request to determine a current status of access rights in association with a user and an online service, determining, based on one or more conditions associated with the online service, the current status of access rights, upon determining that the current status of access rights indicates that the user is not authorized to access the online service, identifying at least one user device associated with the user, generating programmatic instructions to cause a session token associated with the online service to be removed from a memory of the at least one user device, and providing the programmatic instructions to the at least one user device.

    USAGE OF ACCESS TOKEN IN SERVICE BASED ARCHITECTURE

    公开(公告)号:US20240064512A1

    公开(公告)日:2024-02-22

    申请号:US18337794

    申请日:2023-06-20

    IPC分类号: H04W12/082 H04W12/069

    摘要: Embodiments of the present disclosure relate to usage of access token in service based architecture. According to one aspect of the present disclosure, a first network device transmits an access token request to a second network device, and receives, from the second network device, an access token associated with a first count value, the first count value indicating the number of times the access token is allowed to be used. The first network device transmits, to a third network device, a service request with the access token; and receives, from the third network device, a service response determined based on the first count value and the access token. In this way, usage of an access token may be restricted and chance of misuse of the access token may be reduced.

    ACCESS TOKEN REVOCATION IN SECURITY MANAGEMENT

    公开(公告)号:US20230413052A1

    公开(公告)日:2023-12-21

    申请号:US18337194

    申请日:2023-06-19

    IPC分类号: H04W12/082 H04W12/084

    CPC分类号: H04W12/082 H04W12/084

    摘要: Example embodiments of the present disclosure relate to access token revocation in security management. In an example method, in response to providing, to a second device, an access token for the second device to access a NF service from a third device, a first device stores a mapping indicating an association among the access token, the second device and the third device. In response to determining that the second device is abnormal, the first device sends, to at least one target device based on the mapping, an indication of revoking the access token. In this way, at least one target device associated with revoked access token can be informed and potential damage caused by the abnormal NF can be eliminated.