Abstract: The system includes a passive card (10) configured to store a first portion of an authentication or authorization code via a set of capacitive points (11) included on its surface; and a portable computing device (20) having a capacitive screen and being configured to store a second portion of said authentication or authorization code. Such that, once the user (1) has requested access to a specific service or to a specific operation and when the passive card (10) is in contact with the capacitive screen, the portable computing device (20) is further configured to read at least some of the set of capacitive points (11), decoding the first portion, and cryptographically signing the decoded first portion using said stored second portion, providing the authentication or authorization code, which is used as cryptographic key to grant access to said specific service or specific operation to the user (1).
Type:
Application
Filed:
May 3, 2019
Publication date:
November 7, 2019
Applicant:
TELEFONICA DIGITAL ESPAÑA, S.L.U.
Inventors:
José TORRES VELASCO, Aruna Prem Bianzino, Alvaro Nunez-Romero Casado, Sergio De Los Santos Vilchez
Abstract: The method according to the invention comprises the steps of: identifying one or more entities (21) located in a darknet (50) taking into consideration information relative to network domains thereof, and collecting information of said one or more entities (21) identified; extracting a series of metadata from the information collected from said one or more entities (21) identified; validating said one or more identified entities (21) with information from a surface network (51), said information coming from a surface network (51) associated with the information collected from the identified entities (21); and generating a profile of each identified entity (21) by correlating the validated information of each entity (21) with data and metadata from said surface network (51).
Type:
Application
Filed:
December 16, 2016
Publication date:
October 17, 2019
Applicant:
TELEFONICA DIGITAL ESPAÑA, S.L.U.
Inventors:
Sergio DE LOS SANTOS VILCHEZ, Carmen TORRANO GIMÉNEZ, Aruna Prem BIANZINO
Abstract: The method comprises certifying with integrity and authenticity guarantees, by a second system (20), a received document (Do) by applying a watermark to the document (Do) providing a modified document. Upon the modified document (Dw) is submitted to a transaction, receiving, by a fourth system (40), an identifier of the document (Dw) and an identifier of an operation executed on the document (Dw) during said transaction; storing, by the fourth system (40), information about the transaction in a third computer system (30), the latter executing a computer program storing pairings of said identifier of the document (Dw) and a hash value of the transaction and sending the hash value to the fourth system (40). The latter storing an address of the computer program, an interface thereof and the identifier of the document (Dw) into a record of a database, usable to track future transactions executed on the document (Dw).
Type:
Application
Filed:
March 22, 2019
Publication date:
September 26, 2019
Applicant:
TELEFONICA DIGITAL ESPAÑA, S.L.U.
Inventors:
Aruna PREM BIANZINO, Emilio SANCHEZ DE ROJAS RODRIGUEZ DE ZULOAGA, Sara BALBIN SANCHEZ, Rames SARWAT SHAKER
Abstract: The method comprising, in a network based on a chain of individual Service Functions, SFs, that are composed to implement Network Services, NSs: assigning, at an ingress node of a network architecture, to at least one data packet received by said ingress node from the network, a unique cryptographic tag; processing said assigned unique cryptographic tag using a cryptographic function specific to each Service Function, SF; and verifying, at a given point of the network architecture, said processed unique cryptographic tag by applying a cryptographic verification function composed by the inverse functions of the cryptographic functions associated to the SFs traversed by the at least one data packet.
Type:
Grant
Filed:
April 6, 2017
Date of Patent:
August 27, 2019
Assignee:
Telefonica, S.A.
Inventors:
Pedro A. Aranda Gutiérrez, Diego R. Lopez, Norisy C. Orea Barrios
Abstract: A system and method for validating proof of transit of network traffic through network nodes (N), the node (N) comprising a set of input interfaces (20) receiving incoming packets, a first module (A) to identify a matching route within a routing table (23) and storing means (22) to provide next modules (B, C, D) with two private keys if the packet is matched and/or the packet metadata includes OPoT information. The second module (B) decrypts the OPoT metadata using the first private key associated to the link of the node from which the incoming packets are received. The node (N) has SSS metadata to be processed by a third module (C) for the correct generation of cumulative validation parameters. When the SSS process is finished by the third module (C), the fourth module (D) re-encrypts the OPoT metadata using the second private key before packet forwarding to the subsequent node in the path through output interfaces (21).
Type:
Application
Filed:
February 17, 2019
Publication date:
August 22, 2019
Applicant:
Telefónica, S.A
Inventors:
Alejandro Aguado Martín, Vicente Martín Ayuso, Diego R. López, Antonio Pastor Perales, Víctor López Alvarez
Abstract: Method and System for Enabling Responsive Cognitive Behavioral Therapy by automatic monitoring of patients' behavior, determining significant changes of behavior and the progress of therapy and engaging with patients and/or therapists.
Type:
Application
Filed:
October 24, 2017
Publication date:
August 15, 2019
Applicant:
TELEFONICA INNOVACION ALPHA S.L.
Inventors:
Aleksandar MATIC, Oliver Thomas HARISSON, Remko VERMEULEN
Abstract: A method and a system for accessing through a second mobile telecommunication network to services offered by a first mobile telecommunication network comprising the steps of: establishing a first communication channel with the second network, based on a secondary SIM card; establishing a second communication channel with the first network using the first communication channel, wherein a user of the mobile communication device is authenticated using a primary SIM card; registering, through the second communication channel, the user of the mobile communication device into the first network using the information stored in the primary SIM card; and accessing from the mobile communication device to services offered by the first network through the second communication channel.
Type:
Grant
Filed:
October 11, 2017
Date of Patent:
July 23, 2019
Assignee:
TELEFONICA DIGITAL ESPAÑA
Inventors:
Jorge Serna, John Neystadt, David Gallegos
Abstract: A method for detecting applications of mobile user terminals, comprising: parsing files of an app to obtain domains of requests and splitting every domain into words to generate an app signature, weighting the words to obtain their frequency, splitting the mobile traffic into traffic blocks and each traffic block into words, generating a traffic vector for each block by including the repetition or frequency of each word in the block, comparing the generated traffic vectors with the generated signature by applying a similarity method to obtain the number of times that the signature is detected in the traffic vectors of a mobile terminal, estimating a probability of a user having the app installed in the mobile terminal, applying a threshold on the probability to discard wrongly detected applications.
Type:
Grant
Filed:
May 16, 2018
Date of Patent:
June 25, 2019
Assignee:
Telefónica, S.A.
Inventors:
Julia Llanos Alonso, Antonio Guzmán Sacristán, José Maria Alonso Cebrián
Abstract: The method comprises detecting, by an OLT when an ONU is connected to an optical termination point at a CPE of a user; notifying, by said OLT, a SDN controller; providing connectivity to said user to a dedicated and limited network providing access to a single self-provisioning web site by the SDN controller at least connecting said CPE to a service provider site; receiving, by the self-provisioning web site, credential information identifying the user on the self-provisioning web site, wherein the self-provisioning web site, once the user being connected therein, further receiving configuration information specifying which FTTH services the user wants to subscribe; and disconnecting, by the SDN controller, the user from the self-provisioning web site and reconnecting the user to a new network via a vCPE connected to said Internet service provider infrastructure and configured to provide access to Internet and to the subscribed FTTH services to the user.
Type:
Application
Filed:
November 28, 2018
Publication date:
May 30, 2019
Applicant:
TELEFONICA DIGITAL ESPAÑA, S.L.U.
Inventors:
Maria L. GARCIA OSMA, Alfonso Aurelio CARRILLO ASPIAZU, Carlos RALLI UCENDO, Daniel VELASCO BENITO
Abstract: Present invention provides a method, system and application for providing authentication of a mobile device user, based on the measurement of electromagnetic fields modified by a pre-established movement of a specific magnetic token associated to the user. This univocal process will be able to obtain new authentication factors, including something that the user owns (i.e., the token), something that the user knows (i.e., the interaction between the token and the device), and somewhere that the user is (i.e., where the interaction takes place).
Type:
Application
Filed:
November 8, 2018
Publication date:
May 16, 2019
Applicant:
Telefónica Digital España, S.L.U.
Inventors:
Aruna PREM BIANZINO, Rafael DE LAS HERAS DEL DEDO, Sergio DE LOS SANTOS
Abstract: A system, method and device to overcome the effects of mobility in OFDM wireless cellular networks. Individual beams are isolated and Doppler impairments are compensated so the constituent beams can reach the users in DL with ideally no Doppler impairments. Similarly in UL the signals corresponding to the different spatial beams are detected and their Doppler impairments compensated.
Abstract: The invention relates to a computer-implemented method for generating passwords and to computer program products of same. The method comprises: accessing, by a user (100), by means of a first computation device (200), for the first time, a webpage or website identified by a web domain that requires the Identification of the user (100) on the webpage or website; and generating, by means of a password generator, a password required by the webpage or website, based on the use of a result obtained from the execution of a cryptographic function using password policies related to the domain, the use of a master password (101) known only to the user (100) and the use of an Id_Hash (208).
Type:
Application
Filed:
April 19, 2016
Publication date:
April 25, 2019
Applicant:
TELEFONICA DIGITAL ESPAÑA, S.L.U.
Inventors:
Ricardo MARTÍN RODRÍGUEZ, Sergio DE LOS SANTOS VILCHEZ, Carmen TORRANO GIMÉNEZ, Antonio GUZMÁN SACRISTÁN, José María ALONSO CEBRIÁN
Abstract: A method to provide robustness against noise and interference in wireless communications, a transmitter and computer program products, involving sending to a receiver (13), through a wireless channel (12), information using a constant-envelope waveform with complex baseband representation of the form s[n]=Ac exp{j?[n]}.
Type:
Application
Filed:
August 2, 2018
Publication date:
February 7, 2019
Applicant:
TELEFONICA, S.A.
Inventors:
Javier LORCA HERNANDO, Carlos GONZÁLEZ SÁNCHEZ
Abstract: The distribution network comprising a plurality of caching nodes and wherein the web content had been statically identified as an uncacheable content and originated on an origin-server and wherein the method establishes a time to live, TTL, period value to said uncacheable content based on users requests and responds to said users requests by sending to at least to one CDN user said uncacheable content within said TTL period value. Each one of said plurality of caching nodes in said distribution network including a content caching manager and a pseudo-dynamic content TTL predictor and performing the following steps: a) contacting each one of said plurality of nodes with a centralized repository, in order to download the configuration file of a plurality of said CDN users.
Type:
Grant
Filed:
July 29, 2013
Date of Patent:
January 1, 2019
Assignee:
Telefonica, S.A.
Inventors:
Xiaoyuan Yang, Martin Ivan Levi, Carmelo Alexis Acosta Ojeda, Eguzki Astiz Lezaun, Armando Antonio Garcia Sanchez Mendoza, Pablo Rodriguez Rodriguez
Abstract: Method to perform joint scheduling in the downlink or in the uplink of a centralized OFDM radio access network for a plurality of users considering time, frequency and space domains, scheduler device thereof and computer program products. The method to be applied in the downlink or in the uplink of a centralized radio access network based on OFDM, whereby a set of remote radio heads of a set of remote units are connected to a central unit, that performs all (or part of) the radio-related processing tasks, wherein the scheduling exploit CoMP, NOMA and RF conditions and resource blanking techniques.
Abstract: A computer implemented method and network device for tracking OPT-OUT user preferences in a global communication network and computer programs thereof, The method comprising performing, by at least one a user, at least one operation request for a service of an online system (500); tracking, by a network device (300), said operation request and detecting if it is linked to a tracking mechanism, wherein: a) if it is not linked to a tracking mechanism, said network device (300), bypasses the operation request to said online system (500) without performing any action; or if it is linked to a tracking mechanism, the network device (300), identifies whether an OPT-OUT or an Opt-In status related to the user is included in the operation request and sends or not the operation request to a tracking server (600) depending on the result of said identification.
Type:
Grant
Filed:
January 12, 2016
Date of Patent:
November 6, 2018
Assignee:
TELEFONICA DIGITAL ESPANÑA, S.L.U.
Inventors:
Xiaoyuan Yang, David Guijarro Guillem, Arcadio Pando Cao, Martin I. Levi
Abstract: The method comprising: capturing and removing a public unique identifier set by a Website (300) in a computing device (100D) of a user (100); monitoring, during a first time-period, web-requests the user (100) makes to obtain a web-behavioral profile of the user (300), and storing the obtained web-behavioral profile as a first vector; tracking, during a second time-period, the web-requests to examine the effect each web-request has on assisting the de-anonymization of the user (100), obtaining a second vector; classifying, the obtained second vector taking into account a computed similarity score parameter; creating and mapping, a corresponding private unique identifier for said captured public identifier; and executing, based on said mapping between the private and the public unique identifiers, an intervention algorithm for said web-tracker, that considers a configured intervention policy.
Abstract: A computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof.
Type:
Application
Filed:
March 22, 2018
Publication date:
September 27, 2018
Applicant:
TELEFONICA DIGITAL ESPANA, S.L.U.
Inventors:
Aruna Prem BIANZINO, Carmen TORRANO GIMENEZ, Rames SARWAT, Salvador SANCHEZ TABOADA
Abstract: The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and authenticating said request by verifying user identification information of said user, wherein a second server in connection with a user computing device with a dedicated program is used for: receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication; verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status to said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid.
Type:
Grant
Filed:
June 23, 2014
Date of Patent:
August 28, 2018
Assignee:
TELEFONICA DIGITAL ESPANA, S.L.U.
Inventors:
Jose Maria Alonso Cebrian, David Barroso Berrueta, Jose Maria Palazon Romero, Antonio Guzman Sacristan
Abstract: A method and computer program products for probing the status of an IP-based communication connection in order to receive an incoming communication, the method comprising: receiving a request at a communication session controller (200) for establishing a communication session with a computing device (100) of a called user, and the sending, by the communication session controller (200) to said computing device (100), of a transport layer probe packet, or set thereof, to check IP-based connection availability of said computing device (100) for establishing an IP-based communication session.