H04L63/30

Selectively restricting communications from third party applications/devices to electronic devices

A method for providing access to a target electronic device through a first service running on a different electronic device may include receiving in the first service a command directed to the target electronic device from a command sender and receiving in the service device operation status parameters of the target electronic device. The device operation status parameters may include properties of the target electronic device such as a battery level, a battery charging rate, an age, a planned lifespan, a recent wireless usage, an internal temperature, or any of the above in relation to an intervening electronic device over which communication to the target electronic device travels, or any combination thereof. The method may also include using the device operation status parameters to determine, using the service, whether to provide or not to provide an update signal incorporating the command or information to the target electronic device.

Methods and apparatus for HyperSecure last mile communication
11627639 · 2023-04-11 ·

A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.

MANAGEMENT, DIAGNOSTICS, AND SECURITY FOR NETWORK COMMUNICATIONS
20230108261 · 2023-04-06 ·

A system and method securely and selectively provide visibility along a communication path in end-to-end communications, while ensuring security of the transmission, and while further ensuring that unauthorized persons cannot view network packets. A separate parallel channel is used to provide visibility into data in transit to authorized parties, without revealing such data to unauthorized parties. In at least one embodiment, the separate parallel channel is implemented using a secure group messaging platform. In addition, all needed equipment is integrated in the end-to-end connection across layers and protocols into the secure messaging group. Secure, scalable messaging groups can be based on a ratchet tree protocol so as to guarantee forward as well as post-compromise security.

Dynamic risk detection and mitigation of compromised customer log-in credentials
11621953 · 2023-04-04 · ·

This invention relates to a process for detecting and mitigating risk generated when a customer's log-in credentials are compromised. A significant majority of stolen credentials and customer's personally identifiable information data eventually make their way to the dark web. By dynamically monitoring the dark web and combining the analysis with related information about the user and their credentials on the deep web and the surface web, through a machine learning model, a service provider pre-emptively or otherwise can act to mitigate the risk arising from such compromise of said customer log-in credentials.

Dynamic physical watermarking for attack detection in cyber-physical systems

A cyber-physical system may have a plurality of system nodes including a plurality of monitoring nodes each generating a series of current monitoring node values over time that represent current operation of the cyber-physical system. According to some embodiments, a watermarking computer platform may randomly inject a watermarking signal into an injection subset of the system nodes. The watermarking computer platform may then receive current monitoring node values over time and generate a current watermarking feature vector based on the current monitoring node values. The watermarking computer platform might comprise a dedicated watermarking abnormality detection platform or a unified abnormality detection platform (e.g., that also uses data-drive feature vectors). The injection subset may be associated with a randomly selected subset of the system nodes and/or magnitudes of watermarking signals that are randomly selected.

Deperimeterized access control service

Techniques for deperimeterized access control are described. A method of deperimeterized access control may include receiving, by a controller of a deperimeterized access control service, a single packet authorization (SPA) request for a session ticket from an agent on a electronic device, wherein the agent sends the request for the session ticket in response to intercepting traffic destined for a service associated with the deperimeterized access control service and determining that the agent does not have a session ticket for the service, authorizing the SPA request, providing a session ticket to the agent based on the request, receiving, by a gateway of the deperimeterized access control service, a request to initiate a session with a service, the request including the session ticket, validating the session ticket, and providing session parameters to the agent to be used to initiate the session between the electronic device and the service.

Cloud application design for efficient troubleshooting
11647055 · 2023-05-09 · ·

Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue. The time interval is a set amount of time, and each collected packet is deleted at the expiration of the time interval.

OPERATION RELATED TO USER EQUIPMENT USING SECRET IDENTIFIER

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

Method and an Apparatus in a System for Analysis of Information Related to an Accident of a Vehicle
20230206766 · 2023-06-29 · ·

The present embodiments relate to a method in a system, a method in a network device, and a network device. The method includes: acquiring, from an entity, a notification of the occurrence of an accident of a vehicle in an area; requesting a RAN node and a CN node of the mobile operator to provide information regarding the vehicle; receiving from the CN node a combined information including information regarding communication with the vehicle and/or information of interest in said area provided to the core network node from vehicles and/or users, and/or devices present in said area where the accident occurred, and available information regarding the vehicle; and analyzing the received combined information.

Method and arrangements for QoS-aware routing in a LI system

A method and arrangements providing QoS-aware routing of received session flows of separate communication sessions comprising Communication Content achieved and received from Lawful Interception of target sessions. The method comprises sorting each separate communication session into one of two groups, a first routing group and a second routing group, according to certain criteria wherein QoS is at least one of the criteria. Further, the method comprises routing communication sessions sorted into the first routing group via a regular handover interface and routing communication sessions sorted into the second routing group via an additional handover interface to a Law Enforcement Agency.