Patent classifications
H04M1/68
Method and apparatus for transreceiving privacy information
A method and an apparatus for transmitting and receiving privacy information are disclosed. The method includes transmitting a connection (ATTACH) message including a terminal type indication, privacy type, privacy indication, and transmission period, receiving a connection complete (ATTACH ACCEPT) message; and transmitting location information. According to the embodiments of the present invention, the method and the apparatus for transmitting and receiving privacy information can provide an adequate protection for the privacy information in a terminal.
System and method for providing service using terminal scanning device, terminal scanning device applied to same, and operation method of terminal scanning device
Disclosed are a system and a method for providing a service using a terminal scanning device. When the terminal scanning device scans for a terminal located within a particular range, executes a particular application pre-installed in a terminal found through the scanning, and provides user information of the found terminal to a service server, the found terminal receives a particular service related to the user information from the service server through a link with the particular application executed by the terminal scanning device. Therefore, necessary information can be automatically provided to the terminal when the terminal approaches a particular place such as a shop or a building without a continuous scanning operation.
Spatial physical layer security in wireless communication systems
Certain aspects of the present disclosure provide techniques for wireless communication by a first wireless device. The first wireless device may participate in a beam forming procedure with a second wireless device to evaluate a plurality of transmit (TX) and receive (RX) beam pairs. The first wireless device may select one of the TX and RX beam pairs based on the evaluation. The first wireless device may determine at least one cryptographic key based on channel parameters associated with a selected one of the TX and RX beam pairs. The first wireless device may use the at least one cryptographic key for communications with the second wireless device.
SYSTEMS AND DEVICES FOR PROTECTING PRIVACY OF A USER OF A MOBILE DEVICE
The present invention provides one or more data protection systems configured to be mounted on a mobile device, the data protection system being configured and operable for protecting privacy of a user of the mobile device, by preventing remotely obtaining, from the mobile device, data indicative of surroundings of the mobile device including at least one of audio data, visual data and location data.
SYSTEMS AND DEVICES FOR PROTECTING PRIVACY OF A USER OF A MOBILE DEVICE
The present invention provides one or more data protection systems configured to be mounted on a mobile device, the data protection system being configured and operable for protecting privacy of a user of the mobile device, by preventing remotely obtaining, from the mobile device, data indicative of surroundings of the mobile device including at least one of audio data, visual data and location data.
Enhanced real-time messaging
A system includes a gateway that is configured to receive a message from a source for transmission to a destination and multiple communication channels on which to transmit the message to the destination, where the communication channels include different types of communication channels. The system includes a decision engine that is operably coupled to the gateway and the communication channels. The decision engine is configured to select a first communication channel from the communication channels to route the message for transmission to the destination. The decision engine is configured to select a second communication channel from the communication channels to route the message for transmission to the destination in response to a period of time expiring without receiving an acknowledgement from the destination via the first communication channel, where the second communication channel is a different type of communication channel than the first communication channel.
Anti-eavesdrop security device
A system and method to prevent eavesdropping by a device. An anti-eavesdrop component is installed on the device. The anti-eavesdrop component is configured to actively prevent the device from capturing audio from the environment. In response to installing the anti-eavesdrop component, the device recognizes the anti-eavesdrop component as a primary audio input for the device. The anti-eavesdrop component then proceeds to block the device from capturing outside audio by injecting noise or otherwise interfering with the primary audio input.
Mobile communication method and mobile station to prohibit retransmission of assistance information
An objective is to prohibit retransmission of “UE assistance information”. A mobile communication method according to the present invention includes the steps of: transmitting “UE assistance information” to a radio base station (eNB) by a mobile station (UE), the “UE assistance information” prompting the radio base station (eNB) to change a parameter for the mobile station UE used in the radio base station; notifying, by the radio base station (eNB), the mobile station (UE) of a transmission-prohibited period of the “UE assistance information”; and stopping, by the mobile station (UE), retransmission of the “UE assistance information” on the basis of the transmission-prohibited period.
System and method for establishing real-time location
A communication system with a master device configured to determine location information in real-time with respect to a portable device. The master device may direct one or more monitor devices to monitor communications that occur over a primary communication link. The monitor devices may sense characteristic information about the signal from the portable device, and communicate this characteristic information to the master device via an auxiliary communication link. The communication system may determine location of the portable device, authenticate the portable device, determine whether the portable device is authorized to allow or initiate an action, and command or enable an action with respect to equipment.
Systems and methods for detecting illegitimate devices on wireless networks
The disclosed computer-implemented method for detecting illegitimate devices on wireless networks may include (1) identifying a baseline signal strength for a wireless network, (2) monitoring a signal strength of the wireless network to obtain at least one additional signal strength measurement, (3) determining that the additional signal strength measurement varies from the baseline signal strength beyond a threshold, (4) determining, in response to determining that the additional signal strength measurement varies from the baseline signal strength, that an illegitimate device is present on the wireless network, and (5) initiating, in response to determining that the illegitimate device is present on the wireless network, a security action. Various other methods, systems, and computer-readable media are also disclosed.