H04M1/68

Monitoring of signalling traffic

Signalling messages may be monitored in a telecommunications network by receiving an indication of a signalling message for a network entity of the telecommunications network, the signalling message comprising a signalling dialog identifier. The signalling dialog identifier of the received signalling message is compared with a list of known signalling dialog identifiers relating to the network entity and the signalling message is categorized based on a result of the step of comparing, for example as suspicious. If a number of signalling messages for a network entity of the telecommunications network categorized as suspicious and having a common additional characteristic is at least a threshold value, an alert may be generated.

Device and method for controlling alarm according to unintended function in mobile terminal
09762723 · 2017-09-12 · ·

A method and device for controlling generation an alarm in a mobile terminal is provided. The method comprises: checking whether a request to operate a microphone has been made by an application intended by a user that initiates an audio processing function when a request to operate the microphone is received; generating an alarm indicating an abnormal microphone operation if the request is determined not to be from an intended application; and turning off the microphone in response to the indication of the abnormal microphone operation.

Device and method for controlling alarm according to unintended function in mobile terminal
09762723 · 2017-09-12 · ·

A method and device for controlling generation an alarm in a mobile terminal is provided. The method comprises: checking whether a request to operate a microphone has been made by an application intended by a user that initiates an audio processing function when a request to operate the microphone is received; generating an alarm indicating an abnormal microphone operation if the request is determined not to be from an intended application; and turning off the microphone in response to the indication of the abnormal microphone operation.

Blocked device checking in roaming scenarios
09763168 · 2017-09-12 · ·

In certain cellular communication systems, a roaming communication device may attempt to establish a connection with a visited wireless communication network. Before allowing the connection, the visited network may check to see whether the International Mobile Equipment Identity (IMEI) of the device has been listed in an Equipment Identity Register (EIR) as being blocked, and may refuse the connection if the IMEI is listed as being blocked. In addition, when the home network of the device receives a request to authorize usage of the device, the home network may also check its own EIR to determine whether the IMEI has been blocked. If the IMEI has been blocked in the EIR of the home network, the home network indicates to the visited network that the connection should be refused.

Audio system with noise interference mitigation
09800220 · 2017-10-24 · ·

Generally, this disclosure provides systems, devices, methods and computer readable media for an audio device with noise interference mitigation capability. The audio device may include an interference detection module to detect an interfering voice audio signal received from an interfering audio source. The device may also include an interference identification module to identify the interfering audio source. The device may further include an impact estimation module to estimate an impact of the interfering voice audio signal on a user of the audio device and a communication module to transmit a volume correction request to the interfering audio source. The volume correction request may be based on the identification and the estimated impact. Other embodiments may be described and claimed.

Wireless body area network, key generation method and key distribution method in the wireless body area network, and related device

The embodiments of the present disclosure are applicable to the technical field of computer science and application technology, and disclose a wireless body area network, a key generation method and a key distribution method in the wireless body area network, and a related device. The gait acceleration signal is extracted synchronously through the respective acceleration acquisition devices integrated with the coordinator and the wearable equipment, the position information corresponding to the peak value and the valley value in the gait acceleration signal is correspondingly extracted and is taken as the gait common information, and the gait common information is used to perform key distribution in the wireless body area network, the security and the consistency are higher, the calculation is simplified, the key distribution method is suitable for wearable devices having limited resources.

Cellular phone security pack method and apparatus
11354426 · 2022-06-07 · ·

A secure cellular communication system comprises a modified smartphone mated with a security pack. A Cryptographic module within the security pack encrypts all cellular outgoing data and decrypts cellular incoming data. The modified smartphone is modified to rout all cellular outgoing data and incoming data via the Cryptographic module within the security pack. The cellular MODEM may reside within the security pack while the phone's cellular MODEM is disabled, or the phone's cellular MODEM may be used.

Verifying incoming communications

Disclosed are systems, methods, and non-transitory computer-readable media for verifying an incoming communication. A recipient client device receives an incoming communication including an identifier identifying a second client device as having initiated the incoming communication. A verification service installed on the recipient client device queries a call placement service directory based on the first identifier. The call placement service directory maintains a listing of identifiers for client devices and corresponding communication providers that manage the identifiers. The call placement service directory returns information identifying the communication provider that manages the identifier. In turn, the verification service transmitting a request to the communication provider to confirm whether the second client device initiated the incoming communication. The verification service processes the incoming communication based on the response from the communication provider indicating whether the second client device initiated the incoming communication.

System and method to prevent unauthorized voice detection via fiber links

A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.

System and method to prevent unauthorized voice detection via fiber links

A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.