Patent classifications
H04M1/68
Proximity-based device access
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for proximity-based device access. In some implementations, a first electronic device receives, over a wireless communication link, a message from a second electronic device in proximity to the first electronic device. The first electronic device determines that the second electronic device has been previously associated with the first electronic device as an authentication factor for accessing the first electronic device. The first electronic device receives an encrypted form of a password from the second electronic device over the wireless communication link. The first electronic device determines the password from the encrypted form of the password and provides the password to software executing on the first electronic device to enable access to the first electronic device.
Technique for authenticating a user device
A technique for authenticating a user device with an application package server implementing an application. The device obtains a secondary identifier, allowing it to receive notifications relating to the application. Next, the device dispatches, while being identified by a main identifier associated with the device by way of a security module, a signalling message including the secondary identifier. Subsequent to this dispatching, the device receives a notification relating to the application which is addressed to it while being identified by the secondary identifier. This notification, the dispatching of which has been commanded by the application package server, includes the main identifier and an authenticator. The device then dispatches an authentication request to the application package server. This authentication request includes the main identifier and the authenticator that was received. The device is authenticated by the application package server by using this main identifier in association with this secondary identifier.
Interference generation
Examples associated with interference generation are described. One example system includes a personal digital assistant. A listening device in the system may receive voice input to control the personal digital assistant. An interference generator integrated with the listening device may generate a noise pattern to prevent the listening device from receiving voice input. An interface for the interference generator may allow a user to activate and deactivate the interference generator and provide a visual indicator describing whether the interference generator is active.
Systems and methods for detecting call provenance from call audio
Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.
Systems and methods for detecting call provenance from call audio
Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.
Security key generation and management method of PDCP distributed structure for supporting dual connectivity
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). A method for communicating by a user equipment with a macro cell base station and a small cell base station in a communication system is provided. The method comprises applying a first base station security key to a first communication link with the macro cell base station; generating a second base station security key to be used for a second communication link with the small cell base station based on the first base station security key; applying the second base station security key to the second communication link with the small cell base station; and communicating through at least one of the first communication link and the second communication link.
Providing secure access for automatically on-boarded subscribers in Wi-Fi networks
A default pre-shared key is provided from a first device to a second device. The first device is configured to control network access to a network. A first authentication request is obtained at the first device from a third device. The first authentication request includes data indicative of the second device. A first response to the first authentication request is provided from the first device to the third device. The first response includes the default pre-shared key. A second authentication request containing a private pre-shared key and the data indicative of the second device is obtained at the first device from the third device. Stored data at the first device is updated in response to the second authentication request with the private pre-shared key and the data indicative of the second device to provision the first device to provide network access to the network to the second device.
Method and electronic device for providing communication service
Provided is methods and device for providing a communication service. The method according to an embodiment includes generating a logical channel for communication between an electronic component included in a terminal and a local profile assistant (LPA) that is another electronic component in the terminal, generating a secure channel between the electronic component and the LPA when a secure area of the electronic device is selected by the LPA, and receiving profile data for providing the communication service from the LPA through the generated secure channel. An electronic device includes a processor configured to generate a logical channel for communication between one electronic component included in a terminal and a LPA that is another electronic component in the terminal, generate a secure channel between the electronic component and the LPA when a secure area of the electronic device is selected by the LPA, and receive profile data from the LPA.
System and method to prevent unauthorized voice detection via fiber links
A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.
System and method to prevent unauthorized voice detection via fiber links
A random acoustic phase scrambler device is installed in-line with a telecommunications fiber link to prevent voice detection via fiber links. The device includes a transducer to produce vibrations; a length of optical fiber positioned to receive the vibration from the transducer; and a random acoustic phase driver configured to control the intensity and frequency of the vibrations. The transducer produces randomized vibrations within an acoustic bandwidth. The device is configured to introduce device-induced phase changes to signals within the telecommunications fiber link. The bandwidth of the device-induced phase changes is greater than the bandwidth of voice-induced phase changes, and the device-induced phase changes are greater in intensity than the voice-induced phase changes. The device-induced phase changes mask voice-induced phase changes through the telecommunications fiber link that are otherwise detectable by voice detection equipment tapped to the telecommunications fiber link.