H04M1/68

Method and apparatus for securing voice over IP telephone device
10873659 · 2020-12-22 · ·

A security implant device and a method of operation of the security implant, for securing Voice over IP (VoIP) phone, the implant device disables audio input and output components of the VoIP phone in order to prevent audio eavesdropping.

Systems and methods for two-factor remote user authentication
10867024 · 2020-12-15 ·

This invention discloses a system of remote user authentication to an authentication server, with a telephone interface to the authentication server that only receives routed calls that have originated from a cell phone in a cellular network and a call handling logic function which routs only those calls to the authentication server over the interface that have originated from a cell phone with a subscriber identity module (SIM) card and for which the cellular company maintains an individual subscriber identification data. In a different embodiment a remote user authentication system has different interfaces and different authentication processes that correspond with a telephone network interface and with a cellular telephone company network interface, enabling the authentication system to have different methods of authentication depending upon which interface a remote user connection authentication request originated from. The method uses the SIM card of a cell phone as a something you have factor as part of a two-factor authentication mechanism to an authentication server. The telephone network uses a call back feature.

Multi-domain trust establishment in edge cloud architectures

A service coordinating entity device includes communications circuitry to communicate with a first access network, processing circuitry, and a memory device. The processing circuitry is to perform operations to, in response to a request for establishing a connection with a user equipment (UE) in a second access network, retrieve a first Trusted Level Agreement (TLA) including trust attributes associated with the first access network. One or more exchanges of the trust attributes of the first TLA and trust attributes of a second TLA associated with the second access network are performed using a computing service executing on the service coordinating entity. A common TLA with trust attributes associated with communications between the first and second access networks is generated based on the exchanges. Data traffic is routed from the first access network to the UE in the second access network based on the trust attributes of the common TLA.

CELLULAR PHONE SECURITY PACK METHOD AND APPARATUS
20200364352 · 2020-11-19 · ·

A secure cellular communication system comprises a modified smartphone mated with a security pack. A Cryptographic module within the security pack encrypts all cellular outgoing data and decrypts cellular incoming data. The modified smartphone is modified to rout all cellular outgoing data and incoming data via the Cryptographic module within the security pack. The cellular MODEM may reside within the security pack while the phone's cellular MODEM is disabled, or the phone's cellular MODEM may be used.

Null data packet (NDP) structure for secure sounding

Methods and apparatuses for arranging sounding symbol are provided. An example apparatus comprises memory; and processing circuitry coupled to the memory. The processing circuitry is configured to encode a sounding signal. The sounding signal comprises a plurality of sounding symbols, and the repetition of sounding symbols to be transmitted in sequence is avoided.

Operation related to user equipment using secret identifier

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

Communication system
10820240 · 2020-10-27 · ·

A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.

Providing secure access for automatically on-boarded subscribers in Wi-Fi networks

A default pre-shared key is provided from a first device to a second device. The first device is configured to control network access to a network. A first authentication request is obtained at the first device from a third device. The first authentication request includes data indicative of the second device. A first response to the first authentication request is provided from the first device to the third device. The first response includes the default pre-shared key. A second authentication request containing a private pre-shared key and the data indicative of the second device is obtained at the first device from the third device. Stored data at the first device is updated in response to the second authentication request with the private pre-shared key and the data indicative of the second device to provision the first device to provide network access to the network to the second device.

Communication system
10813012 · 2020-10-20 · ·

A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.

Service-based security per data network name in mobile networks

Techniques for providing service-based security per data network name in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for service-based security per data network name in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting network name information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the network name information.