H04W12/12

Method and system for preventing a physical layer relay attack
11528612 · 2022-12-13 · ·

There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.

Method and system for preventing a physical layer relay attack
11528612 · 2022-12-13 · ·

There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.

Ransomware protection for cloud storage systems
11526611 · 2022-12-13 ·

Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.

Systems and methods for delayed-message attack mitigation
11528153 · 2022-12-13 · ·

A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.

FALSE BASE STATION DETECTION
20220394477 · 2022-12-08 ·

A user equipment (“UE”) in a wireless communication network can receive a plurality of signals from a plurality of nodes. The UE can further determine a plurality of radio signal strength measurements. Each radio signal strength measurement can be associated with a signal of the plurality of signals received from the plurality of nodes. The UE can further determine whether there is an indication that a first node of the plurality of nodes may be an imposter node based on the plurality of radio signal strength measurements.

FALSE BASE STATION DETECTION
20220394477 · 2022-12-08 ·

A user equipment (“UE”) in a wireless communication network can receive a plurality of signals from a plurality of nodes. The UE can further determine a plurality of radio signal strength measurements. Each radio signal strength measurement can be associated with a signal of the plurality of signals received from the plurality of nodes. The UE can further determine whether there is an indication that a first node of the plurality of nodes may be an imposter node based on the plurality of radio signal strength measurements.

ENHANCED VOICE MAIL ENVELOPE INFORMATION USING ENHANCED CALLING NAME AND CALLER IDENTITY ANALYTIC FUNCTIONS
20220394434 · 2022-12-08 ·

A method and apparatus for enhanced voice mail envelope information using enhanced calling name (eCNAM) and caller identity analytic functions in a wireless communication system is provided. A network determines to use a voice mail associated with a call based on a determination that the call is missed or rejected by a user equipment (UE) or a paging is unsuccessful, and stores enhanced calling name (eCNAM) related envelope information for the voice mail. The eCNAM related envelope information includes (i) a caller identity analytic data for the call, (ii) a caller identifier (ID) for the call, (iii) a trust level of the caller ID, and (iv) a time stamp for the voice mail. The network transmits, to the UE, the voice mail and the eCNAM related envelope information.

Method and device for detecting an attack on a serial communications system

A method for detecting an attack on a serial communications system which determines the status of messages transmitted via the serial communications system to obtain a sequence of statuses, compares the sequence of statuses with at least one reference sequence, and determines that there is an attack on the serial communications system in response to the sequence of statuses deviating from the reference sequence. The status of one of the messages is based on properties of the message and properties of a preceding message.

Identifying internet of things network anomalies using group attestation

An approach is provided that identifies Internet of Things (IoT) network anomalies. The approach receives IoT endpoint device data at an attestation entity included in the network. The data is logged to a secured ledger and analyzed. Conditions pertaining to the IoT endpoint devices are analyzed with the analysis being based on a set of network policy data. Based on the analysis, the approach detects network anomalies that correspond to the IoT endpoint devices. These network anomalies and their corresponding IoT endpoint devices are then reported.

Identifying internet of things network anomalies using group attestation

An approach is provided that identifies Internet of Things (IoT) network anomalies. The approach receives IoT endpoint device data at an attestation entity included in the network. The data is logged to a secured ledger and analyzed. Conditions pertaining to the IoT endpoint devices are analyzed with the analysis being based on a set of network policy data. Based on the analysis, the approach detects network anomalies that correspond to the IoT endpoint devices. These network anomalies and their corresponding IoT endpoint devices are then reported.