H04W12/12

SECURITY INSPECTIONS

In some examples, a method for performing an out-of-band security inspection of a device comprises generating a snapshot of the state of the device, storing data representing the snapshot to a non-volatile storage of the device, and storing a hash of the snapshot in a device BIOS, transitioning the power state of the device, triggering boot of a trusted diskless operating system image, providing the data representing the snapshot and the hash of the snapshot to the trusted diskless operating system image, and executing a script selected on the basis of a trigger event and the hash of the snapshot to analyse at least a portion of the non-volatile storage of the device.

FILE SYSTEM PROTECTION APPARATUS AND METHOD IN AUXILIARY STORAGE DEVICE
20220374534 · 2022-11-24 ·

The present invention relates to a file system protection technology, which is applied to an auxiliary storage device (20), and to an apparatus and method for protecting a file system in a manner of blocking or warning about, in advance, an access to a file system or a change of the file system and identifying permission of a user as necessary. A control device (60) is connected to a host interface (30), a data storage device (40), and a user input device (50) to control an operation mode of the auxiliary storage device or manage and protect a file system object to be protected, according to a user command. When the operation mode of the auxiliary storage device is a management mode, the user can designate file system objects to be protected by the user and set a protection type, wherein information set by the user is stored in an object DB (70) to be protected. In a normal mode, when an access by a host computer targets a file system object listed in the object DB to be protected, a protection operation is performed by referring to the protection type of the object DB to be protected. In the normal mode, the host computer cannot access the object DB (70) to be protected, set in a setting mode by the user, and thus, the object DB (70) to be protected can be prevented from being changed or damaged by malicious code.

ELECTRONIC DEVICE AND A METHOD FOR DETERMINING A TRANSPORTATION PARAMETER OF A WIRELESS DEVICE
20220377500 · 2022-11-24 ·

An electronic device includes memory circuitry, a wireless interface, and processor circuitry. The processor circuitry is configured to obtain positioning data and movement data from a wireless device. The processor circuitry is configured to determine, based on the positioning data, one or more stops including a first stop of a transportation journey of the wireless device. The processor circuitry is configured to determine, based on movement data associated with the first stop, a transition parameter associated with the first stop. The processor circuitry is configured to determine whether the transition parameter satisfies a first criterion indicative of a change of transportation mode at the first stop. The processor circuitry is configured to output, based on the transition parameter, a transportation parameter.

FAST, SECURE, AND SCALABLE DATA STORE AT THE EDGE FOR CONNECTING NETWORK ENABLED DEVICES
20220377079 · 2022-11-24 ·

A distributed computing system provides a distributed data store for network enabled devices at the edge. The distributed database is partitioned such that each node in the system has its own partition and some number of followers that replicate the data in the partition. The data in the partition is typically used in providing services to network enabled devices from the edge. The set of data for a particular network enabled device is owned by the node to which the network enabled device connects. Ownership of the data (and the data itself) may move around the distributed computing system to different nodes, e.g., for load balancing, fault-resilience, and/or due to device movement. Security/health checks are enforced at the edge as part of a process of transferring data ownership, thereby providing a mechanism to mitigate compromised or malfunctioning network enabled devices.

Broadband repeater with security for ultrawideband technologies
11509386 · 2022-11-22 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

Customization of data session retry mechanism in a wireless packet data service network

In one embodiment, a method is provided for customization of a mobile communications device's data session retry mechanism in a wireless packet data service network. The mobile communication device requests activation of a data session with a node via the wireless network and receives a reject message via the wireless network in response to the request for activation of the data session, the reject message including a cause code. If the cause code corresponds to a no-retry behavior of the data session retry mechanism of the mobile communication device, the mobile communications device no longer requesting activation of a data session with the node.

Customization of data session retry mechanism in a wireless packet data service network

In one embodiment, a method is provided for customization of a mobile communications device's data session retry mechanism in a wireless packet data service network. The mobile communication device requests activation of a data session with a node via the wireless network and receives a reject message via the wireless network in response to the request for activation of the data session, the reject message including a cause code. If the cause code corresponds to a no-retry behavior of the data session retry mechanism of the mobile communication device, the mobile communications device no longer requesting activation of a data session with the node.

Control apparatus for gateway in mobile communication system
11595830 · 2023-02-28 · ·

A control apparatus for a gateway functioning as the endpoint of a core network in a mobile communication system is provided. The gateway includes a first server configured to receive data from a user apparatus and one or more second servers configured to transfer the data received by the first server to an external network. The control apparatus performs an operation of changing performance of the one or more second servers, an operation of monitoring a processing status of the one or more second servers, and an operation of selecting, from the one or more second servers in accordance with the processing status of the one or more second servers, a second server as a transfer destination of the data received from the user apparatus by the first server.

Control apparatus for gateway in mobile communication system
11595830 · 2023-02-28 · ·

A control apparatus for a gateway functioning as the endpoint of a core network in a mobile communication system is provided. The gateway includes a first server configured to receive data from a user apparatus and one or more second servers configured to transfer the data received by the first server to an external network. The control apparatus performs an operation of changing performance of the one or more second servers, an operation of monitoring a processing status of the one or more second servers, and an operation of selecting, from the one or more second servers in accordance with the processing status of the one or more second servers, a second server as a transfer destination of the data received from the user apparatus by the first server.

Device and method for verifying a component of a storage device

A storage device configured for hardware verification is disclosed. The storage device comprises a first hardware component comprising a connector and a first verification logic. The first validation logic is configured to detect a criterion and generate a first signal via the connector in response to detecting the criterion. The storage device also comprises a second hardware component coupled to the first hardware component via the connector. The second hardware component comprises a second validation logic, where the second validation logic is configured to monitor and receive the first signal via the connector. In response to receiving the first signal, the second validation logic is configured to compare the received first signal to an expected signal and generate a result. The storage device is configured to take an action in response to the result.