H04W12/12

METHOD AND APPARATUS FOR SOLVING DENIAL-OF-SERVICE ATTACK, DEVICE, MEDIUM, AND COMPUTER PROGRAM PRODUCT
20230088071 · 2023-03-23 ·

A method includes: transmitting, by a session management function (SMF), a packet detection rule (PDR) and a quality of service (QoS) enforcement rule (QER) to a user plane function (UPF), the PDR being used for identifying a target packet transmitted by a terminal, and the QER being used for limiting transmission of the target packet, where the target packet is a packet that triggers a target core network element to initiate the DoS attack to the SMF.

COMMUNICATION METHOD AND COMMUNICATION SYSTEM
20230093635 · 2023-03-23 ·

A communication method applied to a first electronic apparatus includes, after establishing a communication connection with a second electronic apparatus, obtaining configuration information from the second electronic apparatus, monitoring a communication state between the first electronic apparatus and the second electronic apparatus, and saving or deleting second description information corresponding to the second electronic apparatus based on the configuration information after the first electronic apparatus is disconnected from the second electronic apparatus. The second description information includes information that represents uniqueness of the second electronic apparatus.

FRAUD DETECTION SYSTEM, FRAUD DETECTION DEVICE, FRAUD DETECTION METHOD, AND PROGRAM
20220351211 · 2022-11-03 ·

A fraud detection system for executing predetermined processing when a detection target is detected by using a detection device, the fraud detection system comprising at least one processor which determines, before the detection target is detected, whether a predetermined action has been performed by a user having a user terminal; executes, when it is determined that the predetermined action has been performed, fraud detection on the user based on identification information stored in the user terminal; and executes, when the detection target is detected, the predetermined processing based on an execution result of the fraud detection.

DYNAMIC SECURITY CODE

A system and method are disclosed for determining when to update and updating dynamic security codes. A user's payment information (e.g., credit card information) includes a dynamic security code that may be updated after a threshold amount of time passes or after successful transactions made using the dynamic security code. The time at which an update is made may be used to generate the updated dynamic security code. A user may specify a dynamic security code associated with the user's payment information (e.g., credit card information) while requesting a transaction be made with the user's credit card. A record of previously generated dynamic security codes is maintained. The transaction may be authorized based on whether the user-specified dynamic security code matches any of the current or previously generated dynamic security codes.

DETECTION OF UNLIKELY TRAVEL OF MOBILE DEVICES INDICATIVE OF FRAUDULENT MOBILE DEVICE USAGE
20230087506 · 2023-03-23 ·

The disclosed technology is directed towards detecting improbable speeds of a mobile device, which can indicate fraudulent activity with respect to the mobile device. Radio access network events and call detail records are processed to determine when a mobile device “travel jumps” between locations at improbable speeds. Events corresponding to handovers between adjacent cells are filtered out. For events corresponding to changed cell towers that are non-adjacent, further processing is performed to determine the speed of the mobile device travel between the cells. A first speed threshold is selected based on possible air travel (a cell near an airport) or a second non-air travel speed threshold is selected. If the speed of the mobile device exceeds the selected speed threshold, a travel jump is determined. Exceptions can be made for gaps in connectivity due to topography (known inconsistent reception areas) and for a mobile device shutting down and restarting.

SUBSCRIBER AUTHENTICATION RESPONSIVE TO EMERGENCY SERVICES REGISTRATION

Methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, via a server coupled to a network, a first signal that indicates a modification of one or more location descriptors corresponding to a communications device. The modification may occur in connection with receipt of the one or more location descriptors by an emergency services provider. The method may include storing a record of the modification of the one or more location descriptors in response to creation of one or more new location descriptors corresponding to a subscriber identifier, modification of one or more previously existing location descriptors corresponding to the subscriber identifier, or deletion of the subscriber identifier. The method may additionally include generating a second signal to form or update an electronic or digital identity of the communications device responsive to receiving the first signal.

SYSTEMS AND METHODS FOR AUTHORING AND MANAGING EXTENDED REALITY (XR) AVATARS

Systems and methods for digital avatars, specifically for fashion and consumer goods, are provided. This system is useful with an identified avatar, environment, and objects that a user may author, edit, and place. A user may deploy an avatar that resembles themselves via augmented reality, virtual reality, and other types of media. These systems include a user interface, administrative interface, economic systems and means of managing assets and protecting users' data. The systems incorporate mechanisms of controlling the avatar, means of integrating physical sensor data that interoperates with the virtual, and means of predicting related trends, choices, and behavior. Various features are employed for increased efficiency, accuracy, and believability. These features include machine learning to produce avatar features, AR map directions to interact with avatars, computer vision to enable the real-time translation of physical to virtual and social structures to enable groups of people to create and license digital assets.

CARRIER GRADE IDENTIFICATION OF SUBSCRIBER IDENTITY MODULE CARD-RELATED FRAUDULENT EVENTS
20230092778 · 2023-03-23 ·

The disclosed technology is directed towards detecting suspected malicious activity involving mobile devices and subscriber identity module (SIM) cards, including discerning benign SIM swap events from likely malicious SIM swap events. In one example, call detail records, radio access network events and billing events are collected and analyzed to detect subscriber identity module swap events between mobile devices. Based on the collected data and related data sources SIM swap events are classified as benign or suspected malicious classifications. Malicious classifications can result in information representative of the suspected as malicious classification being output, e.g., as a type of fraudulent activity. A confidence level can be associated with classification output data, including for types of fraudulent activities and types of benign activities.

CARRIER GRADE IDENTIFICATION OF SUBSCRIBER IDENTITY MODULE CARD-RELATED FRAUDULENT EVENTS
20230092778 · 2023-03-23 ·

The disclosed technology is directed towards detecting suspected malicious activity involving mobile devices and subscriber identity module (SIM) cards, including discerning benign SIM swap events from likely malicious SIM swap events. In one example, call detail records, radio access network events and billing events are collected and analyzed to detect subscriber identity module swap events between mobile devices. Based on the collected data and related data sources SIM swap events are classified as benign or suspected malicious classifications. Malicious classifications can result in information representative of the suspected as malicious classification being output, e.g., as a type of fraudulent activity. A confidence level can be associated with classification output data, including for types of fraudulent activities and types of benign activities.

Automatically integrating security policy in mobile applications at build-time

A mobile application development environment may be maintained in association with a computing platform. A request to produce a first mobile application with a first security policy may be processed. The first mobile application may be automatically produced. The first security policy may be integrated with the first mobile application during creation of the first mobile application. The first mobile application may be provided to a mobile application provider. The first security policy may be included in the first mobile application when the first mobile application is downloaded from the mobile application provider.