H04W12/12

Interferometry-based satellite location accuracy

According to one or more embodiments herein, interferometry-based satellite location accuracy is provided. In one embodiment, a method comprises: determining, generally at a substantially given time, a reference satellite having a known accurate location within angular proximity of a communication satellite having a known general location; determining an accurate angular position of the communication satellite with relation to the reference satellite from the perspective of at least one ground station antenna of a known accurate location; determining an additional location reference measurement of the communication satellite; determining an accurate location of the communication satellite at the substantially given time based at least in part on the accurate angular position of the communication satellite with relation to the reference satellite from the perspective of the at least one ground station antenna and the additional location reference measurement of the communication satellite; and utilizing the accurate location of the communication satellite.

System and method for defending unmanned aerial vehicles from hijack cyber attacks

The system and methods described herein aids in the defense of unmanned vehicles, such as aerial vehicles, from wifi cyber attacks. Such attacks usually do not last long and in the case of many point-to-point command and control systems, the attacks originate from close proximity to the unmanned vehicle. The system and methods described herein allow a team to rapidly identify and physically respond to an adversary trying to take control of the unmanned vehicle. Another aspect of the embodiment taught herein is to allow for the location of a wifi signal in a hands-free manner by able to visualize the source of the signal using an augmented reality display coupled to an antenna array.

Detecting fraud rings in mobile communications networks

An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

Detecting fraud rings in mobile communications networks

An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

Disseminating alerts or other notifications using ProSe direct discovery signaling

Aspects of the subject disclosure may include, for example, detecting, by a wireless communication device, a transmission, by a radio access network node, of an alert message, identifying contents of the alert message, determining that the wireless communication device is authorized to relay the contents of the alert message, generating alert information comprising the contents of the alert message, and transmitting a ProSe direct discovery message comprising the alert information. Other embodiments are disclosed.

Disseminating alerts or other notifications using ProSe direct discovery signaling

Aspects of the subject disclosure may include, for example, detecting, by a wireless communication device, a transmission, by a radio access network node, of an alert message, identifying contents of the alert message, determining that the wireless communication device is authorized to relay the contents of the alert message, generating alert information comprising the contents of the alert message, and transmitting a ProSe direct discovery message comprising the alert information. Other embodiments are disclosed.

Holistic fraud cocoon

Provided herein is a holistic fraud cocoon that protects a user from incoming or outgoing fraud and phishing communications by capturing, analyzing and either altering, discarding or presenting communications to the user. For example, the holistic fraud cocoon captures all incoming sources (mail, in-person visits, phone, TV, radio, newspapers and internet) and the actions performed by the user, triggered by those sources. Certain actions are held in a queue to be reviewed, validated and acted upon by a third party before the actions are executed.

Holistic fraud cocoon

Provided herein is a holistic fraud cocoon that protects a user from incoming or outgoing fraud and phishing communications by capturing, analyzing and either altering, discarding or presenting communications to the user. For example, the holistic fraud cocoon captures all incoming sources (mail, in-person visits, phone, TV, radio, newspapers and internet) and the actions performed by the user, triggered by those sources. Certain actions are held in a queue to be reviewed, validated and acted upon by a third party before the actions are executed.

CUSTOMIZATION OF DATA SESSION RETRY MECHANISM IN A WIRELESS PACKET DATA SERVICE NETWORK

In one embodiment, a method is provided for customization of a mobile communications device's data session retry mechanism in a wireless packet data service network. The mobile communication device requests activation of a data session with a node via the wireless network and receives a reject message via the wireless network in response to the request for activation of the data session, the reject message including a cause code. If the cause code corresponds to a no-retry behavior of the data session retry mechanism of the mobile communication device, the mobile communications device no longer requesting activation of a data session with the node.

CUSTOMIZATION OF DATA SESSION RETRY MECHANISM IN A WIRELESS PACKET DATA SERVICE NETWORK

In one embodiment, a method is provided for customization of a mobile communications device's data session retry mechanism in a wireless packet data service network. The mobile communication device requests activation of a data session with a node via the wireless network and receives a reject message via the wireless network in response to the request for activation of the data session, the reject message including a cause code. If the cause code corresponds to a no-retry behavior of the data session retry mechanism of the mobile communication device, the mobile communications device no longer requesting activation of a data session with the node.