Patent classifications
H04W12/12
DISSEMINATING ALERTS OR OTHER NOTIFICATIONS USING ProSe DIRECT DISCOVERY SIGNALING
Aspects of the subject disclosure may include, for example, detecting, by a wireless communication device, a transmission, by a radio access network node, of an alert message, identifying contents of the alert message, determining that the wireless communication device is authorized to relay the contents of the alert message, generating alert information comprising the contents of the alert message, and transmitting a ProSe direct discovery message comprising the alert information. Other embodiments are disclosed.
DISSEMINATING ALERTS OR OTHER NOTIFICATIONS USING ProSe DIRECT DISCOVERY SIGNALING
Aspects of the subject disclosure may include, for example, detecting, by a wireless communication device, a transmission, by a radio access network node, of an alert message, identifying contents of the alert message, determining that the wireless communication device is authorized to relay the contents of the alert message, generating alert information comprising the contents of the alert message, and transmitting a ProSe direct discovery message comprising the alert information. Other embodiments are disclosed.
Method for URL analysis and electronic device thereof
A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from contents, analyzing the URL, and displaying the analyzed result.
Method for URL analysis and electronic device thereof
A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from contents, analyzing the URL, and displaying the analyzed result.
Risk assessment using social networking data
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.
Risk assessment using social networking data
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.
Enabling functionality at a user plane function, UPF, by a session management function, SMF, in a telecommunication network
A method of enabling functionality at a User Plane Function, UPF, by a Session Management Function, SMF, in a telecommunication network. The method includes receiving, by the UPF, a session creation/modification message for creating/modifying a session between the UPF and the SMF, wherein the session creation/modification message includes a session functionality indication for indicating functionality to be enabled for said session, and enabling, by the UPF, the functionality during the session between said UPF and the SMF.
Enabling functionality at a user plane function, UPF, by a session management function, SMF, in a telecommunication network
A method of enabling functionality at a User Plane Function, UPF, by a Session Management Function, SMF, in a telecommunication network. The method includes receiving, by the UPF, a session creation/modification message for creating/modifying a session between the UPF and the SMF, wherein the session creation/modification message includes a session functionality indication for indicating functionality to be enabled for said session, and enabling, by the UPF, the functionality during the session between said UPF and the SMF.
Communications methods and apparatus for dynamic detection and/or mitigation of threats and/or anomalies
The present invention relates to methods and apparatus for dynamically detecting and/or mitigating threats in communications systems. Exemplary methods and apparatus of the present invention allow for a combination of automated and operator controlled responses to threats. While an operator is provided an opportunity to provide input on how to respond to a threat, after one or more threats of a given type are identified, the system will automatically take corrective action without waiting for operator input and/or in the absence of operator input following notification of a threat.
Method and apparatus for topology discovery enabled intrusion detection
The present invention discloses the method and apparatus for topology discovery enabled intrusion detection. In information and communications technology (ICT) systems, end devices are organized into subnets that are communicated with the system center through the multi-service gateways. Any intrusion can incur the variations of the communications environments and the subnet topologies. The potential external intruding devices are detected by the varied communications environments and identified by the difference between the original and new subnet topologies constructed by the topology discovery method. The information of potential external intruding devices is sent to the system center for device authentication. If passed, the device is kept associated and the system topology is updated with the newly discovered subnet topology. If failed, the device is enforced to disassociate, and an enhanced secure mode is triggered where the messages communicated over the intruded subnet are encrypted.