Patent classifications
H04W12/80
Security registry and tracking system (SRTS)
A security registry and tracking system (SRTS) is described that aims to address a need for security by helping law enforcement identify individuals through tracking of movement of mobile devices, such as cellular phones. A computing device is directed to communicate with a mobile networking and tracking system configured to identify a mobile device entering a premise of a subscriber network; obtain an identification number of the mobile device; store the identification number of the mobile device and forward the identification number to at least one governmental authority system; and receive authentication data from the at least one governmental authority system. Further, the computing device can generate population records and identification databases based at least in part on the location information and the data transferred between the mobile networking and tracking provider and the security registry.
Security registry and tracking system (SRTS)
A security registry and tracking system (SRTS) is described that aims to address a need for security by helping law enforcement identify individuals through tracking of movement of mobile devices, such as cellular phones. A computing device is directed to communicate with a mobile networking and tracking system configured to identify a mobile device entering a premise of a subscriber network; obtain an identification number of the mobile device; store the identification number of the mobile device and forward the identification number to at least one governmental authority system; and receive authentication data from the at least one governmental authority system. Further, the computing device can generate population records and identification databases based at least in part on the location information and the data transferred between the mobile networking and tracking provider and the security registry.
METHOD FOR IDENTIFYING TERMINAL DEVICE AND COMMUNICATIONS APPARATUS
This application provides a method for identifying a terminal device and a communications apparatus. A core network element obtains classification information for classifying a terminal device, and then determines, based on the classification information and a parameter of a first terminal device, a type of the first terminal device, to identify the first terminal device. In this process, the core network element identifies the first terminal device in a supervision area by using the classification information and the parameter of the first terminal device, to identify a terminal device that is not registered in a supervision system, thereby improving security of the terminal device.
Securing method for lawful interception
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Securing method for lawful interception
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
TECHNIQUES FOR ASSOCIATING GEOLOCATION MEASUREMENTS IN ELECTRONIC INTELLIGENCE (ELINT) APPLICATIONS OR OTHER APPLICATIONS
A method includes obtaining multiple geolocation measurements, where each geolocation measurement is generated using cross-ambiguity function (CAF) detection. The geolocation measurements are associated with at least one signal from at least one signal source and received by multiple receivers. The method also includes associating related geolocation measurements to form at least one collection of related geolocation measurements, where each collection of related geolocation measurements is associated with a common one of the at least one signal received by at least some of the receivers. The method further includes performing geolocation using the at least one collection of related geolocation measurements to identify one or more geolocations of the at least one signal source.
DYNAMICALLY SHARING WIRELESS SIGNATURE DATA
Apparatuses, methods, systems, and program products are disclosed for dynamically sharing wireless signature data. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to detect a wireless signature emitted from an information handling device at a network-connected device and record wireless signature information for the information handling device based on the wireless signature. The code is executable by the processor to receive a request to share the wireless signature information with a requesting party. The code is executable by the processor to share the wireless signature information with the requesting party from the network-connected device in response to determining that the requesting party is an authorized party for receiving the wireless signature information.
Interception method and apparatus based on local breakout
The present disclosure provides a method and a device for interception based on Local Break Out (LBO). The method includes: receiving, by a small base station, an interception task instructing the small base station to intercept an interception target; intercepting, by the small base station, LBO data of the interception target based on the interception task to obtain intercepted data; and transmitting, by the small base station, the intercepted data. The present disclosure can solve the problem in the related art that data of an interception target cannot be intercepted in an LBO scenario.
Method and device for receiving data unit
In the present invention, service data units (SDUs) are delivered from a first layer to a second layer out-of-order irrespective of sequence numbers (SNs) of the SDUs. The second layer deciphers the SDUs in the order of reception from the first layer irrespective of the SNs. The second layer may reorders the deciphered SDUs in the order of the SNs, and delivers them to an upper layer in sequence.
DLP appliance and method for protecting data sources used in data matching
Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.