H04W12/80

Dynamically sharing wireless signature data

Apparatuses, methods, systems, and program products are disclosed for dynamically sharing wireless signature data. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to detect a wireless signature emitted from an information handling device at a network-connected device and record wireless signature information for the information handling device based on the wireless signature. The code is executable by the processor to receive a request to share the wireless signature information with a requesting party. The code is executable by the processor to share the wireless signature information with the requesting party from the network-connected device in response to determining that the requesting party is an authorized party for receiving the wireless signature information.

SYSTEM AND METHOD FOR IMSI CATCHING IN 5G NETWORKS
20220338016 · 2022-10-20 ·

System and method that uses a first transceiver and a second transceiver, and a processor. The processor is configured to cause a cellular device associated with the 5G cellular network to communicate, to the first transceiver, a 5G identifier used by the device to identify itself, using the first transceiver. The processor is further configured to ascertain a correspondence between the 5G identifier and a Subscription Permanent Identifier (SUPI), by communicating with a core network of the 5G cellular network via a lawful-interception (LI) communication interface of the core network. The processor is further configured to cause the cellular device to register with the second transceiver, in response to ascertaining the correspondence and to the 5G identifier having been communicated from the cellular device.

SYSTEM AND METHOD FOR IMSI CATCHING IN 5G NETWORKS
20220338016 · 2022-10-20 ·

System and method that uses a first transceiver and a second transceiver, and a processor. The processor is configured to cause a cellular device associated with the 5G cellular network to communicate, to the first transceiver, a 5G identifier used by the device to identify itself, using the first transceiver. The processor is further configured to ascertain a correspondence between the 5G identifier and a Subscription Permanent Identifier (SUPI), by communicating with a core network of the 5G cellular network via a lawful-interception (LI) communication interface of the core network. The processor is further configured to cause the cellular device to register with the second transceiver, in response to ascertaining the correspondence and to the 5G identifier having been communicated from the cellular device.

Facilitation of smart communications hub to support unmanned aircraft for 5G or other next generation network
11627457 · 2023-04-11 · ·

Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.

Facilitation of smart communications hub to support unmanned aircraft for 5G or other next generation network
11627457 · 2023-04-11 · ·

Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.

MANAGEMENT, DIAGNOSTICS, AND SECURITY FOR NETWORK COMMUNICATIONS
20230108261 · 2023-04-06 ·

A system and method securely and selectively provide visibility along a communication path in end-to-end communications, while ensuring security of the transmission, and while further ensuring that unauthorized persons cannot view network packets. A separate parallel channel is used to provide visibility into data in transit to authorized parties, without revealing such data to unauthorized parties. In at least one embodiment, the separate parallel channel is implemented using a secure group messaging platform. In addition, all needed equipment is integrated in the end-to-end connection across layers and protocols into the secure messaging group. Secure, scalable messaging groups can be based on a ratchet tree protocol so as to guarantee forward as well as post-compromise security.

Systems and methods of data transformation for data pooling

A data anonymization pipeline system for managing holding and pooling data is disclosed. The data anonymization pipeline system transforms personal data at a source and then stores the transformed data in a safe environment. Furthermore, a re-identification risk assessment is performed before providing access to a user to fetch the de-identified data for secondary purposes.

CLEANING UP HANGING LAWFUL INTERCEPTION RESOURCES FROM A TRIGGERED POINT OF INTERCEPTION WHEN A TRIGGERING FUNCTION FAILS
20230209358 · 2023-06-29 ·

A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.

CLEANING UP HANGING LAWFUL INTERCEPTION RESOURCES FROM A TRIGGERED POINT OF INTERCEPTION WHEN A TRIGGERING FUNCTION FAILS
20230209358 · 2023-06-29 ·

A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.

Method and an Apparatus in a System for Analysis of Information Related to an Accident of a Vehicle
20230206766 · 2023-06-29 · ·

The present embodiments relate to a method in a system, a method in a network device, and a network device. The method includes: acquiring, from an entity, a notification of the occurrence of an accident of a vehicle in an area; requesting a RAN node and a CN node of the mobile operator to provide information regarding the vehicle; receiving from the CN node a combined information including information regarding communication with the vehicle and/or information of interest in said area provided to the core network node from vehicles and/or users, and/or devices present in said area where the accident occurred, and available information regarding the vehicle; and analyzing the received combined information.