Patent classifications
H04W12/082
Systems and methods for proactive call spam/scam protection using network extensions
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.
Method, device, and system for securing an access to at least one service
In a method for securing access to a service, a device is set in a restricted operation mode that allows addressing only a first server and that is associated with a first identifier relating to a first connectivity gateway. The device accesses the first identifier and a subscription profile that is active during the restricted operation mode. The first server receives from the device a request for enrolling a device user and at least one feature relating to a user identity. The first server verifies whether the user identity feature is valid. If the user identity feature is valid, the first server sends to the device a command for deactivating the restricted operation mode. The device deactivates the restricted operation mode while storing, instead of the first identifier, a second identifier relating to a second connectivity gateway. The second identifier allows accessing a second server that manages the service.
Method, device, and system for securing an access to at least one service
In a method for securing access to a service, a device is set in a restricted operation mode that allows addressing only a first server and that is associated with a first identifier relating to a first connectivity gateway. The device accesses the first identifier and a subscription profile that is active during the restricted operation mode. The first server receives from the device a request for enrolling a device user and at least one feature relating to a user identity. The first server verifies whether the user identity feature is valid. If the user identity feature is valid, the first server sends to the device a command for deactivating the restricted operation mode. The device deactivates the restricted operation mode while storing, instead of the first identifier, a second identifier relating to a second connectivity gateway. The second identifier allows accessing a second server that manages the service.
On-demand security for network resources or nodes, such as for a wireless 5G network
The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
On-demand security for network resources or nodes, such as for a wireless 5G network
The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
System and method for monitoring the security configurations of connected devices
A system and method for monitoring and modifying the security configurations of multiple devices is disclosed. The method includes monitoring multiple devices for security triggers and taking action in response to the triggers. The triggers include changes in security configurations, known security issues and pending updates. The devices may be any connected devices, including Internet of Things devices.
Trusted Location Tracking
In accordance with some embodiments, an apparatus that enables trusted location tracking includes a housing arranged to hold a user equipment, one or more devices, a local communication device, and a controller at least partially supported by the housing. The apparatus obtains, via the one or more devices, a first set of data characterizing a location of the user equipment. The apparatus further establishes, via the location communication device, a local communication channel with the user equipment. The apparatus also obtains through the local communication channel a second set of data characterizing the location of the user equipment. The apparatus also determines a trust score characterizing the second set of data based on the first set of data. The apparatus additionally triggers an alert in accordance with a determination that the trust score is below a threshold.
Trusted Location Tracking
In accordance with some embodiments, an apparatus that enables trusted location tracking includes a housing arranged to hold a user equipment, one or more devices, a local communication device, and a controller at least partially supported by the housing. The apparatus obtains, via the one or more devices, a first set of data characterizing a location of the user equipment. The apparatus further establishes, via the location communication device, a local communication channel with the user equipment. The apparatus also obtains through the local communication channel a second set of data characterizing the location of the user equipment. The apparatus also determines a trust score characterizing the second set of data based on the first set of data. The apparatus additionally triggers an alert in accordance with a determination that the trust score is below a threshold.
Method and system for preventing a physical layer relay attack
There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.
Method and system for preventing a physical layer relay attack
There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.