H04W12/108

Communication system architecture and method of processing data therein
11509623 · 2022-11-22 · ·

A method includes identifying a plurality of local tracklets from a plurality of targets, creating a plurality of global tracklets from the plurality of local tracklets, wherein each global tracklet comprises a set of local tracklet of the plurality of local tracklets, wherein the set of local tracklet corresponds to a target of the plurality of targets; extracting motion features of the target from the each global tracklet of the plurality of global tracklets, wherein the motion features of each target of the plurality of targets from each global tracklet of the plurality of global tracklets are distinguishable from the motion features of remaining targets of the plurality of targets from remaining global tracklets; transforming the motion features into an address code by using a hashing process; and transmitting a plurality of address codes and a transformation parameter of the hashing process to a communication device.

Devices, methods, and computer program for releasing transportation vehicle components, and vehicle-to-vehicle communication module

Devices, methods, and a computer program for releasing transportation vehicle components and a vehicle-to-vehicle communication module. The device for releasing a vehicle component of a transportation vehicle includes at least one interface for communication with further vehicle components of the transportation vehicle and a control module for controlling the at least one interface to receive messages from the further vehicle components of the transportation vehicle and to verify the identity of the further vehicle components based on the received messages and the stored identification data of the further vehicle components. The messages on which the verification of the identity of the further vehicle components is based are messages used in regular operation of the vehicle component. The control module also releases the vehicle component in response to the identity of the further transportation vehicle components being consistent with the stored identification data of the further vehicle components.

Processing of accident report

An example operation may include one or more of receiving, by an accident processing node, an accident report from a transport, determining, by an accident processing node, a time and location parameters of the accident based on the report, querying, by an accident processing node, transport profiles on a storage based on the time and location parameters, and responsive to the transport profiles containing data corresponding to the time and location parameters, sending a request to access the transport profiles.

SYSTEM ON A CHIP (SOC) COMMUNICATIONS TO PREVENT DIRECT MEMORY ACCESS (DMA) ATTACKS

This disclosure describes system on a chip (SOC) communications that prevent direct memory access (DMA) attacks. An example SoC includes an encryption engine and a security processor. The encryption engine is configured to encrypt raw input data using a cipher key to form an encrypted payload. The security processor is configured to select the cipher key from a key store holding a plurality of cipher keys based on a channel ID describing a {source subsystem, destination subsystem} tuple for the encrypted payload, to form an encryption header that includes the channel ID, to encapsulate the encrypted payload with the encryption header that includes the channel ID to form a crypto packet, and to transmit the crypto packet to a destination SoC that is external to the SoC.

DETECTING SIDELINK ATTACKS

There is provided an apparatus for a sidelink, SL, communication comprising means for transmitting a transport block, TB, via the SL communication, means for receiving a feedback in response to the transmitted TB, means for storing information contained in the transmitted TB upon receiving said feedback, means for receiving a status report comprising information associated with the TB, and means for comparing said information contained in the status report with said stored information contained in the transmitted TB in order to identify an attacker based on discrepancy between said information contained in the status report and said stored information contained in the transmitted TB.

DETECTING SIDELINK ATTACKS

There is provided an apparatus for a sidelink, SL, communication comprising means for transmitting a transport block, TB, via the SL communication, means for receiving a feedback in response to the transmitted TB, means for storing information contained in the transmitted TB upon receiving said feedback, means for receiving a status report comprising information associated with the TB, and means for comparing said information contained in the status report with said stored information contained in the transmitted TB in order to identify an attacker based on discrepancy between said information contained in the status report and said stored information contained in the transmitted TB.

Anonymous verification process for exposure notification in mobile applications

The present disclosure relates exposure notification, and in particular to techniques for verification of positive test results from public health authorities where individuals submit notice using public health approved mobile applications for exposure notification and/or contact tracing. When an individual attempts to submit a positive test result notification in a mobile application, the associated device's mobile number will be requested. This mobile number will then be sent a verification code to be entered in the application. At this point, these codes shall be stored digitally in escrow. A regular data feed from a health authority shall be provided that shall include an agreed encryption (irreversibly encrypted or reversibly encrypted) of the mobile numbers associated with any reported test. Any results submitted in the application that have a matching encryption of the mobile numbers shall be released from the escrow for subsequent notification.

Anonymous verification process for exposure notification in mobile applications

The present disclosure relates exposure notification, and in particular to techniques for verification of positive test results from public health authorities where individuals submit notice using public health approved mobile applications for exposure notification and/or contact tracing. When an individual attempts to submit a positive test result notification in a mobile application, the associated device's mobile number will be requested. This mobile number will then be sent a verification code to be entered in the application. At this point, these codes shall be stored digitally in escrow. A regular data feed from a health authority shall be provided that shall include an agreed encryption (irreversibly encrypted or reversibly encrypted) of the mobile numbers associated with any reported test. Any results submitted in the application that have a matching encryption of the mobile numbers shall be released from the escrow for subsequent notification.

Fake base station detection
11503472 · 2022-11-15 · ·

A mobile device collects received information and processes it. In some instances, the mobile device detects, based on the collected information, that a base station is likely not legitimate, i.e., it is likely a fake base station, and the mobile device bars communication with the base station for a time. In some embodiments, the mobile device determines, based on the received information, that the base station is a genuine base station. When the mobile device determines that the base station is a genuine base station or the mobile device does not determine that it is likely the base station is a fake base station, the mobile device allows or continues communication with the base station.

Fake base station detection
11503472 · 2022-11-15 · ·

A mobile device collects received information and processes it. In some instances, the mobile device detects, based on the collected information, that a base station is likely not legitimate, i.e., it is likely a fake base station, and the mobile device bars communication with the base station for a time. In some embodiments, the mobile device determines, based on the received information, that the base station is a genuine base station. When the mobile device determines that the base station is a genuine base station or the mobile device does not determine that it is likely the base station is a fake base station, the mobile device allows or continues communication with the base station.