H04W12/108

SOURCE DATA SECURED ON BLOCKCHAINS
20230046789 · 2023-02-16 ·

Technologies are shown for secure management of evaluation data. An evaluation value is received from a source entity. The evaluation value relates to an evaluation entity. Trusted source data secured in one or more data blocks on a first blockchain is searched for an entry corresponding to the source entity. Based on finding the entry corresponding to the source entity in the trusted source data, an evaluation score for the evaluation entity is obtained from the first blockchain or a second blockchain. The evaluation score was previously calculated based on one or more previous evaluation values for the evaluation entity and stored on the first blockchain or the second blockchain. A new evaluation score for the evaluation entity is calculated using the evaluation score and the evaluation value. The new evaluation score for the evaluation entity is securely committed to a new data block on the first blockchain or the second blockchain.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Mitigation of DDoS attacks on mobile networks using DDoS detection engine deployed in relation to an evolve node B
11503471 · 2022-11-15 · ·

Systems and methods for inspection of traffic between UE and the core network to mitigate DDoS attacks on mobile networks are provided. According to one embodiment, the method involves parsing SCTP packets and monitoring header anomalies to block anomalous packet floods. According to another embodiment, a memory table maintains requesting S1AP-IDs which have sent certain monitored commands and then blocking those which are sending these messages at abnormally high rates. According to yet another embodiment, a packet classifier parses the GTP-U protocol, unwraps the encapsulated IP packet and then monitors layer 3, 4 and 7 rate-based attacks such as UDP, ICMP, SYN, HTTP GET floods and drops them to protect the targeted Internet server as well as mobile infrastructure (e.g., the MME, the SGW, the PGW, and the PDN) downstream from the DDoS mitigation system.

Mitigation of DDoS attacks on mobile networks using DDoS detection engine deployed in relation to an evolve node B
11503471 · 2022-11-15 · ·

Systems and methods for inspection of traffic between UE and the core network to mitigate DDoS attacks on mobile networks are provided. According to one embodiment, the method involves parsing SCTP packets and monitoring header anomalies to block anomalous packet floods. According to another embodiment, a memory table maintains requesting S1AP-IDs which have sent certain monitored commands and then blocking those which are sending these messages at abnormally high rates. According to yet another embodiment, a packet classifier parses the GTP-U protocol, unwraps the encapsulated IP packet and then monitors layer 3, 4 and 7 rate-based attacks such as UDP, ICMP, SYN, HTTP GET floods and drops them to protect the targeted Internet server as well as mobile infrastructure (e.g., the MME, the SGW, the PGW, and the PDN) downstream from the DDoS mitigation system.

WIRELESS DEVICE AND NETWORK NODE FOR VERIFICATION OF A DEVICE AS WELL AS CORRESPONDING METHODS IN A WIRELESS COMMUNICATION SYSTEM
20220360981 · 2022-11-10 ·

The present invention relates to a method and wireless device for supporting verification of a device as well as to a method and a network node. It is desired to enable the reliable verification of a device. The method at the device includes transmitting the wireless device identifier; calculating verification information from a random bit sequence by using a verification function associated with the wireless device identifier, wherein the verification function uses the cryptographic key; transmitting a message including the verification information to a trusted network node over a secure connection; and wherein the secure connection is established by using a trusted network identifier or by using a network encryption key associated with a trusted network identifier.

METHODS AND DEVICES FOR SECURING A MULTIPLE-ACCESS PERIPHERAL NETWORK
20220360454 · 2022-11-10 ·

A description is given of a method for securing a multi-access edge computing network, where provision is made for a hardware security device designed to be connected to a host module of the network. The method, implemented by the hardware security device, includes upon reception of a presence request from the host module in the network, verifying whether the presence request comprises data representative of an identifier of the host module, and, if so, sending a presence response to the host module, comprising a signature of the hardware security device.

TAMPER-RESISTANT DATALINK COMMUNICATIONS SYSTEM
20220360993 · 2022-11-10 ·

This application relates to a tamper-resistant datalink communications system. The system may include a ground-based communications module configured to be coupled to a radio controller configured to remotely control a drone comprising one or more actuators and a remote-mounted communications module configured to communicate data with the ground-based communications module. The ground-based communications module may include a ground processor configured to: receive a plurality of first signals modulated with a first modulation scheme from the radio controller, convert the plurality of first signals to a second signal modulated with a second modulation scheme different from the first modulation scheme, and generate a plurality of second duplicated signals comprising two or more duplicate signals of the second signal. The ground-based communications module may also include a plurality of ground transmitters configured to operate in different frequencies and respectively transmit the plurality of second duplicated signals to the remote-mounted communications module.

Registration method and apparatus based on service-based architecture

Embodiments of this application provide a registration method and apparatus based on a service-based architecture. In this method, a management network element determines configuration information of a function network element, where the configuration information includes a security parameter; and the management network element sends the configuration information to the function network element. The function network element receives the configuration information sent by the management network element; and the function network element sends a registration request to a control network element based on the configuration information, where the registration request includes the security parameter. The control network element receives the registration request sent by the function network element, where the registration request includes the security parameter; and the control network element verifies correctness of the security parameter, and determines validity of the registration request based on the correctness of the security parameter.

SECURE VERIFICATION OF MEDICAL STATUS USING A CONTACTLESS CARD
20230039938 · 2023-02-09 · ·

Systems, methods, articles of manufacture, and computer-readable media for verification of medical status using a contactless card. An application may receive a request specifying a subject and a medical condition. The application may receive a cryptogram from a contactless card. The application may receive a decryption result from a server and determine that the server decrypted the cryptogram. The application may receive, from the contactless card, a medical attestation, a digital signature of the medical attestation, and a public key of the digital signature. The application may decrypt the digital signature based on the public key of the digital signature and verify the medical attestation based on the decrypted digital signature. The application may determine, based on the verification of the medical attestation, that the subject is immune to the medical condition. The application may output a result that the subject is immune to the medical condition.