H04W12/121

ENHANCED VOICE MAIL ENVELOPE INFORMATION USING ENHANCED CALLING NAME AND CALLER IDENTITY ANALYTIC FUNCTIONS
20220394434 · 2022-12-08 ·

A method and apparatus for enhanced voice mail envelope information using enhanced calling name (eCNAM) and caller identity analytic functions in a wireless communication system is provided. A network determines to use a voice mail associated with a call based on a determination that the call is missed or rejected by a user equipment (UE) or a paging is unsuccessful, and stores enhanced calling name (eCNAM) related envelope information for the voice mail. The eCNAM related envelope information includes (i) a caller identity analytic data for the call, (ii) a caller identifier (ID) for the call, (iii) a trust level of the caller ID, and (iv) a time stamp for the voice mail. The network transmits, to the UE, the voice mail and the eCNAM related envelope information.

ENHANCED VOICE MAIL ENVELOPE INFORMATION USING ENHANCED CALLING NAME AND CALLER IDENTITY ANALYTIC FUNCTIONS
20220394434 · 2022-12-08 ·

A method and apparatus for enhanced voice mail envelope information using enhanced calling name (eCNAM) and caller identity analytic functions in a wireless communication system is provided. A network determines to use a voice mail associated with a call based on a determination that the call is missed or rejected by a user equipment (UE) or a paging is unsuccessful, and stores enhanced calling name (eCNAM) related envelope information for the voice mail. The eCNAM related envelope information includes (i) a caller identity analytic data for the call, (ii) a caller identifier (ID) for the call, (iii) a trust level of the caller ID, and (iv) a time stamp for the voice mail. The network transmits, to the UE, the voice mail and the eCNAM related envelope information.

In-process correlation through class field injection
11516234 · 2022-11-29 · ·

In one embodiment, a monitoring process modifies a class definition of an object of a monitored process to include an injected field. The monitoring process may then execute a first interception point of the monitored process, and sets, at the first interception point, the injected field to a given value. Upon executing a second interception point of the monitored process, the monitoring process can then read, at the second interception point, the given value in the injected field, and can use the given value at the second interception point for a corresponding correlation operation between the first interception point and the second interception point.

ACCESS POINT VERIFICATION USING CROWD-SOURCING
20220377554 · 2022-11-24 ·

Techniques are provided for verifying Access Points (APs) using crowd sourcing. In one example, a STA establishes a first non-verified connection, based on security material, with a source AP in a wireless infrastructure. A target AP in a wireless infrastructure obtains an indication that the STA is attempting to establish a second non-verified connection with the target AP. In response, the target AP establishes the second non-verified connection based on the security material.

Network anomaly detection

A method for detecting network anomalies includes receiving a control message from a cellular network and extracting one or more features from the control message. The method also includes predicting a potential label for the control message using a predictive model configured to receive the one or more extracted features from the control message as feature inputs. Here, the predictive model is trained on a set of training control messages where each training control message includes one or more corresponding features and an actual label. The method further includes determining that a probability of the potential label satisfies a confidence threshold. The method also includes analyzing the control message to determine whether the control message corresponds to a respective network performance issue. When the control message impacts network performance, the method includes communicating the network performance issue to a network entity responsible for the network performance issue.

Secure attestation packages for devices on a wireless network

A method and apparatus for authenticating a device on a wireless network using a secure attestation package is provided. The method includes receiving, by a processor, information related to a device of an Internet of Thing (IoT) service provider, generating, by the processor, a secure attestation package based on the information, transmitting, by the processor, the secure attestation package to the IoT service provider, receiving, by the processor, a request to access a wireless network of the processor from the device of the IoT service provider, and authorizing, by the processor, the device to access the wireless network based on the secure attestation package.

Secure attestation packages for devices on a wireless network

A method and apparatus for authenticating a device on a wireless network using a secure attestation package is provided. The method includes receiving, by a processor, information related to a device of an Internet of Thing (IoT) service provider, generating, by the processor, a secure attestation package based on the information, transmitting, by the processor, the secure attestation package to the IoT service provider, receiving, by the processor, a request to access a wireless network of the processor from the device of the IoT service provider, and authorizing, by the processor, the device to access the wireless network based on the secure attestation package.

NETWORK ANOMALY DETECTION

A method for detecting network anomalies includes receiving a control message from a cellular network and extracting one or more features from the control message. The method also includes predicting a potential label for the control message using a predictive model configured to receive the one or more extracted features from the control message as feature inputs. Here, the predictive model is trained on a set of training control messages where each training control message includes one or more corresponding features and an actual label. The method further includes determining that a probability of the potential label satisfies a confidence threshold. The method also includes analyzing the control message to determine whether the control message corresponds to a respective network performance issue. When the control message impacts network performance, the method includes communicating the network performance issue to a network entity responsible for the network performance issue.

ANOMALY DETECTION
20230054186 · 2023-02-23 · ·

A computer-implemented method comprising: providing data of at least one of distance, time, and velocity as at least one trajectory feature, the data defining a plurality of vehicle trajectories; computing for each vehicle trajectory a plurality of meta-features by computing, based on the data, at least one of a maximum value, a mean value, and a standard deviation of at least one of the at least one trajectory feature of each vehicle trajectory, so that each vehicle trajectory is represented by a point in a meta-feature space, the point defined by the plurality of meta-features; implementing a clustering algorithm on the points and selecting, based on a result of the clustering algorithm, at least one point as an anomaly; and selecting the at least one vehicle trajectory corresponding to the at least one point as at least one anomalous vehicle trajectory.

Security Of Wi-Fi Protected Setup Procedure
20230059872 · 2023-02-23 ·

Solutions pertaining to improvement in the security of a Wi-Fi Protected Setup (WPS) procedure are proposed. An access point (AP) determines that a WPS procedure is activated. In response, the AP varies a transmission (Tx) power in transmitting one or more WPS management frames during the WPS procedure. Moreover, the AP configures one or more credentials to a station (STA) in response to receiving one or more management frames from the STA.