Patent classifications
H04W12/125
FORWARDING METHOD, FORWARDING APPARATUS, AND FORWARDER FOR AUTHENTICATION INFORMATION IN INTERNET OF THINGS
Embodiments of the present application disclose a forwarding method, a forwarding apparatus, and a forwarder for authentication information in the Internet of Things. The method is applied to a constrained node and includes: receiving authentication information; determining whether the authentication information is received for the first time; and if the authentication information is received not for the first time, forwarding the authentication information; or if the authentication information is received for the first time, determining whether the authentication information is valid authentication information, and if the authentication information is not valid authentication information, discarding the authentication information, or if the authentication information is valid authentication information, verifying the valid authentication information, and forwarding the valid authentication information after the verification succeeds. The embodiments of the present application can reduce resources of the constrained node, and improve performance of the Internet of Things.
Diameter Edge Agent Attack Detection
In accordance with the example embodiments of the Invention there is at least a method and apparatus to detect that at least one message received from another network device of a communication network is in response to a prior message using a spoofed source address; based on the detecting, mirror the at least one message; and send to the another network device the mirrored at least one message to cause the another network device to filter out the at least one message in response to the prior message using the spoofed address. Further, there is at least a method and apparatus to receive from a network node signaling associated with at least one message; based on the signaling, detect that the at least one message is in response to a prior message using a spoofed source address; and based on the detecting, filter out the at least one message in response to the prior message using the spoofed source address.
Systems and methods for identifying rogue base stations
Methods and systems for identifying one or more rogue devices within a wireless communication network over a particular geographic location. A rogue base station detection system receives air interface transmissions from base stations belonging to a wireless communication network, as well as from one or more rogue base stations that do not belong to the network and are used for monitoring (e.g., hacking or eavesdropping) communication terminals communicating in the network. The system typically searches for signaling channels and converts the RF signal into GSM/UMTS messages including overcoming the different encryption methods used. The system than analyzes the received transmissions so as to identify suspicious transmissions that may be transmitted by the rogue base stations.
Optimal Communication Architecture for Smart Distribution Power Grid
A method for configuring a distribution grid with smart communication devices has steps of assuming specific communication technologies to be considered for intermediate intelligent communication devices in the distribution grid, assuming number and location of smart distribution nodes (SDNs) in the distribution grid, executing a cost optimal calculation model determining exact quantity and specific technology of intelligent communication devices at intermediate nodes, nt=n1; n2:::nj with minimal cost subject to Quality of Service (QoS) parameters of each technology and QoS requirement of a data packet generated by a Smart Consumer Node (SCN) at a smart building in the distribution grid, and placing and powering the determined number and specific communication technology of intelligent communication devices at the SDNs of the distribution grid.
Optimal Communication Architecture for Smart Distribution Power Grid
A method for configuring a distribution grid with smart communication devices has steps of assuming specific communication technologies to be considered for intermediate intelligent communication devices in the distribution grid, assuming number and location of smart distribution nodes (SDNs) in the distribution grid, executing a cost optimal calculation model determining exact quantity and specific technology of intelligent communication devices at intermediate nodes, nt=n1; n2:::nj with minimal cost subject to Quality of Service (QoS) parameters of each technology and QoS requirement of a data packet generated by a Smart Consumer Node (SCN) at a smart building in the distribution grid, and placing and powering the determined number and specific communication technology of intelligent communication devices at the SDNs of the distribution grid.
Methods and apparatus for correcting error events associated with identity provisioning
Methods and apparatus for correcting error events associated with identity provisioning. In one embodiment, repeated requests for access control clients are responded to with the execution of a provisioning feedback mechanism which is intended to prevent the unintentional (or even intentional) over-consumption or waste of network resources via the delivery of an excessive amount of access control clients. These provisioning feedback mechanisms include rate-limiting algorithms and/or methodologies which place a cost on the user. Apparatus for implementing the aforementioned provisioning feedback mechanisms are also disclosed and include specialized user equipment and/or network side equipment such as a subscriber identity module provisioning server (SPS).
Authentication Result Update Method and Communications Apparatus
An authentication result update method and a communications apparatus, where the authentication result update method includes: determining that an authentication result of a terminal device in a first serving network needs to be updated; and sending a first service invocation request to an authentication server, where the first service invocation request is used to request to update the authentication result stored in a unified data management device, where visited network spoofing can be prevented after authentication is completed, and where network security can be improved.
Method for monitoring an IOT device and using it as battery protection watchdog for IOT devices
A method of monitoring an Internet-of-Things (IoT) device. An objective is to provide can detection of device malfunction issues, help to prevent hacking attacks and increase the reliability of IoT devices and IoT networks will be solved by monitoring functional behavior of the device; verifying the functional behavior and comparing the functional behavior with defined configuration functional behavior limits of the device; initiating an action by a watchdog associated with the IoT device based on the comparison between the functional behavior and the defined configuration functional behavior limits of the device.
Mobile communication method, apparatus, and device
The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.
Mobile communication method, apparatus, and device
The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.