H04W12/125

Technique for handling accesses of user equipments

A technique for handling an access from a user equipment (110) accessing an application function (150) is provided. As to a method aspect of the technique, the access is received via a packet core network (140) of a mobile telecommunications network (100). The application function (150) determines that the access from the user equipment (110) fulfills a predefined access pattern. The application function (150) triggers sending of a control message to the packet core network (140) in response to the determination. The control message controls the packet core network (140) to terminate a session with the user equipment (110).

Technique for handling accesses of user equipments

A technique for handling an access from a user equipment (110) accessing an application function (150) is provided. As to a method aspect of the technique, the access is received via a packet core network (140) of a mobile telecommunications network (100). The application function (150) determines that the access from the user equipment (110) fulfills a predefined access pattern. The application function (150) triggers sending of a control message to the packet core network (140) in response to the determination. The control message controls the packet core network (140) to terminate a session with the user equipment (110).

BROADBAND REPEATER WITH SECURITY FOR ULTRAWIDEBAND TECHNOLOGIES
20230319609 · 2023-10-05 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

BROADBAND REPEATER WITH SECURITY FOR ULTRAWIDEBAND TECHNOLOGIES
20230319609 · 2023-10-05 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

Method and system for low power and secure wake-up radio

A wake-up radio system in a wireless sensor network, the wake-up radio comprising: an analog front end configured to communicate with matching network; an analog to digital converter coupled to the analog front end; and a digital baseband coupled to the analog to digital converter, wherein the digital baseband outputs a fast wake-up signal and a secure wake-up signal, and wherein the wake-up radio listens to all channels simultaneously.

Cellular internet of things battery drain prevention in mobile networks

Techniques for cellular Internet of Things (IoT) battery drain prevention in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for cellular IoT battery drain prevention in mobile networks includes monitoring network traffic on a service provider network at a security platform to identify a misbehaving application based on a security policy, wherein the service provider network includes a 4G network or a 5G network; extracting subscription identifier information for network traffic associated with the misbehaving application at the security platform; and enforcing the security policy at the security platform to rate limit paging messages sent to an endpoint device using the subscription identifier information and based on the security policy.

Cellular internet of things battery drain prevention in mobile networks

Techniques for cellular Internet of Things (IoT) battery drain prevention in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for cellular IoT battery drain prevention in mobile networks includes monitoring network traffic on a service provider network at a security platform to identify a misbehaving application based on a security policy, wherein the service provider network includes a 4G network or a 5G network; extracting subscription identifier information for network traffic associated with the misbehaving application at the security platform; and enforcing the security policy at the security platform to rate limit paging messages sent to an endpoint device using the subscription identifier information and based on the security policy.

MOBILE COMMUNICATION METHOD, APPARATUS, AND DEVICE
20220321599 · 2022-10-06 ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

MOBILE COMMUNICATION METHOD, APPARATUS, AND DEVICE
20220321599 · 2022-10-06 ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

Wireless PLC Attack Mitigation
20220272540 · 2022-08-25 ·

A device for detecting nefarious communication signals in a vehicle includes a detection support logic, a nefarious logic, a filtering circuit, and a microcontroller. The device receives a measurement signal from the detection support logic. The device determines a characteristic of an alternating current (AC) signal during communication at a first time on a wiring harness of the vehicle based on the measurement signal. The device determines the characteristic of the AC signal at a second time based on the measurement signal. The device determines that the characteristic measured during the first time differs from the characteristic measured during the second time. The device transmits a blocking signal to the nefarious logic to filter a frequency band of a communication conductor of the wiring harness in response to the determination that the characteristic measured during the first time differs from the characteristic measured during the second time.