H04W12/125

MOBILE COMMUNICATION METHOD, APPARATUS, AND DEVICE
20210194920 · 2021-06-24 ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

MOBILE COMMUNICATION METHOD, APPARATUS, AND DEVICE
20210194920 · 2021-06-24 ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

Designating a voting classifier using distributed learning machines

In one embodiment, possible voting nodes in a network are identified. The possible voting nodes each execute a classifier that is configured to select a label from among a plurality of labels based on a set of input features. A set of one or more eligible voting nodes is selected from among the possible voting nodes based on a network policy. Voting requests are then provided to the one or more eligible voting nodes that cause the one or more eligible voting nodes to select labels from among the plurality of labels. Votes are received from the eligible voting nodes that include the selected labels and are used to determine a voting result.

CELLULAR INTERNET OF THINGS BATTERY DRAIN PREVENTION IN MOBILE NETWORKS
20210099487 · 2021-04-01 ·

Techniques for cellular Internet of Things (IoT) battery drain prevention in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for cellular IoT battery drain prevention in mobile networks includes monitoring network traffic on a service provider network at a security platform to identify a misbehaving application based on a security policy, wherein the service provider network includes a 4G network or a 5G network; extracting subscription identifier information for network traffic associated with the misbehaving application at the security platform; and enforcing the security policy at the security platform to rate limit paging messages sent to an endpoint device using the subscription identifier information and based on the security policy.

BROADBAND REPEATER WITH SECURITY FOR ULTRAWIDEBAND TECHNOLOGIES
20210058142 · 2021-02-25 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

Mobile communication method, apparatus, and device
10944786 · 2021-03-09 · ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes receiving, by user equipment (UE), a non-access stratum (NAS) security mode command message from a mobility management entity (MME), where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME, determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME, and, if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

Optimal Communication Architecture for Smart Distribution Power Grid

A method for implementing a micro grid within a Smart Distribution Power Grid (SDPG) has steps for connecting a smart meter enabled to sense voltage, to sense current and current direction and to communicate wirelessly to individual ones of consumer sites within an area of the micro grid, determining a set of Smart Distribution Nodes of a number, placement and data packet transfer technology to transfer data from the smart meters to a Micro Grid Controlling Station (MCS), the set determined in a manner to provide cost optimization, where cost is determined form at least original node costs, data packet hops, operating costs and maintenance costs, and implementing the set of SDNs along a power grid topology (PGT) of the micro grid, such that data is transmitted from each smart meter to a proximate SDN and through other SDNs to the MCS.

Optimal Communication Architecture for Smart Distribution Power Grid

A method for implementing a micro grid within a Smart Distribution Power Grid (SDPG) has steps for connecting a smart meter enabled to sense voltage, to sense current and current direction and to communicate wirelessly to individual ones of consumer sites within an area of the micro grid, determining a set of Smart Distribution Nodes of a number, placement and data packet transfer technology to transfer data from the smart meters to a Micro Grid Controlling Station (MCS), the set determined in a manner to provide cost optimization, where cost is determined form at least original node costs, data packet hops, operating costs and maintenance costs, and implementing the set of SDNs along a power grid topology (PGT) of the micro grid, such that data is transmitted from each smart meter to a proximate SDN and through other SDNs to the MCS.

Diameter edge agent attack detection
10893069 · 2021-01-12 · ·

In accordance with the example embodiments of the Invention there is at least a method and apparatus to detect that at least one message received from another network device of a communication network is in response to a prior message using a spoofed source address; based on the detecting, mirror the at least one message; and send to the another network device the mirrored at least one message to cause the another network device to filter out the at least one message in response to the prior message using the spoofed address. Further, there is at least a method and apparatus to receive from a network node signaling associated with at least one message; based on the signaling, detect that the at least one message is in response to a prior message using a spoofed source address; and based on the detecting, filter out the at least one message in response to the prior message using the spoofed source address.

Forwarding Method, Forwarding Apparatus, and Forwarder for Authentication Information in Internet of Things
20210006556 · 2021-01-07 ·

A forwarding method is applied to a constrained node and includes: receiving authentication information; determining whether the authentication information is received for the first time; and if the authentication information is received not for the first time, forwarding the authentication information; or if the authentication information is received for the first time, determining whether the authentication information is valid authentication information, and if the authentication information is not valid authentication information, discarding the authentication information, or if the authentication information is valid authentication information, verifying the valid authentication information, and forwarding the valid authentication information after the verification succeeds.