H04W12/125

Mobile communication method, apparatus, and device
10419938 · 2019-09-17 · ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes receiving, by a user equipment (UE), a non-access stratum (NAS) security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MME. Based on the first verification matching information, the UE determines whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MME. In response to determining that the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, the UE sends a NAS security mode complete message to the MME.

Distributed techniques for detecting atypical or malicious wireless communications activity
10419458 · 2019-09-17 · ·

Distributed techniques for detecting atypical or malicious wireless communications activity are disclosed. A server can iteratively generate sets of filters based at least in part upon observation data received from one or more Protects. The filters can be used by the Protect(s) to distinguish between sniffed wireless messages that are to be discarded and those that are to be reported to the server. The server can provide the generated sets of filters to the Protect(s) to cause the Protect(s) to process additional sniffed wireless messages utilizing the one or more sets of filters. Updated filters can cause fewer subsequent sniffed wireless messages to be reported than would have been reported by use of previous filters. Limited activity reporting by the Protect(s) enables a reduced communication load compared to full activity reporting without degrading the ability of the server to detect the atypical or malicious wireless communications activity.

Detection of leaky and rogue access points

Certain aspects relate to methods, apparatuses, computer readable mediums and access terminals that effectively (1) detect leaky or rogue access points and (2) take one or more actions based on such detection.

Apparatus for power theft detection on an electrical power grid

An apparatus reducing power theft on a micro power grid includes a server connected to the micro power grid, the server including a processor, data repository and software executing on the processor from a non-transitory medium the software enabling collection over time of bi-directional current data from smart distribution nodes connected to identified segments of the micro power grid and from smart meters distributed to one or more client demarcation points on the identified segments, processing of the bi-directional current data to determine power theft event frequency and power theft current information, assigning of a class to the individual ones of identified segments according to results of processing, and resetting of the number of packet transmission hop counts between the smart distribution nodes on identified segments and resetting the time period interval between subsequent power theft check routines for each identified segment based upon the classification data.

Portable instant cooling system with controlled temperature obtained through time-release liquid or gaseous CO2 coolant for general refrigeration use in mobile and stationary containers

Standalone and self-contained cooling systems using compressed liquid and/or gas CO.sub.2 containers positioned in an insulated or non-insulated vessel and consisting of a specially designed unit where the containers are vertically positioned in an upright or upside-down position. The liquid and/or gas CO.sub.2 coolant is then released into capillary tube(s) embedded into a heat transfer plate or heat exchanger thus leveraging the CO.sub.2 coolant properties. The temperature is controlled by a metering CO.sub.2 releasing system encompassing an electronic control device which can be operated remotely and/or via a touch screen and which sends alerts when pre-defined thresholds are exceeded. The invention's metering CO.sub.2 releasing system may be triggered by an electronic or a thermostatic valve or may be triggered manually or by an electronic solenoid. The invention's cooling system also encompasses check valves, which avoid liquid and/or gas CO.sub.2 from escaping when removing or replacing CO.sub.2 containers individually.

COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION CONTROL METHOD
20190171818 · 2019-06-06 · ·

A communication control device for a host vehicle including a plurality of host vehicle communication devices each including a different communication object, the communication control device including: an unauthorized state detector to detect an unauthorized state occurring from communication using an unauthorized host vehicle communication device out of the plurality of host vehicle communication devices; and a communication controller to execute control for transmitting host vehicle unauthorized state information related to the unauthorized state by using at least one normal host vehicle communication device out of the plurality of host vehicle communication devices excluding the unauthorized host vehicle communication device when the unauthorized state is detected.

Mobile communication method, apparatus, and device
12003533 · 2024-06-04 · ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MIME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MIME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

Mobile communication method, apparatus, and device
12003533 · 2024-06-04 · ·

The present disclosure relates to mobile communications technologies, and in particular, to a mobile communication method, apparatus, and device. The method includes: receiving, by user equipment UE, a non-access stratum NAS security mode command message from a mobility management entity MME, where the NAS security mode command message carries first verification matching information used to verify UE capability information received by the MIME; determining, by the UE based on the first verification matching information, whether the UE capability information received by the MME is consistent with UE capability information sent by the UE to the MIME; and if the UE capability information received by the MME is consistent with the UE capability information sent by the UE to the MME, sending, by the UE, a NAS security mode complete message to the MME.

BROADBAND REPEATER WITH SECURITY FOR ULTRAWIDEBAND TECHNOLOGIES
20190149223 · 2019-05-16 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

System and method for intelligent discovery and rescue of devices in an internet-of-things network
10250435 · 2019-04-02 · ·

A device network includes an Internet-of-things (IoT) device, a gateway device, a communication device, and a monitor system. The monitor system establishes a first communication path to the IoT device via the gateway device, determines that the gateway device has failed and that the first communication path has been interrupted, determines that the communication device is within communications range of the IoT device, and directs the communication device to establish a second communication path between the IoT device and the monitor system via the communication device in response to determining that the communication device is within communications range of the IoT device.