H04W12/126

SIM SWAP FRAUD DETECTION
20220400384 · 2022-12-15 · ·

There is provided mechanisms for detecting SIM swap fraud. A method is performed by a classifier entity. The method comprises monitoring subscriber update data request messages sent as part of an update data procedure between a first network entity and a second network entity in a mobile network. The method comprises determining that one or more of the subscriber update data request messages is associated with SIM swap fraud by verifying that the subscriber update data request messages fulfil a set of conditions. The set of conditions pertain at least to: an MSISDN of a first subscriber entity in the mobile network within a first predefined timeframe is associated with more than one IMSI, and/or an IMSI of a second subscriber entity in the mobile network within a second predefined timeframe is associated with more than one MSISDN. The method comprises performing, upon the set of conditions is fulfilled for the one or more of the subscriber update data request messages, an action according to which the IMSI of the second subscriber entity is associated with SIM swap fraud.

Monitoring objects capable of wireless communications

A method of monitoring objects capable of wireless communications is provided. The method comprises detecting an activity performed by a user of a wireless communications device, acquiring information identifying an expected set of objects which are associated with the detected activity, determining whether at least one of the objects in the expected set is not in proximity of the wireless communications device, and if so notifying the user that at least one of the objects in the expected set is not in proximity of the wireless communications device.

Apparatus for playback sound source and method for playback sound source using the same
11586412 · 2023-02-21 · ·

A sound source playback apparatus includes a mounting unit, to which a sound source device may be attached and detached, and a control unit that recognizes tag information of the sound source device and performs authentication when the sound source is attached to the mounting unit, requests sound source data from the sound sources server according to a result of the tag information is authenticated, and playback the received sound source data. Accordingly, the sound source playback apparatus and the sound source playback method using the same allows permanently keep the high quality album and images of a favorite artist on a single purchase and playback a high quality sound source.

WIRELESS DEVICE AND NETWORK NODE FOR VERIFICATION OF A DEVICE AS WELL AS CORRESPONDING METHODS IN A WIRELESS COMMUNICATION SYSTEM
20220360981 · 2022-11-10 ·

The present invention relates to a method and wireless device for supporting verification of a device as well as to a method and a network node. It is desired to enable the reliable verification of a device. The method at the device includes transmitting the wireless device identifier; calculating verification information from a random bit sequence by using a verification function associated with the wireless device identifier, wherein the verification function uses the cryptographic key; transmitting a message including the verification information to a trusted network node over a secure connection; and wherein the secure connection is established by using a trusted network identifier or by using a network encryption key associated with a trusted network identifier.

SYSTEM AND METHOD FOR LOCATING WIRELESS ACCESSORIES

Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.

SYSTEM AND METHOD FOR LOCATING WIRELESS ACCESSORIES

Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.

Secured Network Intellingence That Contacts Help
20220357737 · 2022-11-10 ·

An encrypted intelligence networking system that takes car to car communication/C-V2X to the next stage of vehicle safety by enhancing how auto owners report vehicles stolen, while affording law enforcement tools that allow disabling and faster detection of stolen vehicles. Secured Network Intelligence That Contacts Help (SNITCH) system, designed for installation on vehicles which require DMV registration, would rely on 4G LTE and or 5G networks to quickly transmit data through secured bluetooth features, enabling stolen vehicles to release stolen status info and other vehicle information (e.g. VIN, direction of travel, owner contact information, etc.) exclusively to law enforcement vehicles within the desired range for communication. Upon detection of a stolen vehicle, officers would have the option to activate Offender Apprehension Mode (OAM), a feature designed to disable accelerating components and prevent high-speed chases that often end with deadly crashes.

Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication

An authorization process employs a network ID as a possession factor for a secure account, such as a bank account or e-mail account, and determines one or more risk indicators associated with the possession factor. The authorization process is successfully completed when a risk score that is based on the risk indicators is less than a certain risk threshold. The risk indicators include a device history of the network ID and/or at least one attribute of a cellular account associated with the network ID. The device history identifies other mobile devices and/or SIM cards, if any, that have been previously activated with the network ID, while the one or more attributes can further indicate potentially fraudulent activity associated with the cellular account through which wireless services for the network ID are currently provided.

COMPUTER-BASED SYSTEMS CONFIGURED FOR ONE-TIME PASSCODE (OTP) PROTECTION AND METHODS OF USE THEREOF

Systems and methods of anti-vishing OTP protection via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may comprise: receiving a permission indicator identifying a permission by the user to detect OTPs and calls being received by a computing device; receiving an indication of an OTP data item being received; processing the OTP data item to determine a time duration during which a particular OTP included therein is valid; utilizing a trained OTP protection machine learning model to determine phone number(s) as presenting a security risk with respect to the OTP data item; and instructing the computing device to commence at least one security measure based at least in part on a contact list updated with an indication that the phone number(s) present a security risk with regard to the particular OTP during the time duration of the particular OTP.

SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION

Embodiments of the invention are directed to systems, methods, and computer program products for providing intelligent proactive identification of, and protection against, malfeasant data collection, user device control, or user account access. The invention utilizes a continuous data analysis technique in order to recognize patterns in device data and network communications indicative of remote device control requests, and responds to these identified data points by implemented an automated solution to protect users against unauthorized access of their devices or accounts.