Patent classifications
H04W12/61
EVENT DETECTION AND MANAGEMENT FOR QUANTUM COMMUNICATIONS
The present disclosure describes event detection and management for quantum communications in a communication network. The event detection and management for quantum communications in a communication network may be provided based on event-based interaction between quantum nodes of the communication network and a network controller of the communication network, such as where the quantum nodes detect events associated with quantum communications and report the events associated with quantum communications to the network controller and where the network controller receives the events associated with quantum communications from the quantum nodes and initiates event management operations based on the events associated with quantum communications. The event detection and management for quantum communications in a communication network may be provided for various aspects of quantum communications, such as for quantum channels configured to support quantum information transfers, quantum information transfers via quantum channels, quantum applications, and so forth.
WIRELESS CONNECTIVITY MANAGEMENT AND HANDOFF CONTROL
A communication management system (such as hardware and/or executed software) receives performance information indicating wireless connectivity performance between a communication device and a set of candidate wireless access points. The communication device is initially in communication with a first wireless access point over a wireless link. Based on the performance information, the communication management system selects a candidate wireless access point from the set in which to performance a handoff. The communication management hardware the notifies the communication device to handoff the wireless link from the first wireless access point to the selected candidate wireless access point.
Transaction data processing method, computing device, and storage medium
A transaction data processing method includes: receiving a first transaction document from a device of a transaction initiator, the first transaction document being associated with identity labels of a plurality of transaction participants; separately performing identity authentication on the plurality of transaction participants according to the identity labels of the plurality of transaction participants, to obtain an identity authentication result. The method also includes adding the identity authentication result into the first transaction document when the identity authentication results indicates identity authentication of each of the plurality of transaction participants is successful, to generate a second transaction document carrying the identity authentication result; separately transmitting a signature request for the second transaction document to devices of the plurality of transaction participants; and generating a third transaction document according to responses returned by the devices of the plurality of transaction participants in response to the signature request.
Multi-state messenging anomaly detection for securing a broadcast network
An electronic device is disclosed, which is connectable with a CAN bus or other broadcast network. The electronic device programmed to compute expected periods and period variability metrics for historical accumulations of messages for different message headers and to identify periodic message headers based on the period variability metrics, and is further programmed to detect a temporal anomaly as a deviation of a period of a most recent set of two or more messages with a periodic message header from the expected period for the periodic message header, and to generate an alert indicating the detected temporal anomaly. The electronic device may be further programmed to maintain a state machine for a vehicle (or other platform) including the CAN bus and perform state-aware anomaly detection.
DATA PRODUCT GENERATION AND PRODUCTION BASED ON DYNAMICALLY SELECTED/OBFUSCATED VEHICLE LOCATION
A system configured to, and method of, transmitting connected vehicle data from a vehicle that includes carrying out a point of rest area learning process to obtain point of rest area(s); periodically obtaining a current geographical location of the vehicle; determining whether the vehicle is located within any of the point of rest area(s) based on the obtained geographical location; when it is determined that the vehicle is not located within any of the point of rest area(s), periodically transmitting the obtained geographical location; and when it is determined that the vehicle is located within any of the point of rest area(s), either transmitting an obfuscated geographical location or forgoing transmission of the obtained geographical location, wherein the obfuscated geographical location is an obfuscated representation of the obtained geographical location.
SYSTEMS AND METHODS FOR TEMPORARY SERVICE PROVISIONING
In some implementations, a first network device may receive an authorization request associated with a user device connecting to a network associated with first network device. The first network device may redirect the authorization request toward a second network device associated with a second service provider. The first network device may determine, based on a response to the authorization request, that the user device is subscribed to a service provided by the second service provider and that the user device is not authorized to connect to the network. The first network device may provide a temporary service to the user device to enable the user device to connect to the network for a limited period based on the user device being subscribed to the service provided by the second service provider and the user device not being authorized to connect to the network.
SECURELY VERIFYING PROTECTED DEVICES
One or more computing devices, systems, and/or methods for securely verifying devices such as protected are provided. A code may be generated for a first device. A short message service (SMS) message comprising the code may be transmitted to the first device at a mobile directory number of the first device. An entry may be created to associate the code with the mobile directory number. A determination may be made as to whether a first code within a message associated with the mobile directory number matches the code within the entry. In response to a match, the message may be processed and a status of the first device may be marked as valid, otherwise, the message may be rejected.
Methods, systems, and computer readable media for detecting and mitigating effects of timing attacks in time sensitive networks
A method for providing timing security in a time sensitive network (TSN), includes monitoring TSN times in timing synchronization packets exchanged between TSN network nodes. The method further includes monitoring TSN timing values calculated by TSN network nodes. The method further includes determining, using TSN times and TSN timing values, whether a timing attack is indicated. The method further includes, in response to determining that a timing attack is indicated, performing a timing attack effects mitigation action.
Methods, systems, and computer readable media for detecting and mitigating effects of timing attacks in time sensitive networks
A method for providing timing security in a time sensitive network (TSN), includes monitoring TSN times in timing synchronization packets exchanged between TSN network nodes. The method further includes monitoring TSN timing values calculated by TSN network nodes. The method further includes determining, using TSN times and TSN timing values, whether a timing attack is indicated. The method further includes, in response to determining that a timing attack is indicated, performing a timing attack effects mitigation action.
Protection against attacks in internet of things networks
Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which allows in-network and network-border protection for Internet of things (IoT) devices by securely partitioning network space and defining service-based access to IoT devices. The disclosed segmented attack prevention system for IoT networks (SAPSIN) segments the IoT network into two virtual networks: a service network and a control network; and define access control rules for each virtual network. In the service network, SAPSIN utilizes a service-based approach to control device access, allowing only configured protocol, applications, network ports, or address groups to enter or exit the network. In control network, the SAPSIN provides the access control rules by defining a threshold for the number of configuration requests within a predetermined time. As a result, SAPSIN protects IoT devices against intrusion and misuse, without the need for device-specific software or device-specific security hardening.