H04L63/1475

COMMUNICATION DEVICE AND METHOD FOR SECURE COMMUNICATION

A first communication device for use in a wireless communication system to communicate with a second communication device comprises circuitry configured to transmit probe signals into multiple directions, receive echo signals in response to the transmitted probe signals, and determine the position of a potentially eavesdropping communication device from the received echo signals.

METHOD, SYSTEM, AND CONVERSION APPARATUS
20220393987 · 2022-12-08 · ·

In order to able to mislead estimation regarding a transmission source through analysis of a communication traffic, a method according to an aspect of the present disclosure includes: dividing an original communication flow from a source apparatus into a plurality of communication flows matching a selected traffic characteristic; and transmitting a packet belonging to each of the plurality of communication flows to a reconstructing apparatus reconstructing the plurality of communication flows into the original communication flow.

Methods and Apparatus for Securing Communications
20220369111 · 2022-11-17 ·

A method includes generating an encoded and secured message comprising at least two parts, and transmitting the at least two parts of the encoded and secured message over at least two beam pair links (BPLs) associated with the first device and the second device, each part of the at least two parts being transmitted over a single BPL.

Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system

A quantum key distribution device is provided with an encoding unit which encodes an optical pulse train; an intensity modulating unit which subjects the encoded optical pulse train to N (where N is an integer at least equal to 3) types of intensity modulation having mutually different intensities, with different timings; and a first key distillation processing unit which generates an encryption key on the basis of a data sequence obtained by removing data obtained from an optical pulse having a specific modulation pattern from a data sequence used by the encoding unit and the intensity modulating unit.

Coordinating discrete systems

A provider of a first network-based service provides a list of user data for users of the first network-based service to a provider of a second network-based service. The users associated with the list of user data access results of the one or more identity monitoring services from the first network-based service, the second network-based service, a third-party identity monitoring service, or any suitable combination thereof. Additional services are offered to one or more users associated with the list of user data. A user accepting the offer pays a fee to the offering provider for the additional service. Based on the user being associated with the list of user data provided by the provider of the first network-based service and the user paying the fee for the additional service, a portion of the fee is transferred to the provider of the first network-based service.

SECURE LINK ESTABLISHMENT

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless communication device may receive, from a second wireless communication device, a discovery message that includes a service code. The first wireless communication device may verify the service code. The first wireless communication device may transmit, to the second wireless communication device, a connection message that includes a protected service code that is derived from the service code. Numerous other aspects are described.

THREAT CONTROL METHOD AND SYSTEM
20230097370 · 2023-03-30 ·

Disclosed is a system and a method of threat detection in a computer network, the method including detecting by a first node a security threat, e.g. relating to anomalous or malicious behavior, digital object and/or context, at the first node, collecting context information at the first node relating to the detected security threat, reporting at least one detected security threat and the collected context information to at least a second node, analyzing at the second node the received information relating to the security threat and collecting context information relating to the analysis at the second node, and sending the threat related information with added analysis and context information collected from the second node to at least one further node or backend.

DIRECTIONAL SECURE COMMUNICATIONS

Methods, apparatuses, and computer-readable medium for directional security are provided. An example method may include receiving, from a wireless device, a configuration for a set of shared keys. The example method may further include receiving, from a second UE, at least one message or signal including a location of the second UE, the received at least one message or signal being associated with an angle of arrival. The example method may further include configuring a key from the set of shared keys based on at least one of the received configuration, the location of the second UE, the AoA of the received at least one message or signal, or a location of the first UE. The example method may further include generating one or more ranging signals based on the configured key, the one or more ranging signals being directionally secure based on the location of the second UE.

Media access control (MAC) address anonymization based on allocations by network controller elements

A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.

Method for anonymizing network data using differential privacy

The invention described herein is directed to methods and systems for protecting network trace data. Network traces are used for network management, packet classification, traffic engineering, tracking user behavior, identifying user behavior, analyzing network hierarchy, maintaining network security, and classifying packet flows. In some embodiments, network trace data is protected by subjecting network trace data to data anonymization using an anonymization algorithm that simultaneously provides sufficient privacy to accommodate the organization need of the network trace data owner, provides acceptable data utility to accommodate management and/or network investigative needs, and provides efficient data analysis, at the same time.