H04L63/304

Channel quality information feedback techniques

Various embodiments are generally directed to improved channel quality information feedback techniques. In one embodiment, for example, an evolved node B (eNB) may comprise a processor circuit, a communication component for execution by the processor circuit to receive a channel quality index for a physical downlink shared channel (PDSCH), the channel quality index associated with a defined reference resource, and a selection component for execution by the processor circuit to select a modulation and coding scheme (MCS) for transmission over the PDSCH of user equipment (UE) data in one or more resource blocks, the selection component to compensate for a difference between a cell-specific reference signal (CRS) overhead of the defined reference resource and a CRS overhead of the one or more resource blocks when selecting the MCS. Other embodiments are described and claimed.

METHOD AND SYSTEM FOR ELECTRONIC INSIDER THREAT PREDICTION

A system and associated method for insider threat prediction. The system includes a forensic data source, a threat prediction module, and a data collection module, wherein the data collection module is configured to collect subject data of a subject from the forensic data source, and transmit the subject data to the threat prediction module, wherein the threat prediction module is configured to receive subject data from the data collection module and analyze subject data to generate an insider threat output characterizing the insider threat level of the subject.

Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.

Systems and methods for detecting communication fraud attempts

The present disclosure provides a computer system, method, and computer-readable medium for a computer processor to detect, prevent and counter potentially fraudulent communications by proactively monitoring communications and performing multi-step analysis to detect fraudsters and alert communication recipients. The present disclosure may implement artificial intelligence (AI) algorithms to identify fraudulent communications. The AI model may be trained by real world examples to become more efficient.

CHANNEL QUALITY INFORMATION FEEDBACK TECHNIQUES

Various embodiments are generally directed to improved channel quality information feedback techniques. In one embodiment, for example, an apparatus for a base station is provided that includes a radio interface and a processor coupled to the radio interface. The processor is configured to receive a channel quality indicator (CQI) index, wherein the CQI index is based on a channel state information (CSI) reference resource, further wherein a first three orthogonal frequency-division multiplexing (OFDM) symbols of the CSI reference resource are occupied by control signals, select a modulation and coding scheme (MCS) for a physical downlink shared channel (PDSCH) based on the CQI index, and cause transmission of the PDSCH based on the selected MCS via the radio interface. Other embodiments are described and claimed.

SYSTEM AND METHOD FOR IDENTIFYING SERVICES WITH WHICH ENCRYPTED TRAFFIC IS EXCHANGED
20220337560 · 2022-10-20 ·

System and method to receive respective copies of communication packets exchanged, over a network, with respective communication endpoints belonging to respective servers, the packets containing respective endpoint identifiers, each of which includes a respective Internet Protocol (IP) address and port number identifying the communication endpoint with which the packet containing the endpoint identifier was exchanged. The processor is further configured to ascertain respective services that use the communication endpoints, by communicating investigative traffic over the network. The processor is further configured to store an association between the communication endpoints and the services, respectively, in the memory, in response to ascertaining the services.

Rank indicator inheritance for subframe restricted channel state information reporting

Generally, this disclosure provides devices, systems and methods for subframe restricted Channel State Information (CSI) reporting with Rank Indicator (RI) inheritance. A User Equipment (UE) device may include an RI generation module to generate RIs based on a received CSI configuration from an evolved Node B (eNB) of a serving cell of the UE. The UE may also include an RI Reference Process CSI generation module to generate a first Reference CSI including a first selected RI of the generated RIs, the first selection based on a first subframe set of the received CSI configuration, and to generate a second Reference CSI including a second selected RI of the generated RIs, the second selection based on a second subframe set of the received CSI configuration. The UE may further include a Linked Process CSI generation module to generate a linked CSI including an inherited RI from the first Reference CSI.

Interception aware access node selection
11689993 · 2023-06-27 · ·

In some example embodiments, there may be provided an apparatus including at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least: obtain information to enable selection of an access node for a non-GPP access; query a server to determine whether the country at which the access node is located requires lawful interception of communications; and select, based at least on the obtained information and/or a response to the query, the access node for the non-3GPP access. Related systems, methods, and articles of manufacture are also described.

SYSTEM AND METHOD FOR DECRYPTING COMMUNICATION EXCHANGED ON A WIRELESS LOCAL AREA NETWORK
20170310486 · 2017-10-26 ·

Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.

METHOD AND ENTITY IN A LI SYSTEM FOR POSITIONING OF A TARGET CONNECTED TO A WI-FI NETWORK

The present invention relates to a mediation function node in a Lawful Intercept system and a method (S100) in a Lawful Intercept system for enabling a Law Enforcement Agency, LEA, to determine targets' positions. Said targets are connected to a WiFi network via an Access Point. The method comprises steps of:—receiving (S110) a RADIUS account message for a subscriber having been accepted access to the WiFi network;—retrieving (S120) from the received RADIUS account message RADIUS parameters corresponding to an Access Point Identifier and a Service Set Identifier, SSID, if the subscriber is a target;—sending (S130) together with a target identification the RADIUS parameters corresponding to the Access Point Identifier and the SSID to the LEA.