H04M1/66

Power coupling modulation transmission
11582612 · 2023-02-14 · ·

Embodiments of communication systems are disclosed for protecting communication between an implanted device ID and an external device ED. For example, a one way Transcutaneous energy transfer TET link may be used to secure two way communication over a radio channel. Optionally, the TET link may be protected from intrusion by a malicious party. For example, the TET link may be over a medium that decays very quickly over distance. In some embodiments, the TET link is used to pass an encryption key and/or to verify communications over the two-way radio channel. The TET channel may be authenticated. For example, authentication may include a minimum energy and/or power transfer.

Protected WiFi sensing measurements

This disclosure provides systems, methods, and apparatuses for wireless communication. In some aspects, An example method includes receiving, from a second wireless communication device, a frame associated with one or more wireless sensing measurements, verifying an integrity of the received frame associated with a message integrity code (MIC) in the received frame, and obtaining one or more wireless sensing measurements associated with the received frame.

Call screening service for detecting fraudulent inbound/outbound communications with subscriber devices

An example method of operation may include one or more of identifying an outbound call placed by a mobile device subscribed to a protected carrier network, determining the outbound call is destined for a destination telephone number that was stored in a call history of the mobile device, determining the destination telephone number is a scam call suspect telephone number based on one or more identified call filter parameters associated with the destination telephone number, and forwarding a scam call notification to the mobile device while the outbound call is dialing the destination telephone number.

Electronic apparatus and method of selectively applying security mode in mobile device
11595507 · 2023-02-28 ·

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.

System and Method for Capturing Data Sent by a Mobile Device
20230214376 · 2023-07-06 ·

Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.

System and Method for Capturing Data Sent by a Mobile Device
20230214376 · 2023-07-06 ·

Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.

Activation of cryptographically paired device
11540124 · 2022-12-27 · ·

An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.

Operation related to user equipment using secret identifier

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

Authentication techniques in response to attempts to access sensitive information

The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.

Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
11540123 · 2022-12-27 · ·

A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.