Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 26036. Отображено 100.
12-01-2012 дата публикации

Secure configuration of a wireless sensor network

Номер: US20120008783A1
Автор: Gabriel E. Montenegro
Принадлежит: Oracle International Corp

A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.

Подробнее
16-02-2012 дата публикации

System and method for monitoring and analyzing multiple interfaces and multiple protocols

Номер: US20120042382A1
Автор: Kevin Mahaffey
Принадлежит: LookOut Inc

The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of networks. The invention can provide security for many types of network interfaces on a mobile device, including: Bluetooth, WiFi, cellular networks, USB, SMS, infrared, and near-field communication. Data is gathered at multiple points in a given processing pathway and linked by a protocol tracking component in order to analyze each protocol present in the data after an appropriate amount of processing by the mobile device. Protocol analysis components are utilized dynamically to analyze data and are re-used between multiple data pathways so as to be able to support an arbitrary number of network data pathways on a mobile device without requiring substantial overhead.

Подробнее
29-03-2012 дата публикации

Mobile communication system and mobile terminal having function of inactivating mobile communication viruses, and method thereof

Номер: US20120079597A1
Автор: Ki Chul An
Принадлежит: PANTECH CO LTD

A mobile communication system for inactivating a virus includes: a database associated with the mobile communication system, for storing at least one virus vaccine program; and a virus monitoring unit associated with the mobile communication system, for checking virus infection of received data, analyzing virus information, choosing one of virus vaccine programs that are stored in the database and inactivating the virus. Virus vaccine programs are timely updated over the air (OTA) whenever a new version of vaccine program is available.

Подробнее
19-04-2012 дата публикации

Near-field communication (nfc) system providing nfc tag geographic position authentication and related methods

Номер: US20120094596A1
Автор: Piotr Tysowski
Принадлежит: Research in Motion Ltd

A near-field communication (NFC) system may include an NFC tag comprising a memory configured to store geo-position data corresponding to a geographic position of the NFC tag, and a first NFC sensor coupled to the memory and configured to initiate a transaction based upon NFC communications. The NFC system may further include a mobile wireless communications device comprising a second NFC sensor and a controller coupled thereto. The controller may be configured to establish NFC communications with the first NFC sensor when in proximity thereto and retrieve the geo-position data therefrom, authenticate a geographic position of the NFC tag based upon the retrieved geo-position data, and perform the transaction with the NFC tag if the geographic position of the NFC tag is authenticated.

Подробнее
19-04-2012 дата публикации

Method, system and apparatus for locking information

Номер: US20120094636A1
Принадлежит: Huawei Technologies Co Ltd

A method, system, and apparatus are described for locking information. Specifically, a server sends a lock message carrying lock object information to a mobile terminal; the mobile terminal locks a lock object according to the lock message, the lock object corresponding to the lock object information. With the solutions provided in the embodiments of the invention, a server may lock information for a mobile terminal, so as to prevent other servers from manipulating the information.

Подробнее
19-04-2012 дата публикации

Wireless intrusion prevention system and method

Номер: US20120096539A1
Принадлежит: Juniper Networks Inc

A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.

Подробнее
03-05-2012 дата публикации

Method and system for detecting characteristics of a wireless network

Номер: US20120110635A1
Принадлежит: MCI Communications Services Inc

Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.

Подробнее
07-06-2012 дата публикации

System for preventing establishment of unauthorized communication

Номер: US20120139691A1
Автор: Hiroshi Mori
Принадлежит: Tokai Rika Co Ltd

A system that prevents unauthorized establishment of wireless bidirectional communication between a communication master and a communication terminal. The system includes a strength measurement signal transmission circuit that transmits a received signal strength measurement signal, which is used to measure received signal strength at the communication terminal, a number of times with different transmission strengths during a single wireless bidirectional communication session. A received signal strength measurement circuit measures the received signal strength of the received signal strength measurement signal whenever the received signal strength measurement signal is received by the communication terminal. A measurement result transmission circuit transmits received signal strength measurement results as a single response signal to the communication master from the communication terminal during the single communication session. A check circuit checks whether the current bidirectional communication is authorized based on the received signal strength measurement results from the communication terminal.

Подробнее
07-06-2012 дата публикации

Cross-component message encryption

Номер: US20120140927A1
Принадлежит: Research in Motion Ltd

Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.

Подробнее
21-06-2012 дата публикации

Method for transmitting data in a sensor network, sensor node and central processor

Номер: US20120158903A1
Принадлежит: SIEMENS AG

A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node repeatedly transmits a status message comprising at least one unique identifier associated with the sensor node and a data value determined by the sensor node to the central processor. Furthermore, at least one secure value range message is provided to the central processor for the at least one sensor node, which message is valid for a particular time span and comprises at least bounds for valid data values. The value contained in the status message is further processed by the central processor only if the data value is within the bounds indicated in the value range message.

Подробнее
21-06-2012 дата публикации

Message-handling server and method for handling secure message attachments for a mobile device

Номер: US20120159164A1
Принадлежит: Individual

A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device.

Подробнее
21-06-2012 дата публикации

Method and Arrangement for Detecting Fraud in Telecommunication Networks

Номер: US20120159632A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

Method and arrangement in a mediating function ( 204 ) for supporting detection of fraud in a network, when a network security function ( 200 ) is employed for analysing activities in the network in view of predefined alert criteria, and a fraud detection function ( 202 ) is employed for analysing e.g. charging information of users. When a first alert is received from a first one of the network security function and the fraud detection function, indicating that the predefined alert criteria of said first function have been satisfied, the alert criteria of the second one of said network security function and fraud detection function are modified based on the received first alert. Thereby, the network security and fraud detection functions can be correlated and made more efficient regarding accuracy and/or speed in detecting fraud.

Подробнее
26-07-2012 дата публикации

Security feature negotiation between network and user terminal

Номер: US20120190343A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A Mobile Station (MS), a Base Station System (BSS) and a Mobile Switching Centre (MSC) of a cellular network, such as GSM, are disclosed. According to one embodiment, the MS is arranged to carry out one or more security features in its communication with the network. For example, the MS may be arranged to: by means of information received in a signalling message ( 0 ) from the network, discover if the network supports one or more of said security features, exchange information with the network in order to enable the use of one or more of the above-mentioned supported security features in the communication, carry out at least one of the one or more of the supported security features in the communication with the network.

Подробнее
26-07-2012 дата публикации

Methods, systems, and computer readable media for screening diameter messages within a diameter signaling router (dsr) having a distributed message processor architecture

Номер: US20120191847A1
Принадлежит: Tekelec Inc

According to one aspect, the subject matter described herein includes a method for screening Diameter messages within a Diameter signaling router (DSR) having a distributed message processor architecture. The method includes steps occurring at a DSR comprising a plurality of Diameter message processors, each configured to perform at least one Diameter function. The steps include receiving, at an ingress Diameter message processor of the Diameter message processors, a Diameter message from a Diameter peer node. The steps also include identifying, at a Diameter application message processor of the Diameter message processors, a Diameter message screening rule associated with the received Diameter message. The steps further include performing, at the Diameter application message processor of the Diameter message processors, a screening function associated with the identified Diameter message screening rule on the received Diameter message.

Подробнее
02-08-2012 дата публикации

Method for operating a node in a wireless sensor network

Номер: US20120195431A1
Принадлежит: KONINKLIJKE PHILIPS ELECTRONICS NV

The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal.

Подробнее
02-08-2012 дата публикации

Location verification in quantum communications

Номер: US20120195597A1
Принадлежит: Individual

Methods and systems for verifying the location of a communication transceiver using quantum communication channels are described. Communications transceivers at different known locations are used having a secure channel therebetween to verify the location of the communication transceiver at a location to be verified using entangled particles transmitted using the quantum communication channels.

Подробнее
09-08-2012 дата публикации

Method for remotely and automatically erasing information stored in sim-card of a mobile phone

Номер: US20120202462A1
Автор: Ashok Em Sudhakar
Принадлежит: Jayn International Pte Ltd

Embodiments of the present disclosure relate to a method and system for remotely and automatically erasing information stored in SIM card memory and mobile phone memory including memory card of a mobile phone 101 . The method includes sending a voice message comprising predetermined authentication parameters to a server 102 by an owner when the mobile phone 101 of the owner is lost. The method further includes authenticating the owner by the server 102 upon comparing the predetermined authentication parameters with the stored authentication parameters and sending activation signal by the server 102 to an erase application if the owner is authenticated. This signal will activate the erase application stored in the mobile phone 101 SIM card. The erase application generates destroy signal upon activation of the erase application to erase the information stored in the SIM card of the mobile phone 101.

Подробнее
09-08-2012 дата публикации

Authentication method and apparatus in a communication system

Номер: US20120204027A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

An authentication method and apparatus in a communication system are provided. In a method for authenticating a first node at a second authentication server in a communication system comprising the first node registered to a first authentication server and a second node registered to the second authentication server, an authentication request message requesting authentication of the first node is received from the second node, the authentication request message is transmitted to the first authentication server, and upon receipt of an authentication success message indicating successful authentication of the first node from the first authentication server, the authentication success message is transmitted to the second node.

Подробнее
16-08-2012 дата публикации

Detecting a trojan horse

Номер: US20120210431A1
Принадлежит: F Secure Oyj

A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same.

Подробнее
13-09-2012 дата публикации

Method for authentication of a remote station using a secure element

Номер: US20120233685A1
Принадлежит: Qualcomm Inc

Disclosed is a method for authentication of a remote station by a management station using a secure element. In the method, the remote station receives an identity request from the secure element. The identity request includes a first challenge provided to the secure element by the management station. The remote station forwards an identity response to the secure element. The identity response includes a response to the first challenge that is signed by a key of the remote station, and the signed response to the first challenge is for use by the management station to authenticate the remote station.

Подробнее
27-09-2012 дата публикации

Anti-theft mobile terminal and anti-theft method for mobile terminal

Номер: US20120244839A1
Автор: Shaowu Shen
Принадлежит: ZTE Corp

An anti-theft mobile terminal is disclosed, including: a setting module ( 10 ); an encryption module ( 11 ), configured to set a screen-lock password and an information return verification password of the mobile terminal; a password verification module ( 12 ), configured to verify a screen-unlock password input by a user; a detection module ( 18 ), configured to trigger a power management module ( 13 ) when detecting that an SIM card or battery has been pulled out, or the battery has run down longer than a preset duration; the power management module ( 13 ), configured to stop power supply from the battery of the mobile terminal and start a standby power supply to supply power to an information return module ( 14 ), an information deleting module ( 15 ), a positioning module ( 16 ), and an IMSI; the information return module ( 14 ), configured to verify a received information return verification password and return information saved in a set storage area after successful verification; the information deleting module ( 15 ), configured to delete the returned information; the positioning module ( 16 ), configured to position the mobile terminal, and periodically transmit positioning information to a network side or a specified mobile terminal. An anti-theft method for mobile terminals is also disclosed.

Подробнее
04-10-2012 дата публикации

Systems, methods, and media for generating hierarchical fused risk scores

Номер: US20120254243A1
Принадлежит: Victrio Inc

Systems, methods, and media for generating fused risk scores for determining fraud in call data are provided herein. Some exemplary methods include generating a fused risk score used to determine fraud from call data by generating a fused risk score for a leg of call data, via a fuser module of an analysis system, the fused risk score being generated by fusing together two or more uniquely calculated fraud risk scores, each of the uniquely calculated fraud risk scores being generated by a sub-module of the analysis system; and storing the fused risk score in a storage device that is communicatively couplable with the fuser module.

Подробнее
18-10-2012 дата публикации

Exploiting Application Characteristics for Multiple-Authenticator Broadcast Authentication Schemes

Номер: US20120265995A1
Принадлежит: GM GLOBAL TECHNOLOGY OPERATIONS LLC

A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.

Подробнее
25-10-2012 дата публикации

Method and apparatus for communication

Номер: US20120268293A1
Принадлежит: Continental Teves AG and Co oHG

The invention relates to a method for a vehicle to communicate with another vehicle or with an infrastructure device which has a particular range which is dependent on the current position of the vehicle. In order to ensure correct operation of the communication, the range to be expected for the communication is derived inter alia from the nature of the surroundings, which is dependent on the current position of the vehicle. The invention also relates to an appropriate apparatus for communication.

Подробнее
01-11-2012 дата публикации

Detection and filtering of malware based on traffic observations made in a distributed mobile traffic management system

Номер: US20120278886A1
Автор: Michael Luna
Принадлежит: Seven Networks Inc

Systems and methods for detections and filtering of malware based on traffic observations made in a distributed mobile traffic management system are disclosed. One embodiment of a method which can be implemented on a system includes, collecting information about a request or information about a response to the request initiated at the mobile device and using the information collected about the request or the response to identify or to detect malicious traffic. The information that is collected about the request or response received for the request initiated at the mobile device can be further used to determine cacheability of the response.

Подробнее
08-11-2012 дата публикации

Mobile service routing in a network environment

Номер: US20120281540A1
Принадлежит: Cisco Technology Inc

A data flow is received from a mobile network relating to a mobile subscriber. Subscriber data is received for the subscriber identifying a service path corresponding to the subscriber and at least one service policy corresponding to the subscriber, the service path including a set of network service nodes in a plurality of network service nodes. Packets of the data flow are routed according to the service path, the packets corresponding to a request for a resource. At least one packet is appended with service header data identifying the service policy. Each service node performs at least one service based on received request data, each service node in the set of service nodes performing a service defined in a service subscription of the subscriber. At least one particular service node in the set of network service nodes performs a particular service based at least in part on the service policy.

Подробнее
15-11-2012 дата публикации

Authenticated security system

Номер: US20120286929A1
Автор: Eric V. Kline
Принадлежит: International Business Machines Corp

An apparatus, system, and method are disclosed for detecting intruders within a home or business. The apparatus may include a signal generation module that generates a signal pulse. At least a portion of the signal pulse is reflected off individuals within the space. The signal pulse also includes instructions for an RFID tag to send a response message. A first distance is measured between the individual and a position sensor using the reflected portion of the signal. A second distance is measured between the RFID tag and the RFID reader. If the distances are substantially equal, the individual is treated as authorized to be in the space. If the distances are not equal, or if no response is received from the RFID tag, the individual is treated as unauthorized and security measures are taken.

Подробнее
15-11-2012 дата публикации

Communication system and communication method

Номер: US20120289194A1
Автор: Kaoru Uchida
Принадлежит: NEC Corp

To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.

Подробнее
15-11-2012 дата публикации

Controlling locking state transitions in a terminal

Номер: US20120291091A1

A method and a control module for controlling locking state transitions in a terminal are described, wherein said terminal is configured for checking said transition in accordance to one or more state transition rules and wherein the method comprises the steps of: providing at least one one-way writable memory location comprising first state information associated with a first locking state of said terminal; receiving a request for a transition to a second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said transition rules checking whether said requested transition is allowable or not; and, storing said second state information in said one-way writable memory if said requested transition is allowable according to said state transition rules.

Подробнее
22-11-2012 дата публикации

Systems and Methods to Detect Fraudulent Payment Requests

Номер: US20120295580A1
Автор: Katherine Corner
Принадлежит: Boku Inc

Systems and methods are provided to facilitate fraud detection in payments made via mobile communications. In one aspect, a system includes a data storage facility configured to store payment transaction records associated with phone numbers; and an interchange that includes a common format processor and a plurality of converters configured to interface with a plurality of controllers of mobile communications in transmitting premium messages to the phone numbers to collect funds for making payments on behalf of users of the phone numbers. The system includes a fraud detection engine configured to use the payment transaction records to detect a potentially fraudulent activity in payments requested via a phone number and configured to communicate with a server of a telecommunication carrier of the phone number to further process the activity based on an indication of abnormality in the telecommunication usage pattern of a mobile phone at the phone number.

Подробнее
29-11-2012 дата публикации

Wireless station location detection

Номер: US20120300708A1
Автор: Matthew S. Gast
Принадлежит: Trapeze Networks Inc

A technique for locating a device uses connectivity to find a distance between an access point (AP) and a device. The AP transmits a frame to a device and receives an acknowledgement frame from the device. The amount of time for a signal to pass between the AP and the device is estimated and multiplied by the speed of light to find the distance between the AP and the device.

Подробнее
29-11-2012 дата публикации

Secure execution of unsecured apps on a device

Номер: US20120304310A1
Автор: James Blaisdell
Принадлежит: Mocana Corp

An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a particular function. It is then determined which modules from the multiple modules perform some type of security function, for example, a function dealing with confidential or security-related data. These modules, forming a group of modules, are loaded into a trusted execution environment. The app is then re-bundled so that it has the first plurality of modules and the second plurality of modules. The app executes in a manner where the high security functions execute so that break points cannot be inserted into the app code. The re-bundling is done automatically in an app security wrapping process. Security constraints are added to the app.

Подробнее
06-12-2012 дата публикации

Device and method for checking the integrity of physical objects

Номер: US20120306629A1

The invention relates to a device for monitoring physical objects that comprises one or more short-range remote readers, memory elements to be attached to physical objects, and a controller adapted for executing a reading function capable of interaction with the one or more remote readers in order to acquire data contained in adjacent memory elements, and for executing an integrity validation function capable of distinguishing, from the acquired data, individual identifiers particular to each of the memory elements as well as group description data stored in at least some of said memory elements, and of checking the sufficiency of group description data while checking the compliance of individual identifiers with corresponding group description data.

Подробнее
06-12-2012 дата публикации

Situation aware security system and method for mobile devices

Номер: US20120309354A1
Автор: Wenliang DU
Принадлежит: SYRACUSE UNIVERSITY

A mobile communication device can comprise a microprocessor, a memory, and one or more sensors, all coupled to a system bus. A sensor can be provided by a GPS receiving device, an accelerometer, an image sensor, a radio frequency transceiver, or a magnetic card reading device. The mobile communication device can be configured, responsive to receiving sensor data from one or more sensors, to select a corresponding security alert level. The mobile communication device can be further configured to perform at least one security-related action corresponding to the selected security alert level.

Подробнее
13-12-2012 дата публикации

System And Method For Wireless Re-Programming Of Memory In A Communication System

Номер: US20120313744A1
Принадлежит: Johnson Controls Technology Co

The invention relates to a system and method of re-programming memory, and in particular, to wirelessly re-programming software, such as the application code, residing in memory of a trainable transceiver. The wireless re-programming of memory allows for software in the trainable transceiver to be updated or replaced from a remote location, where a direct or wired connection to the product is not otherwise available.

Подробнее
13-12-2012 дата публикации

Method for the authentication of applications

Номер: US20120314859A1
Принадлежит: Individual

Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application.

Подробнее
20-12-2012 дата публикации

Systems and Methods For Digital Forensic Triage

Номер: US20120322422A1
Принадлежит: ACES AND EIGHTS CORP

In one embodiment, a method for forensic triage may include coupling, communicatively, a computer and a mobile device. The computer can be booted with machine readable instructions stored on the one or more mobile memory modules of the mobile device. A search data set can be received with one or more mobile processors of the mobile device. One or more processors of the computer, the one or more mobile processors, or both, can execute, automatically, the machine readable instructions stored on the one or more mobile memory modules of the mobile device to search one or memory modules of the computer in a read only mode for triage data that corresponds to the search data set. The triage data can be transmitted via one or more communication modules of the mobile device.

Подробнее
03-01-2013 дата публикации

Rules based actions for mobile device management

Номер: US20130007245A1
Принадлежит: Fiberlink Communications Corp

Utilizing a server-based rules-based action framework, methods and systems gather status and configuration information about each of a plurality of mobile devices, which include devices from different mobile platforms. At the server, software processes monitor status information and respond automatically to changes, causing administrator-selected rules to be evaluated to determine if an action should automatically be initiated.

Подробнее
10-01-2013 дата публикации

System and method for processing encoded messages

Номер: US20130013714A1
Принадлежит: Research in Motion Ltd

Systems and methods for processing encoded messages within a wireless communication system. A server within the wireless communication system provides one or more indications to a mobile device as to certain conditions existing with respect to an encoded message. The mobile device performs a different message processing function based upon whether the indication is provided. The indications may include indicating whether a message exceeds a message size threshold and/or may indicate whether a partial message is being sent.

Подробнее
10-01-2013 дата публикации

Mobile communication terminal having a behavior-based malicious code detection function and detection method thereof

Номер: US20130014262A1
Принадлежит: Ahnlab Inc

A mobile communication terminal comprises: a system unit which performs application installation and removal, outputs an installation completion message upon completion of the application installation, and provides, upon receipt of request for authority information on the application, the requested authority information; a behavior information database in which behavior information data is stored; and an inspection unit which makes a request for the authority information to the system unit and receives the authority information, upon receipt of the installation completion message from the system unit, and which compares the authority information and the behavior information data stored in the behavior information database to examine whether the application is a malicious code or not.

Подробнее
31-01-2013 дата публикации

Method and apparatus for protecting software of mobile terminal

Номер: US20130031375A1
Автор: Hua Lin
Принадлежит: ZTE Corp

A method for protecting software of a mobile terminal is provided in the disclosure, wherein an encryption chip is mounted in the mobile terminal. The method includes: when the mobile terminal is turned on, whether or not the encryption chip is invalid is detected; when it is not invalid, the encryption chip authenticates the software of the mobile terminal through interaction with a main chip; when the authentication is not passed, the encryption chip controls a functional module of the mobile terminal through a hardware protection circuit. An apparatus for protecting software of a mobile terminal is also provided in the present disclosure. The solution of the disclosure can prevent the software of the mobile terminal from being cracked and protect the functions of the mobile terminal from illegal usage, thus the security of the mobile terminal is greatly improved and the interests of operators and manufacturers are protected.

Подробнее
07-02-2013 дата публикации

Secure Mobile Communication System and Method

Номер: US20130035062A1
Автор: Moshe M. Vered
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A security level indicator for a mobile communication device is adapted to alert a user of a device when the weighed combination of security-related parameters reaches a predefined level.

Подробнее
21-02-2013 дата публикации

Advanced Machine-To-Machine Communications

Номер: US20130046821A1
Принадлежит: Renasas Mobile Corp

There are provided measures for advanced machine-to-machine communications. Such measures may exemplarily includes conducting machine-to-machine packet transmission of a machine device residing in a connected mode by using a bearer connection with a security context, causing transition of the machine device from the connected mode to an intermediate mode, in which the machine device is neither in connected mode nor in idle mode, after completion of the machine-to-machine packet transmission, and keeping the security context of the connection for the intermediate mode, and causing transition of the machine device from the intermediate mode to the connected mode after elapse of an inactivity period of the machine-to-machine packet transmission, and conducting machine-to-machine packet transmission of the machine device residing in the connected mode by reactivating the bearer connection with the kept security context.

Подробнее
14-03-2013 дата публикации

METHOD AND SYSTEM FOR CREDENTIAL MANAGEMENT AND DATA ENCRYPTION FOR iOS BASED DEVICES

Номер: US20130067232A1
Принадлежит: Individual

A mechanism and method for managing credentials on an electronic device and providing encryption and decryption services for the electronic device comprising a mobile communication device, smart phone or other computing device. According to an embodiment the device is configured with an iOS based operating system. The device is configured with a data encryption service application and an associated secure data repository. According to an embodiment, the electronic device is configured to download and/or cache credentials from a credential management system operatively coupled to the device, comprising public-private key pairs in a PKI system. According to an embodiment, the electronic device is configured with or stores a digital verification signature. The data encryption service application is configured to encrypt/decrypt data (e.g. files, documents) and optionally digitally sign the encrypted file. The encrypted (and digitally signed data) is contained in the sandbox associated with the data encryption service application.

Подробнее
21-03-2013 дата публикации

Method and Apparatus for Verifying Network Management Short Message of Wireless Public Phone

Номер: US20130072238A1
Автор: Liqiang Cao
Принадлежит: ZTE Corp

The present invention relates to a method and apparatus for verifying a network management short message of a wireless public phone. The method comprises: receiving a network management short message containing a sending party number, a sending party short message center number and a short message content; comparing the sending party number with a pre-stored number; when the sending party number is consistent with the pre-stored number, comparing the sending party short message center number with a pre-stored short message center number; when the sending party short message center number is consistent with the pre-stored short message center number, comparing the short message content in the network management short message with a pre-stored short message content; and when the short message content in the network management short message is consistent with the pre-stored short message content, confirming that the verification of the network management short message succeeds.

Подробнее
04-04-2013 дата публикации

Cryptanalysis Method and System

Номер: US20130083918A1
Автор: Elad Barkan, Eli Biham
Принадлежит: Individual

A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R 4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R 2, and R 3; Together with R 4, this gives the full internal state which gives a suggestion for the key.

Подробнее
11-04-2013 дата публикации

Flow mobility filter rule verification

Номер: US20130088966A1
Принадлежит: Individual

A method and system for flow mobility filter rule verification is provided. According to an embodiment of the present invention, a network node of a telecommunications packet network is configured to receive filter rules provided by a user entity (UE) relating to a requested IP-CAN session. The filter rules are applied by a Policy and Charging Control (PCC) network architecture for the session. The network node is also configured to compare received filter rules with Inter-Mobility Policies (IMPs) of the user in order to determine if the filter rules match with the user's IMPs, and to send a filter rule verification response indicating whether or not the filter rules match the user's IMPs.

Подробнее
11-04-2013 дата публикации

SYSTEM AND METHOD FOR VALIDATING A USER EQUIPMENT LOCATION IN A TELECOMMUNICATION NETWORK

Номер: US20130090086A1
Принадлежит: TELEFONICA, S.A.

In a method for validating a location provided by a user equipment requesting a service to a telecommunication network, the network receives () an information relating to the location of the user equipment and detects (-) the network access point to which the user equipment is connected. The method then provides for retrieving in a database historical information relative to locations of user equipments during connections to the detected network access point. A validation index is automatically generated based on the received location and on the retrieved historical information. The location provided by the user equipment is validated based on the validation index. A telecommunication network suitable to implement the method is also disclosed. 1100. Method for validating a user equipment location in a telecommunication network () , comprising the steps of{'b': '202', 'receiving () an information relating to said location from said user equipment,'}{'b': 203', '205, 'detecting (-) the network access point to which said user equipment is connected,'}the method being characterized byretrieving in a database historical information relative to locations of all user equipments during connections to the detected network access point,automatically generating a validation index based on the received location and on the retrieved historical information,{'b': 211', '10, 'validating () the location of said user equipment () based on said validation index, positively validating the location if said user equipment is likely to connect to said network access point, differently negatively validating the location.'}2. Method according to claim 1 ,wherein said database comprises statistical information, in particular a probability density function or a statistical histogram relative to locations of user equipments during connections to the detected network access point,{'b': '10', 'wherein said validation index is a probability that said user equipment () is connected to said network ...

Подробнее
11-04-2013 дата публикации

Network locking method and apparatus for terminal

Номер: US20130090091A1
Автор: Haiyin Weng
Принадлежит: Huawei Device Co Ltd

Embodiments of the present disclosure provide a network locking method and apparatus for a terminal. The method mainly includes: utilizing an IMSI number carried on a SIM card of the terminal to register the SIM card with a network, and obtaining a PLMN number of the network; comparing a PLMN number segment of the network with a valid PLMN number segment pre-stored on the terminal, and allowing or limiting, according to a comparison result, use of the SIM card by the terminal. According to the embodiments of the present disclosure, the SIM card is registered with the network by utilizing the IMSI number carried on the SIM card and a data card is verified in the terminal and network combined verification manner, which may ensure security of network locking for the terminal.

Подробнее
18-04-2013 дата публикации

Process installation network intrusion detection and prevention

Номер: US20130094500A1
Принадлежит: Rosemount Inc

A process communication device includes a process communication interface for communicating on a process communication loop in accordance with a process communication protocol. A controller is coupled to the process communication interface. A rules store is coupled to the controller, and has at least one process communication packet rule that is based on the process communication protocol. The controller applies the at least one process communication packet rule to at least one process communication packet received from the process communication interface, and generates event information when a process communication packet fails at least one process communication packet rule.

Подробнее
18-04-2013 дата публикации

SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MITIGATING ADDRESS SPOOFING IN MESSAGING SERVICE TRANSACTIONS

Номер: US20130095793A1
Принадлежит:

Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded. 1. A method for detecting and mitigating address spoofing in a messaging service transaction , the method comprising: receiving a mobility management reply message that is sent by a mobile location register element in response to an associated mobility management query, the mobility management query and the mobility management reply message being associated with a mobility management transaction, the mobility management reply message including a message service recipient identifier and a serving switch identifier;', 'allocating a global title address (GTA) from a pool of global title addresses within a range of global title addresses assigned to the firewall;', 'storing a correlation between the allocated GTA and an originating SMSC identifier;', 'replacing the serving switch identifier in the mobility management reply message with the allocated GTA;', 'routing the modified mobility management reply message;', 'receiving a message service message associated with the mobility management transaction, the messaging service message being ...

Подробнее
18-04-2013 дата публикации

System and method for profile based filtering of outgoing information in a mobile environment

Номер: US20130097652A1
Принадлежит: McAfee LLC

A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.

Подробнее
25-04-2013 дата публикации

Appliqué providing a secure deployment environment (sde) for a wireless communications device

Номер: US20130104232A1
Принадлежит: Raytheon Co

A security appliqué provides a secure deployment environment (SDE) for a wireless communications device. The Security appliqué isolates the security features, requirements, and information security boundaries such that no hardware modifications are required to a wireless communications device. Rather, a security module thin client is provided to the wireless communications device to provide the Secure Deployment Environment (SDE). The wireless communications device is coupled to the security appliqué via the standard connection interface. Through the standard connection interface, the security appliqué provides the SDE for the wireless communications device without implementing modifications to the wireless communications device.

Подробнее
16-05-2013 дата публикации

Security system and method for wireless communication within a vehicle

Номер: US20130121210A1
Принадлежит: ROBERT BOSCH GMBH

A method for reprogramming a node of an electronic communication system includes transmitting a signal from a first node to a second node. The signal requests that the second node be reprogrammed. The signal includes an identification of the first node. The second node is used to broadcast the identification of the first node to other nodes in the communication system. The second node is reprogrammed only if a predetermined quantity of the other nodes confirm, based on the identification, that the first node is legitimate.

Подробнее
23-05-2013 дата публикации

Method, User Network Equipment and Management System Thereof for Secure Data Transmission

Номер: US20130130647A1
Автор: Zhu Li
Принадлежит: ZTE CORPORATION

A method for secure data transmission, and the method includes: after a Home (evolved) Node-B (H(e)NB) establishes a connection with a H(e)NB Management System (H(e)MS), data is transmitted between the H(e)NB and the H(e)MS via a secure path; when the H(e)NB or the H(e)MS receives data, verify the integrity and/or the confidentiality of said received data, and if the verification fails, retain or discard said received data. The present invention also provides user network equipment and a user network equipment management system for secure data transmission. The present invention removes various threats caused by the insecure data transmission and a variety of inconveniences caused by improperly handling downloaded data of the H(e)NB in practical applications. 1. A method for secure data transmission , comprising:after a home Node-B (HNB) establishes a connection with a home Node-B management system (HMS), transmitting data between the HNB and the HMS via a secure path; when the HNB or the HMS receives data, verifying integrity and/or confidentiality of the received data, if verification fails, retaining or discarding the received data; or,after a home evolved Node-B (HeNB) establishes a connection with a home evolved Node-B management system (HeMS), transmitting data between the HeNB and the HeMS via the secure path; when the HeNB or the HeMS receives data, verifying the integrity and/or confidentiality of the received data, if the verification fails, retaining or discarding the received data.2. The method of claim 1 , wherein:the data transmitted between the HNB and the HMS or between the HeNB and the HeMS comprises one or more of configuration data, software update data and request messages.3. The method of claim 1 , wherein:the step of transmitting data between the HNB and the HMS via the secure path comprises:protecting the data transmitted between the HNB and the HMS via an IP security protocol (IPsec) tunnel and/or a Transport Layer Security (TLS) tunnel;the ...

Подробнее
23-05-2013 дата публикации

Method and apparatus for validating radio resource control messages

Номер: US20130130704A1
Принадлежит: InterDigital Technology Corp

A method for validating radio resource control (RRC) messages includes determining whether an RRC message received by a wireless transmit-receive unit (WTRU) is valid based on: an RRC state for which the WTRU is configured, whether or not the WTRU needs a new transport format combination set, and whether or not the RRC message will configure the WTRU for a CELL_DCH state. A WTRU includes a rule application device configured to implement the method.

Подробнее
23-05-2013 дата публикации

System and method for automated analysis comparing a wireless device location with another geographic location

Номер: US20130132568A1
Принадлежит: FINSPHERE Inc

A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine.

Подробнее
23-05-2013 дата публикации

Method and System for Transmitting Control Data in a Manner that is Secured Against Manipulation

Номер: US20130132730A1
Автор: Rainer Falk
Принадлежит: SIEMENS AG

A method and system for detecting manipulation when control data are transmitted from a first control unit to a second control unit via a network, which includes generating integrity check information data for the control data transmitted by the first control unit via an integrity check generating unit on the transmitter side, calculating a cryptographic checksum for the integrity check information data generated on the transmitter side via the integrity check generating unit, transmitting the integrity check information data and the cryptographic checksum to an integrity check verifying unit that verifies the cryptographic checksum on the receiver side, generating integrity check information data on the receiver side for the control data received by the second control unit using the integrity check verifying unit, and comparing the integrity check information data and the integrity check information data with the cryptographic checksum to detect the manipulation of the transmitted control data.

Подробнее
30-05-2013 дата публикации

Systems and methods for recovering low power devices

Номер: US20130137376A1
Принадлежит: Yougetitback Ltd

The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for addressing devices that have low or no power.

Подробнее
13-06-2013 дата публикации

METHOD AND APPARATUS FOR RECONFIGURING CONNECTION TO BASE STATION AT RELAY NODE IN A WIRELESS COMMUNICATION SYSTEM

Номер: US20130148490A1
Принадлежит: LG ELECTRONICS INC.

The present invention relates to a method of processing a signal in a wireless communication system. In particular, the method comprises steps of setting an indicator indicating that an integrity failure occurs and transmitting a first message associated with a connection reestablishment including the indicator to a network. The integrity failure means that data is inserted or replaced by an unauthorized third party. 1. A method of processing a signal in a wireless communication system , the method comprising:setting an indicator indicating that an integrity failure occurs; andtransmitting a first message associated with a connection reestablishment including the indicator to a network.2. The method of claim 1 , further comprising:receiving a second message including a command for resetting at least one parameter associated with an integrity protection; andresetting the at least one parameter to a predetermined value.3. The method of claim 2 , wherein the at least one parameter includes a HFN (Hyper Frame Number) and a PDCP (Packet Data Convergence Protocol) SN (Sequence Number).4. The method of claim 2 , wherein the predetermined value is 0.5. The method of claim 2 , wherein the predetermined value is determined by the network.6. The method of claim 1 , wherein the integrity failure is associated with an acknowledgement mode DRB(Data Radio Bearer).7. The method of claim 1 , wherein the first message includes an indication indicating an identity of radio bearer in which the integrity failure occurs.8. The method of claim 1 , wherein the first message is a RRC (Radio Resource Control) connection reestablishment request message or a RRC connection reestablishment complete message.9. The method of claim 2 , wherein the second message is a RRC (Radio Resource Control) connection reconfiguration message.10. A method of processing a signal in a wireless communication system claim 2 , the method comprising:receiving a message including a command for resetting at least one ...

Подробнее
18-07-2013 дата публикации

Mobile device management

Номер: US20130183937A1
Принадлежит: Kajeet Inc

Methods and systems are disclosed for reducing fraud, waste, and abuse of devices associated with government or business programs. Devices are authenticated based on a first set of data collected from the device, and if authenticated, may be permitted to send or receive service requests based on a second set of data that identifies the user, includes data about the user, identifies the service and/or identifies eligibility criteria. Devices may also be subject to eligibility requirements instituted before, during or after a service request is performed that determine the eligibility of the device and/or the user of the device. Devices may also be subject to filtering requirements administered before or during a service request. Devices may also be subject verification before, during or after one or more service requests.

Подробнее
18-07-2013 дата публикации

Multiple System Images for Over-The-Air Updates

Номер: US20130185548A1
Принадлежит: Individual

In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image.

Подробнее
01-08-2013 дата публикации

METHOD AND APPARATUS FOR PROVIDING SECURITY TO DEVICES

Номер: US20130198838A1
Принадлежит: INTERDIGITAL PATENT HOLDINGS, INC.

Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The verification data may be generated using a tree structure having protected registers, represented as root nodes, and component measurements, represented as leaf nodes. The verification data may be used to validate the WTRU. The validation may be performed using split-validation, which is a form of validation described that distributes validation tasks between two or more network entities. Subtree certification is also described, wherein a subtree of the tree structure may be certified by a third party. 1. In a wireless transmit-receive unit (WTRU) comprising one or more components and having a secure environment that comprises a number of secure registers , a method for generating verification data that can be used for validation of the WTRU , the method comprising:obtaining, for each of a plurality of software or hardware components of the WTRU, a value representing a measurement of the component of the WTRU;generating a measurement log (ML) comprising a record of said component measurement values and other component-specific data that is stored on the WTRU;generating verification data from the component measurement values for each component and storing the verification data in one or more of the secure registers within the secure environment, wherein the verification data is compared against corresponding trusted reference values; andorganizing the verification data and the ML into a tree structure, wherein the secure registers comprising the verification data define roots of the tree structure, the ML defines inner nodes of the tree structure, and the measurement values included in the ML define leaves of the tree structure to enable validation of the trustworthiness of at least one of the components of the WTRU via traversal of the tree structure from at least one of the roots to at least one of the leaves, ...

Подробнее
08-08-2013 дата публикации

SYSTEM AND METHOD FOR IMEI DETECTION AND ALERTING

Номер: US20130203379A1
Принадлежит: AT&T Mobility ll LLC

A system and method for detecting and storing information regarding a mobile communications device within a mobile communications network. Initially, a first data record is received at a subscriber/device database comprising subscriber/device data. Next, a second data record is received at the subscriber/device database comprising additional subscriber/device data. A first data record of a subscriber may then be compared to a second data record of the same subscriber, and if the first data record is different from the second data record a service provider may be notified. 1. A server , comprising:a processor; and determining whether a device capability data for one mobile station out of a plurality of mobile stations indicates that an associated international mobile station equipment identity is the same as a received international mobile equipment identity that is received with a subscriber identity module data, the device capability data associating the associated international mobile equipment identity of the mobile station with a plurality of functional capabilities of the mobile station,', 'identifying a new functional capability associated with the received international mobile equipment identity but not associated with the associated international mobile equipment identity upon determining that the received international mobile equipment identity is not the same as the associated international mobile equipment identity, and', 'initiating configuration of the mobile station to support the new functional capability upon determining that the received international mobile equipment identity is not the same as the associated international mobile equipment identity,, 'a memory coupled to the processor, the memory storing instructions that, when executed by a processor, cause the processor to perform operations comprisingwherein a determination of whether the device capability data for the received international mobile equipment identity is associated with the new ...

Подробнее
08-08-2013 дата публикации

Mobile communication method, mobile communication system, and radio base station

Номер: US20130203382A1
Принадлежит: NTT DOCOMO INC

The present invention relates to a mobile communication method that sends and receives the signaling of an S1AP/X2AP layer on DRB established between a radio base station DeNB and a relay node RN, the mobile communication method including: a step of setting the above DBR in an attach process of the relay node RN; and a step of notifying the above DRB to the relay node RN and the radio base station DeNB in an attach process of the relay node RN.

Подробнее
08-08-2013 дата публикации

Mobile human challenge-response test

Номер: US20130205370A1
Принадлежит: Individual

Methods and systems for verifying whether a user requesting an online account is likely a human or an automated program are described. A request for an online account may be received from a mobile device. A human challenge-response test adapted for displaying on a mobile device is displayed on the mobile device. Upon viewing the human challenge-response test, the user enters the user's solution to the human challenge-response test on the mobile device. A response hash value is created based on the user's solution. The response hash value is sent to an account request server for verification.

Подробнее
15-08-2013 дата публикации

Dynamic connection of a mobile terminal to a local network

Номер: US20130208693A1
Принадлежит: France Telecom SA

A method for connecting a terminal to a telecommunication network via an access point. After a request to connect a terminal to a first access point, the first access point determines if it has access to a resource for serving the terminal and, if possible, serves the terminal. If not, the first access point requests, from at least one second access point to which is it connected, a resource for serving the terminal; and in the event that the resource is available to the second access point, the first access point transfers, to the terminal, data for enabling the terminal to connect to the second access point.

Подробнее
15-08-2013 дата публикации

SECURITY OF USER PLANE TRAFFIC BETWEEN RELAY NODE AND RADIO ACCESS NETWORK

Номер: US20130210384A1
Автор: Zhang Shunliang
Принадлежит: NOKIA SIEMENS NETWORKS OY

A gateway apparatus () for a user equipment () which is connected to a radio-access network via a relay node () determines that a dedicated bearer is to be created for a specific type of traffic which is to be transmitted on a data radio bearer to be created between the relay node () and a donor node () of the radio access network, and includes a parameter into a message requesting creation of the dedicated bearer, which indicates that the dedicated bearer is required for integrity protection or used to carry the specific type of traffic. The message is sent from the gateway apparatus () to a mobility management apparatus () which includes a second parameter in a message requesting setup of a radio access bearer for the type of traffic based on the parameter. The donor node () receives this message, recognizes from the second parameter that integrity protection is required for the data radio bearer, initiates a process to create the data radio bearer for the type of traffic requiring integrity protection, and initiates the integrity protection for the data radio bearer by including an indication that integrity protection is required for the data radio bearer in a connection reconfiguration message for initiating creation of the data radio bearer. 1. An apparatus comprising:a processor configured to determine that a dedicated bearer is to be created for a specific type of traffic which is to be transmitted on a data radio bearer to be created between a relay node, which is wirelessly connected to a radio-access network via a donor cell, and a donor node of the donor cell, and to include a parameter into a message requesting creation of the dedicated bearer, wherein the parameter indicates that the dedicated bearer is required for integrity protection or that the dedicated bearer is used to carry the specific type of traffic.2. An apparatus comprising:a processor configured to receive a message requesting creation of a dedicated bearer for a type of traffic which is ...

Подробнее
15-08-2013 дата публикации

CONTROL METHODS FOR COMMUNICATION DEVICES

Номер: US20130210402A1
Автор: Cheng Yiou-Wen, Guo Maobin
Принадлежит: Media Tek Singapore Pte, Ltd.

A control method for a communication device is provided. The control method includes the steps of: determining whether the communication device is in a wrong communication state when a call of a communication function is made from the communication device, and if the communication device is in the wrong communication state, prohibiting the communication function from being performed by the communication device after the call is finished. 1. A control method for a communication device comprising:determining whether the communication device is in a wrong communication state when a call of a communication function is made from the communication device; andif the communication device is in the wrong communication state, prohibiting the communication function from being performed by the communication device after the call is finished.2. The control method as claimed in claim 1 , wherein the step of determining whether the communication device is in the wrong communication state comprises:receiving a near-end audio signal of the communication device; andanalyzing the near-end audio signal to determine whether the near-end audio signal has a specific feature;wherein it is determined whether the communication device is in the wrong communication state according to an analyzed result of the near-end audio signal.3. The control method as claimed in claim 2 , wherein the step of analyzing whether the near-end audio signal has the specific feature comprisesdetermining whether a magnitude of a specific component of the near-end audio signal is lower than a threshold level;wherein the specific component of the near-end audio signal results from human voice, and the magnitude of the specific component varies with a volume of the human voice; andwherein if the magnitude of the specific component of the near-end audio signal is lower than the threshold level, it is determined that the communication device is in the wrong communication state.4. The control method as claimed in claim ...

Подробнее
15-08-2013 дата публикации

Method, System And Apparatus For Improving Security Level Of A Terminal When Surfing Internet

Номер: US20130212639A1
Автор: Dan SONG, Fei Qi, Feng Zhao
Принадлежит: Tencent Technology Shenzhen Co Ltd

A method, system, and apparatus for improving security level of a terminal when it surfs the Internet. The method includes receiving, by a network side, network security information reported by a terminal, generating a network security policy according to the network security information reported by each terminal, and transmitting a security indication to the network security policy to the terminal; providing, by the terminal, a security prompt for network information to be obtained or having been obtained according to the security indication. Various embodiments can improve the security level of the terminal when it surfs the Internet and save resources of the terminal.

Подробнее
29-08-2013 дата публикации

Verifying generic broadcast of location assistance data

Номер: US20130223626A1
Принадлежит: Qualcomm Inc

Various techniques are provided for Location Services (LCS) Assistance Data broadcast, for example for implementation in LTE and LTE-A systems. The embodiments described herein may use the LPP/LPPe positioning protocol, by making use of existing unsolicited Provide Assistance Data (PAD) messages. Embodiments avoid the need to define and implement a separate broadcast Assistance Data protocol. Additional exemplary embodiments for scheduling and verifying of the broadcast Assistance Data messages are described herein.

Подробнее
29-08-2013 дата публикации

Scheduling generic broadcast of location assistance data

Номер: US20130225185A1
Принадлежит: Qualcomm Inc

Various techniques are provided for Location Services (LCS) Assistance Data broadcast, for example for implementation in LTE and LTE-A systems. The embodiments described herein may use the LPP/LPPe positioning protocol, by making use of existing unsolicited Provide Assistance Data (PAD) messages. Embodiments avoid the need to define and implement a separate broadcast Assistance Data protocol. Additional exemplary embodiments for scheduling and verifying of the broadcast Assistance Data messages are described herein.

Подробнее
05-09-2013 дата публикации

METHOD AND APPARATUS FOR PROVIDING MOBILE DEVICE MALWARE DEFENSE

Номер: US20130231085A1
Автор: Demblewski Michael
Принадлежит: AT&T Intellectual Property I, L.P.

A method and apparatus for protecting a wireless communication network are disclosed. For example, the method identifies an infected mobile endpoint device via at least one audit by a mal-ware defense platform, and performs an anti-malware application update on the infected mobile endpoint device.

Подробнее
05-09-2013 дата публикации

Method and system for application-based policy monitoring and enforcement on a mobile device

Номер: US20130232540A1
Автор: Hassen Saidi, Rubin Xu
Принадлежит: SRI International Inc

A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy enforcement code into a previously un-monitored software application package that is installable on a mobile device, and executing the monitoring and policy enforcement code during normal use of the software application by a user of the mobile device.

Подробнее
05-09-2013 дата публикации

Method and system for application-based policy monitoring and enforcement on a mobile device

Номер: US20130232573A1
Автор: Hassen Saidi, Rubin Xu
Принадлежит: SRI International Inc

A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy enforcement code into a previously un-monitored software application package that is installable on a mobile device, and executing the monitoring and policy enforcement code during normal use of the software application by a user of the mobile device.

Подробнее
12-09-2013 дата публикации

METHOD OF SELECTIVELY APPLYING A PDCP FUNCTION IN WIRELESS COMMUNICATION SYSTEM

Номер: US20130235803A1
Принадлежит: LG ELECTRONICS INC.

Disclosed is a wireless communication system and terminal for providing a wireless communication service, and more particularly, a method of selectively applying a PDCP function based on data characteristic transmitted through a radio bearer in an Evolved Universal Mobile Telecommunications System (E-UMTS) evolved from a UMTS, Long Term Evolution (LTE) System or LTE-Advanced (LTE-A) system.

Подробнее
12-09-2013 дата публикации

ENCRYPTION/DECRYPTION SYSTEM AND METHOD FOR A MOBILE DEVICE

Номер: US20130236015A1
Автор: Li Cheng-Lung, Li Tien-Ji
Принадлежит: GOTrust Technology Inc.

An encryption/decryption system and method are provided for a mobile phone configured to make a voice packet encryption/decryption during mobile communication. The mobile phone has a connecting interface for an external plug-in device. The encryption/decryption system inside the external plug-in device at least has a control unit, and a security chip. When a security communication mode is activated, the communication between users can be prevented from being disclosed. The present invention is to provide the encryption/decryption system and method for activating a security communication mode between two mobile users communicating in mobile communication, and for preventing communication packets from being disclosed.

Подробнее
12-09-2013 дата публикации

Controlling enterprise access by mobile devices

Номер: US20130239177A1
Принадлежит: Mobilisafe Inc

A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.

Подробнее
19-09-2013 дата публикации

Error detection

Номер: US20130242765A1
Принадлежит: Renesas Mobile Corp

Methods and apparatus for enabling ciphering error detection and recovery in a telecommunications network. Predetermined data is inserted into at least one radio link control service data unit at a network entity. The predetermined data has the same form as a packet data convergence protocol header. The at least one radio link control service data unit comprising the predetermined data is transmitted to a user equipment in the network. As a result, the user equipment is able to apply, on the basis of the predetermined data, either an unacknowledged mode radio link control ciphering error detection and recovery mechanism or a packet data convergence protocol ciphering error detection and recovery mechanism to the at least one radio link control service data unit.

Подробнее
19-09-2013 дата публикации

Method for securing messages

Номер: US20130246785A1
Принадлежит: Certicom Corp, Research in Motion Ltd

There is provided a method for secure communications. The method comprises obtaining a broadcast message, computing a signature for said broadcast message using a private key, and sending a transmission to a communication device. The private key is associated with a certificate and the transmission comprises the signature.

Подробнее
03-10-2013 дата публикации

Portable terminal device, data management method, and data management program

Номер: US20130262668A1
Автор: Noritaka SHIGA
Принадлежит: Kyocera Corp

A portable terminal device that is enabled to use data with a certain degree of protection against information leakage. The portable terminal device uses data stored in a server by communicating with the server via a network, and includes: a connection monitor that monitors a connection state of the portable terminal device with the server; and a data manager that deletes same data as data stored in the server from the portable terminal device when the connection monitor detects that the portable terminal device goes into the online state.

Подробнее
10-10-2013 дата публикации

Method for malicious activity detection in a mobile station

Номер: US20130267201A1
Принадлежит: QUALCOMM INCORPORATED

Disclosed is a method for malicious activity detection in a mobile station of a particular model. In the method, generic malicious behavior patterns are received from a network-based malicious behavior profiling system. Mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on the generic malicious behavior patterns. Mobile station operations may be observed to generate a mobile station activity observation. The mobile station activity observation may be analyzed using the mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis. Malicious activity may be detected based on the activity analysis. 1. A method for malicious activity detection in a mobile station of a particular model , comprising:analyzing a mobile station activity observation using mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis, wherein the mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on generic malicious behavior patterns received from a network-based malicious behavior profiling system; anddetecting malicious activity based on the activity analysis.2. A method for malicious activity detection as defined in claim 1 , further comprising:observing mobile station operations to generate the mobile station activity observation.3. A method for malicious activity detection as defined in claim 1 , wherein the generic malicious behavior patterns are not specific to the particular model of the mobile station.4. A method for malicious activity detection as defined in claim 1 , wherein the mobile station operations include activities of a Webkit.5. A method for malicious activity detection as defined in claim 1 , wherein the mobile station operations include activities of a high-level operating system (HLOS).6. A method for malicious activity detection as defined in claim 1 , wherein the mobile station operations include activities ...

Подробнее
17-10-2013 дата публикации

Processing messages received at a vehicle

Номер: US20130275761A1
Принадлежит: GENERAL MOTORS LLC

A system and method for processing messages received at a vehicle. The method carried by the system involves wirelessly receiving at a vehicle a first communication message having secure credentials and a message signature for a second communication message. Then, the vehicle authenticates the first communication message via its secure credentials. Later, the vehicle wirelessly receives the second communication message and validates this second message using the message signature from the first message. In response to the validation, the second message is processed at the vehicle.

Подробнее
17-10-2013 дата публикации

Always-available embedded theft reaction subsystem

Номер: US20130275770A1
Автор: Michael Berger
Принадлежит: Intel Corp

A platform including an always-available theft protection system is described. In one embodiment, the platform comprises a storage including full disk encryption, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform the security action, when the potential problem indicates a theft suspicion. The system, in one embodiment, further includes the security action logic, to send an alert to another device regarding the theft suspicion, and to trigger the storage to encrypt data, and an encryption logic to encrypt the data when the platform is in an OFF or low power state.

Подробнее
24-10-2013 дата публикации

Systems and Methods For Indicating The Presence Of A Mobile Device Within A Passenger Cabin

Номер: US20130278415A1

Systems and methods for indicating the presence of a mobile device within a passenger cabin are provided. A method for indicating the presence of a mobile device within a passenger cabin of a vehicle includes linking a vehicle computing device with the mobile device, determining whether a vehicle ignition is off and whether a vehicle lock has been actuated. The method further includes generating an audible mobile device search signal that is played through a cabin and waiting to receive a response from the mobile device as to whether the mobile device detected the audible mobile device search signal. The method further includes determining whether the mobile device is within the passenger cabin based on whether a response was received from the mobile device and generating a first audible indication when the mobile device is within the passenger cabin.

Подробнее
24-10-2013 дата публикации

Facilitation of security employing a femto cell access point

Номер: US20130281005A1
Принадлежит: AT&T MOBILITY II LLC

One or more femto cell access points (FAPs) are employed to facilitate provisioning of security. A signal indicative of an intrusion in an area associated with an FAP can be received, and, based on receiving the signal, an identifier associated with a device in a range of the FAP can be determined. One or more frequencies in the range of the femto cell access point can be jammed, an attachment attempt emitted from the device in response to jamming the frequencies can be detected, and a telephone number of the device can be identified based, at least, on detecting the attachment attempt from the device. Warnings can also be sent to the device and/or tracking of the device can be performed.

Подробнее
24-10-2013 дата публикации

METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS

Номер: US20130282579A1
Принадлежит: AirTight Networks, Inc.

A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. 1. A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks , the method comprising:providing a security server, the security server being hosted by a service provider entity, the security server being coupled to the Internet, the security server being adapted to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively;creating a workspace for wireless vulnerability management for a first customer entity on the security server, the creating the workspace being responsive to a request from the first customer entity to subscribe to wireless vulnerability management;receiving configuration information associated with the workspace for the first customer entity at the security server;supplying one or more sniffers to the first customer entity; ...

Подробнее
31-10-2013 дата публикации

Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints

Номер: US20130291063A1
Принадлежит: International Business Machines Corp

A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed.

Подробнее
07-11-2013 дата публикации

Base station device for use as part of an access network of a telecommunications network

Номер: US20130295880A1
Автор: Axel Klatt
Принадлежит: DEUTSCHE TELEKOM AG

A base station apparatus for operation as part of an access network of a mobile telecommunications network includes; a housing; a radio interface unit and a core network interface unit in the housing; a network line section between the radio interface unit and the core network interface unit; and a measuring apparatus, operatively connected to the network line section. The measuring apparatus is configured to detect at least one line parameter of the network line section, the at least one line parameter including a line parameter from the group of line parameters consisting of: the input impedance of the network line section; the insulation value of the network line section; the capacitance of the network line section; and the inductance of the network line section.

Подробнее
07-11-2013 дата публикации

Short message service (sms) data transfer

Номер: US20130295974A1

Exemplary methods and systems for facilitating SMS data transfer services in mobile devices are described. An exemplary method includes sending a first SMS message to a device with a payload of the first SMS message including machine-readable information. Next, a second SMS message may be received from the device with a payload of the second SMS message including machine-readable information. The first or second SMS message payloads may include, for example, a synchronization message, a call message, call data, or a scheduling message.

Подробнее
07-11-2013 дата публикации

Method and apparatus

Номер: US20130297934A1
Принадлежит: NOKIA SIEMENS NETWORKS OY

A method comprises certifying at least a part of offload configuration information for an application, said application for use in an offload environment.

Подробнее
14-11-2013 дата публикации

METHOD AND SYSTEM FOR CONNECTIONLESS TRANSMISSION DURING UPLINK AND DOWNLINK OF DATA PACKETS

Номер: US20130301611A1
Принадлежит: SAMSUNG ELECTRONICS CO., LTD.

A method and system for uplink-downlink transmission of data packets in a wireless cellular network, during idle state of User Equipment (UE) using connectionless transmission is disclosed. The method establishes S1 common bearer between a Radio Access Network (RAN) node and Serving Gateway (SGW) and S5 common bearer between the SGW and Packet Data Network Gateway (PGW). The method defines a modified Uu interface between the UE and the RAN node. The method appends data packets with UE Identifier (ID) and routing information as packet header information to independently route data packets through wireless cellular network in a self-sustainable manner using the established common bearers and the modified Uu interface. The method secures data packets by providing integrity and ciphering protection. The method eliminates cost of dedicated bearer set up and reduces signaling overhead on the Uu interface thereby improving network efficiency and battery life of the UE. 1. A method for uplink (UL) and downlink (DL) transmission of data packets using a connectionless transmission mode in a wireless cellular network by at least one User Equipment (UE) , wherein said method comprises:establishing common bearers in said wireless cellular network for said connectionless transmission mode;providing Connectionless indication (CL-indication) for handling said data packets in said connectionless transmission mode;appending at least one of: routing information, a UE identifier (UE ID), a security context identifier to said data packets as packet header information to independently route said data packets through said wireless cellular network in a self-sustainable manner; andutilizing a modified Uu interface between said at least one UE and at least one Radio Access Network (RAN) node of said wireless cellular network for said UL transmission and said DL transmission of said data packets for said connectionless transmission mode.2. The method as in claim 1 , wherein said method ...

Подробнее
14-11-2013 дата публикации

TRACKING OF MISSING COMMUNICATION DEVICES

Номер: US20130303112A1
Автор: Chhipa Mahendra
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

Embodiments of method for determining information associated with an unregistered usage of a mobile communication device are disclosed. In an embodiment, the method includes registering a Subscriber Identification Module (SIM) at the mobile communication device. The method further includes determining, at the mobile communication device, usage of an unregistered SIM based at least in part on pre-stored information corresponding to the registered SIM. The method also includes communicating the determined usage to an operator subsystem and determining, at the operator subsystem, based on the communication, user information associated with the registered SIM and the unregistered SIM. 1. A method of determining information associated with an unregistered usage of a mobile communication device , the method comprising:registering a Subscriber Identification Module (SIM) at the mobile communication device;determining, at the mobile communication device, usage of an unregistered Subscriber Identification Module based at least in part on pre-stored information corresponding to the registered Subscriber Identification Module;communicating the determined usage to an operator subsystem; anddetermining, at the operator subsystem, based on the communication, user information associated with the registered Subscriber identification Module and the unregistered Subscriber Identification Module.2. The method of claim 1 , further comprising communicating the user information associated with the unregistered Subscriber Identification Module to a user associated with the registered Subscriber Identification Module.3. The method of claim 1 , wherein registering comprises storing a Mobile Station International ISDN Number (MSISDN) associated with the Subscriber Identification Module.4. The method of claim 1 , wherein the determining comprises comparing a Mobile Station International ISDN Number (MSISDN) associated with the unregistered Subscriber Identification Module with the registered ...

Подробнее
14-11-2013 дата публикации

MOBILE DEVICE SECURITY

Номер: US20130303118A1
Принадлежит: T-MOBILE USA, INC.

Systems, methods and procedures are described for thwarting undesirable applications from affecting mobile communication devices. A mobile communication device uses a server to assist in identifying and removing undesirable applications. 1. A method , comprising:receiving data at a server, the data identifying at least a portion of an application accessible by a mobile communication device;determining if classification information for the application corresponds to the data, the classification information stored in a storage accessible by the server, the storage storing a corresponding determination for the classification information;if classification information corresponds to the data, the server providing the determination corresponding to the classification information.2. The method of claim 1 , further comprising: before receiving data at the server computer claim 1 , determining if classification information stored in a storage at the mobile communication device corresponds to the data claim 1 , the storage storing a corresponding determination for the classification information; and claim 1 , if classification information in the storage at the mobile communication device does not correspond to the data claim 1 , then receiving at least a portion of the data at the server from the mobile communication device.3. The method of claim 1 , wherein the data is behavioral data associated with the application.4. The method of claim 1 , wherein the data is metadata associated with the application.5. The method of claim 1 , wherein the classification information includes a package name associated with the application.6. The method of claim 1 , further comprising: if the data does not correspond to classification information stored in the storage claim 1 , then analyzing claim 1 , by the server claim 1 , at least a portion of the data to determine an classification; and claim 1 , storing the classification in the storage.7. The method of claim 1 , further comprising ...

Подробнее
14-11-2013 дата публикации

Communication system, base station, and countermeasure method against cyber attack

Номер: US20130303120A1
Автор: Yuichi Kusumoto
Принадлежит: NEC Corp

A communication system according to the present invention includes: a mobile terminal; a base station; an operation/maintenance server; and a gateway that has a DPI function that detects whether or not uplink data received from said mobile terminal is illegal traffic. If said base station detects that an amount of the traffic of said uplink data exceeds a threshold, said base station transmits an alarm, that denotes that the amount of the traffic of said uplink data exceeds the threshold, to said operation/maintenance server. If said operation/maintenance server receives said alarm from said base station, said operation/maintenance server transmits to said gateway an activation command that causes said gateway to activate said DPI function.

Подробнее
14-11-2013 дата публикации

Context Aware Network Security Monitoring for Threat Detection

Номер: US20130305357A1
Принадлежит: Boeing Co

The disclosed method involves monitoring behavior of at least one node, associated with at least one user, in a network to generate a behavior profile for the user(s). The method further involves comparing the behavior profile for at least one user with a baseline behavior profile for the user(s). Also, the method involves determining when there is a difference between the behavior profile for at least one user and the baseline behavior profile for the user(s). Further, the method involves flagging an event associated with the difference: when the difference exceeds a baseline threshold level, does not exceed a baseline threshold level, meets at least one criterion, and/or does not meet at least one criterion. Additionally, the method involves classifying the event to an event classification. Further, the method involves transmitting the event to at least one other node in the network and/or a network operations center.

Подробнее
28-11-2013 дата публикации

Systems and Methods for Detecting and Controlling Transmission Devices

Номер: US20130316738A1
Автор: Joseph S. Noonan
Принадлежит: Joseph S. Noonan

Disclosed is a system for managing wireless transmitting devices in which a wireless transmission from a transmission device is detected within or about a set area and an allowability of the transmission device to continue transmitting is based on an identification information, of the device, a location of the device and a number being called by the device.

Подробнее
28-11-2013 дата публикации

Method for managing content on a secure element connected to an equipment

Номер: US20130318355A1
Принадлежит: GEMALTO SA

The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the equipment and the administrative platform, thanks to session keys generated by the secure element and transmitted to the equipment; transmitting to the administrative platform a request to manage content of the secure element; and verifying at the level of the administrative platform that this request originates from the same secure element that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management.

Подробнее
12-12-2013 дата публикации

Network infrastructure validation of network management frames

Номер: US20130333012A1
Принадлежит: Cisco Technology Inc

A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.

Подробнее
19-12-2013 дата публикации

TECHNIQUES FOR TRANSMITTING CONTROL CHANNEL INFORMATION

Номер: US20130336264A1
Автор: Hsuan Yi, Yin Hujun
Принадлежит:

Techniques for protecting information elements transmitted to mobile stations from intruders. The technique can involve applying a randomized mask over an information element and then providing a scrambled cyclic redundancy check (CRC) value. A seed for the randomized mask can be different from a seed for the scrambled CRC value. 1. An enhanced Node B , comprising:a processor and a transceiver coupled to the processor, wherein the processor is configured to:transmit a seed value to a user equipment having a user identifier, wherein the seed value is different than the user identifier;randomize a control channel information element using the seed value;mask a checksum added to the randomized control channel information element using the user identifier; andtransmit the control channel information element to the user equipment.2. An enhanced Node B as claimed in claim 1 , wherein the seed value is transmitted to the user equipment in a unicast media access control (MAC) management message.3. An enhanced Node B as claimed in claim 1 , wherein the seed value is transmitted to the user equipment in a MobilityControllnfo message.4. An enhanced Node B as claimed in claim 1 , wherein masked checksum is a cyclical redundancy check (CRC) checksum.5. An enhanced Node B as claimed in claim 1 , wherein the processor is further configured to:transmit the user identifier to the user equipment using an Advanced Air Interface Registration Response (AAI-REG-RSP) message or an Advanced Air Interface Range Response (AAI-RNG-RSP) message.6. A user equipment claim 1 , comprising:a processor and a transceiver coupled to the processor, wherein the processor is configured to:receive a seed value from an enhanced Node B, wherein the seed value is different than a user identifier of the user equipment;receive a control channel information element from the enhanced Node B;unmask a checksum added to the randomized control channel information element using the user identifier; andde-randomize a ...

Подробнее