-
1.
公开(公告)号:US11375368B2
公开(公告)日:2022-06-28
申请号:US16574013
申请日:2019-09-17
Applicant: QUALCOMM Incorporated
Inventor: Krishna Ram Budhathoki , Subrato Kumar De , Mattias Kaulard Huber
Abstract: Methods for detecting and preventing an adversarial network entity (e.g., fake base stations, etc.) from tracking a wireless device's location. A wireless device may be equipped with a random value (RAND) database or cache memory RAND values previously received by the wireless device. In response to receiving an authentication request message from a network component, performing AKA procedures and determining that the authentication failed, the wireless device may compare the RAND value included in the received authentication request message to RAND values stored in secure storage memory. The wireless device may generate an authentication response message that includes an error code that is different than standard error code used so that the target wireless device can't be differentiated from other wireless devices thereby preventing tracking in response to determining that the RAND value included in the received authentication request message is included in the RAND secure storage memory.
-
公开(公告)号:US20210067972A1
公开(公告)日:2021-03-04
申请号:US16737230
申请日:2020-01-08
Applicant: QUALCOMM Incorporated
Inventor: Charles MCGRATH , Subrato Kumar De , Ankur Bhattacharjee , Krishna Ram Budhathoki , Mattias Kaulard Huber , Brandon Luu , Sai Eshwar Prasad Muppalla
Abstract: Methods for detecting and responding to unauthorized alert messages. In an example embodiment, a wireless device may detect a first system information block (SIB1) broadcast from a base station that includes an alert message flag that indicates that an emergency alert message is scheduled for broadcast in another system information block (e.g., in one of SIBs 10-14, etc.). The wireless device may detect an unauthorized alert based on inconsistent inputs from various base stations, and the server may detect fake or unauthorized base stations or detect unauthorized alerts based on inconsistent inputs from various UEs about same Cell ID, or same PLMN and geolocation, etc.
-
公开(公告)号:US10817224B2
公开(公告)日:2020-10-27
申请号:US15191400
申请日:2016-06-23
Applicant: QUALCOMM INCORPORATED
Inventor: Subrato Kumar De , Dexter Chun , Yanru Li
Abstract: Systems, methods, and computer programs are disclosed for scheduling decompression of an application from flash storage. One embodiment of a system comprises a flash memory device and a preemptive decompression scheduler component. The preemptive decompression scheduler component comprises logic configured to generate and store metadata defining one or more dependent objects associated with the compressed application in response to an application installer component installing a compressed application to the flash memory device. In response to a launch of the compressed application by an application launcher component, the preemptive decompression scheduler component determines from the stored metadata the one or more dependent objects associated with the compressed application to be launched. The preemptive decompression scheduler component preemptively schedules decompression of the one or more dependent objects based on the stored metadata.
-
4.
公开(公告)号:US20180032441A1
公开(公告)日:2018-02-01
申请号:US15245041
申请日:2016-08-23
Applicant: QUALCOMM INCORPORATED
Inventor: Subrato Kumar De
IPC: G06F12/1009 , G06F12/12
CPC classification number: G06F21/566 , G06F11/3612 , G06F12/1009 , G06F12/12 , G06F21/53 , G06F21/562 , G06F21/563 , G06F21/565 , G06F2212/1052 , G06F2212/65 , G06F2221/033 , G06F2221/034
Abstract: Systems, methods, and computer programs are disclosed for updating virtual memory addresses of target application functionalities for an updated version of application binary code. The method comprises storing a virtual address mapping table associated with application binary code registered with a high-level operating system. The virtual address mapping table comprises a plurality of virtual addresses mapped to corresponding target application functionalities in the application binary code. In response to receiving an updated version of the application binary code, a pseudo binary code template is selected, which is associated with one or more of the plurality of virtual addresses in the virtual address mapping table. The pseudo binary code template is matched to binary instructions in the updated version of the application binary code. The new virtual addresses corresponding to the matching binary instructions are determined. The virtual address mapping table is updated with the new virtual addresses.
-
公开(公告)号:US11729225B2
公开(公告)日:2023-08-15
申请号:US17456527
申请日:2021-11-24
Applicant: QUALCOMM Incorporated
Inventor: Ankur Bhattacharjee , Cherng-Shung Hsu , Subrato Kumar De , Mattias Kaulard Huber , Krishna Ram Budhathoki
IPC: H04L65/1076 , H04W76/30 , H04L65/1096 , H04L65/1046 , H04L65/1016
CPC classification number: H04L65/1079 , H04L65/1016 , H04L65/1046 , H04L65/1096 , H04W76/30
Abstract: Various embodiments may include methods and systems for avoiding connecting an illegitimate call within a telecommunications network. Various embodiments may include receiving, from a telecommunications network, an incoming call initiating message notifying the first wireless device of an incoming call, in which the incoming call initiating message includes caller information. Some embodiments may further include transmitting a provisional response message including callee information of the first wireless device in response to receiving the incoming call initiating message, transmitting a request message to a second wireless device based on the caller information and the callee information, determining whether the second wireless device initiated the incoming call based on a response message from the second wireless device, if received, in response to the request message, and taking an action to prevent connection of the incoming call in response to determining that the second wireless device did not initiate the incoming call.
-
公开(公告)号:US10114585B2
公开(公告)日:2018-10-30
申请号:US15448203
申请日:2017-03-02
Applicant: QUALCOMM Incorporated
Inventor: Jeffrey Hao Chu , Subrato Kumar De , Dexter Tamio Chun , Bohuslav Rychlik , Richard Alan Stewart
Abstract: Various aspects are described herein. In some aspects, the present disclosure provides a method of communicating data between an electronic unit of a system-on-chip (SoC) and a dynamic random access memory (DRAM). The method includes initiating a memory transaction corresponding to first data. The method includes determining a non-unique first signature and a unique second signature associated with the first data based on content of the first data. The method includes determining if the non-unique first signature is stored in at least one of a local buffer on the SoC separate from the DRAM or the DRAM. The method includes determining if the unique second signature is stored in at least one of the local buffer or the DRAM based on determining the non-unique first signature is stored. The method includes eliminating the memory transaction with respect to the DRAM based on determining the unique second signature is stored.
-
公开(公告)号:US20170353434A1
公开(公告)日:2017-12-07
申请号:US15401998
申请日:2017-01-09
Applicant: QUALCOMM Incorporated
Inventor: Nabeel Ahmad Al-Saber , Subrato Kumar De , Dineel Diwakar Sule
CPC classification number: H04L63/1466 , H04L63/1416 , H04L63/168 , H04L67/02 , H04L67/10 , H04L67/20 , H04L69/16
Abstract: An anti-cross-site scripting (anti-XSS) feature is provided at an operating system without reliance on higher-level third-party software (e.g., browsers, anti-virus software, etc.). A Uniform Resource Locator (URL) link is intercepted at a kernel level of an operating system of a device. It is then ascertained whether the URL link includes a cross-site script. If so, a determination is also made as to whether the cross-site script is an untrusted script (e.g., potentially harmful, malicious, or non-benign script). Execution of the URL link is terminated if it is determined that the cross-site script is an untrusted script.
-
公开(公告)号:US11638152B2
公开(公告)日:2023-04-25
申请号:US16699075
申请日:2019-11-28
Applicant: QUALCOMM Incorporated
Inventor: Xuepan Guan , Subrato Kumar De , Nitin Pant , Mattias Kaulard Huber , Krishna Ram Budhathoki , Ankur Bhattacharjee
Abstract: Various embodiments include methods, components and wireless devices configured to identify illegitimate base station. The processor of the wireless device may determine that a device in communication with the wireless device is a suspect base station. The processor may send a fabricated message to the device, and may receive one or more response messages from the device. The processor may determine whether one or more of the response messages received from the device is an appropriate response or an inappropriate response to the fabricated message. In response to determining that a response message is an inappropriate response, the processor may determine that the device is an illegitimate base station. In response to determining that the device is an illegitimate base station, the wireless device may perform a protective action.
-
9.
公开(公告)号:US20210084492A1
公开(公告)日:2021-03-18
申请号:US16574013
申请日:2019-09-17
Applicant: QUALCOMM Incorporated
Inventor: Krishna Ram Budhathoki , Subrato Kumar De , Mattias Kaulard Huber
Abstract: Methods for detecting and preventing an adversarial network entity (e.g., fake base stations, etc.) from tracking a wireless device's location. A wireless device may be equipped with a random value (RAND) database or cache memory RAND values previously received by the wireless device. In response to receiving an authentication request message from a network component, performing AKA procedures and determining that the authentication failed, the wireless device may compare the RAND value included in the received authentication request message to RAND values stored in secure storage memory. The wireless device may generate an authentication response message that includes an error code that is different than standard error code used so that the target wireless device can't be differentiated from other wireless devices thereby preventing tracking in response to determining that the RAND value included in the received authentication request message is included in the RAND secure storage memory.
-
公开(公告)号:US20200178065A1
公开(公告)日:2020-06-04
申请号:US16546582
申请日:2019-08-21
Applicant: QUALCOMM Incorporated
Inventor: Mattias Kaulard HUBER , Subrato Kumar De , Ankur Bhattacharjee
Abstract: Methods for countering a shared paging channel hijack attack. In an example embodiment, a wireless device may monitor the shared paging channel during a paging occasion in a DRX cycle to detect a first IMSI-based paging message in the paging occasion, and continue monitoring for IMSI-based paging in subsequent radio subframes in the paging frame and radio subframes in subsequent radio frames within the DRX cycle to determine whether there are indications of a paging channel hijack attack. In an example embodiment, this monitoring may be to determine whether one or more subframes that are not the paging occasion receive IMSI-based paging messages, in response to which a threat probability may be increased. The wireless device may perform an operation (e.g., an actuation operation such as disabling monitoring of, and preventing connection attempts to, the base station, etc.) to protect against a shared paging channel hijack attack.
-
-
-
-
-
-
-
-
-