-
公开(公告)号:US20240388915A1
公开(公告)日:2024-11-21
申请号:US18664075
申请日:2024-05-14
Applicant: QUALCOMM Incorporated
Inventor: Mohammed Ataur Rahman SHUMAN , Soumya DAS , Subrato Kumar DE
IPC: H04W12/121 , H04W4/40
Abstract: Disclosed are systems and techniques for vehicular wireless communications. For example, a process can include receiving a wireless transmission, determining that the wireless transmission includes a first potential threat, generating a first threat report based on the determination that the wireless transmission includes the first potential threat, wherein the first threat report includes information associated with the first potential threat, and transmitting the first threat report to a network node via a vehicular communications system.
-
2.
公开(公告)号:US20190114401A1
公开(公告)日:2019-04-18
申请号:US16119294
申请日:2018-08-31
Applicant: QUALCOMM Incorporated
Inventor: Subrato Kumar DE , Zine-el-abidine BENAISSA
Abstract: Techniques for securing executable code on a computing device are provided. An example method according to the disclosure includes accessing an image file comprising intermediate code or binary object code; accessing metadata associated with the image file, the metadata providing layout information for a layout of one or more randomizable components in the image file, where the one or more randomizable components comprise variables of one or more structure types, objects of one or more class types, one or more data sections in the image file, function argument list, or a combination of two or more of these; and randomizing the layout of elements of instances of the one or more randomizable components using the metadata to generate randomized intermediate code executable by a virtual machine or randomized binary object code executable by the computing device.
-
公开(公告)号:US20240031812A1
公开(公告)日:2024-01-25
申请号:US17869662
申请日:2022-07-20
Applicant: QUALCOMM Incorporated
Inventor: Uttam VYAS , Muralidharan MURUGAN , Subrato Kumar DE , Rishika TINDOLA , Mattias Kaulard HUBER , Ankur BHATTACHARJEE , Krishna Ram BUDHATHOKI , Naresh MARADANA
IPC: H04W12/122 , H04W12/082
CPC classification number: H04W12/122 , H04W12/082
Abstract: Certain aspects of the present disclosure provide a method of wireless communications at a user equipment (UE), generally including detecting, within a period, a number of indications for modification to system information from a cell and performing one or more actions, after the detection, to prevent the UE from attempting to access the cell.
-
4.
公开(公告)号:US20230300640A1
公开(公告)日:2023-09-21
申请号:US17655130
申请日:2022-03-16
Applicant: QUALCOMM Incorporated
Inventor: Mohammad Raashid ANSARI , Subrato Kumar DE , Jonathan PETIT , Jean-Philippe MONTEUUIS , Cong CHEN
Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may detect a misbehavior condition in a local vehicle-to-everything (V2X) information source. The UE may receive an incoming V2X message. The UE may generate a misbehavior decision for the incoming V2X message based at least in part on the misbehavior condition in the local V2X information source. Numerous other aspects are described.
-
公开(公告)号:US20210168615A1
公开(公告)日:2021-06-03
申请号:US16699075
申请日:2019-11-28
Applicant: QUALCOMM Incorporated
Inventor: Xuepan GUAN , Subrato Kumar DE , Nitin PANT , Mattias Kaulard HUBER , Krishna Ram BUDHATHOKI , Ankur BHATTACHARJEE
Abstract: Various embodiments include methods, components and wireless devices configured to identify illegitimate base station. The processor of the wireless device may determine that a device in communication with the wireless device is a suspect base station. The processor may send a fabricated message to the device, and may receive one or more response messages from the device. The processor may determine whether one or more of the response messages received from the device is an appropriate response or an inappropriate response to the fabricated message. In response to determining that a response message is an inappropriate response, the processor may determine that the device is an illegitimate base station. In response to determining that the device is an illegitimate base station, the wireless device may perform a protective action.
-
公开(公告)号:US20180253258A1
公开(公告)日:2018-09-06
申请号:US15448203
申请日:2017-03-02
Applicant: QUALCOMM Incorporated
Inventor: Jeffrey Hao CHU , Subrato Kumar DE , Dexter Tamio CHUN , Bohuslav RYCHLIK , Richard Alan STEWART
CPC classification number: G06F3/0656 , G06F3/061 , G06F3/0625 , G06F3/0673 , G06F13/1668 , G06F13/1673 , G11C15/043
Abstract: Various aspects are described herein. In some aspects, the present disclosure provides a method of communicating data between an electronic unit of a system-on-chip (SoC) and a dynamic random access memory (DRAM). The method includes initiating a memory transaction corresponding to first data. The method includes determining a non-unique first signature and a unique second signature associated with the first data based on content of the first data. The method includes determining if the non-unique first signature is stored in at least one of a local buffer on the SoC separate from the DRAM or the DRAM. The method includes determining if the unique second signature is stored in at least one of the local buffer or the DRAM based on determining the non-unique first signature is stored. The method includes eliminating the memory transaction with respect to the DRAM based on determining the unique second signature is stored.
-
公开(公告)号:US20250097341A1
公开(公告)日:2025-03-20
申请号:US18469370
申请日:2023-09-18
Applicant: QUALCOMM Incorporated
Inventor: Gaurav SINGH , Sridhar ANUMALA , Subrato Kumar DE , Mugdha Sanjay PATIL , Ankur BHATTACHARJEE
Abstract: Systems and techniques are provided for wireless communications. A process can include determining that a quantity of a plurality of Mobile Terminated (MT) calls received within a first time period is greater than a first configured threshold. A process can include determining a subset of non-verified MT calls from the plurality of MT calls based on a call verification score for each respective MT call of the plurality of MT calls received within the first time period. A process can include determining that a quantity of non-verified MT calls included in the subset is greater than a second configured threshold. A process can include performing modem-level blocking based on determining a corresponding calling party identity associated with a non-verified MT call included in the subset.
-
8.
公开(公告)号:US20230164198A1
公开(公告)日:2023-05-25
申请号:US17456527
申请日:2021-11-24
Applicant: QUALCOMM Incorporated
Inventor: Ankur BHATTACHARJEE , Cherng-Shung HSU , Subrato Kumar DE , Mattias Kaulard HUBER , Krishna Ram BUDHATHOKI
CPC classification number: H04L65/1079 , H04W76/30 , H04L65/1016 , H04L65/1046 , H04L65/1096
Abstract: Various embodiments may include methods and systems for avoiding connecting an illegitimate call within a telecommunications network. Various embodiments may include receiving, from a telecommunications network, an incoming call initiating message notifying the first wireless device of an incoming call, in which the incoming call initiating message includes caller information. Some embodiments may further include transmitting a provisional response message including callee information of the first wireless device in response to receiving the incoming call initiating message, transmitting a request message to a second wireless device based on the caller information and the callee information, determining whether the second wireless device initiated the incoming call based on a response message from the second wireless device, if received, in response to the request message, and taking an action to prevent connection of the incoming call in response to determining that the second wireless device did not initiate the incoming call.
-
9.
公开(公告)号:US20190132740A1
公开(公告)日:2019-05-02
申请号:US16004300
申请日:2018-06-08
Applicant: QUALCOMM Incorporated
Inventor: Subrato Kumar DE , Mattias Kaulard HUBER , Charles MCGRATH , Pankaj GARG , Zaheer AHMAD
Abstract: In an aspect, a client device in a first network cell may obtain information that indicates a second network cell neighboring the first network cell, wherein the tracking area code (also referred to as location area code) of the second network cell is different from the tracking area code of the first network cell and is not included in the tracking area identifier list of the of the first network cell. The client device may use the obtained information to detect a nearby false network access node that may be imitating the second network access node to lure the client device to connect to the false network access node. In some aspects, a client device in a first geographical location may preemptively obtain a network access node list associated with a second geographical location in order to detect false network access nodes in the second geographical location.
-
10.
公开(公告)号:US20190130019A1
公开(公告)日:2019-05-02
申请号:US16164498
申请日:2018-10-18
Applicant: QUALCOMM Incorporated
Inventor: Subrato Kumar DE , Dineel Diwakar SULE , Nabeel AL SABER
Abstract: Systems, devices, and methods for communications among access points (APs) and mobile wireless devices are disclosed. A database having a persistent profile table (PPT) can be used to store information related to access point operations. Information related to a plurality of APs can be detected and stored in the PPT. Certain information may be common to multiple of the APs, allowing for compression of the data for more efficient storage. Fingerprint data related to the APs can be clustered based on a first order identifier (e.g., SSID, PLMN) and a second order identifier (e.g., MAC, MAC prefix, cell ID). The clusters can be further compressed by, for example, storing common features only once, and storing uncommon features individually, along with an identifier frame indicating which features are unique within the group of clusters. A mobile device can query the persistent profile table to verify the identity of unknown APs.
-
-
-
-
-
-
-
-
-