ENHANCED VEHICLE TO EVERYTHING (V2X) CYBERSECURITY CAPABILITIES

    公开(公告)号:US20240388915A1

    公开(公告)日:2024-11-21

    申请号:US18664075

    申请日:2024-05-14

    Abstract: Disclosed are systems and techniques for vehicular wireless communications. For example, a process can include receiving a wireless transmission, determining that the wireless transmission includes a first potential threat, generating a first threat report based on the determination that the wireless transmission includes the first potential threat, wherein the first threat report includes information associated with the first potential threat, and transmitting the first threat report to a network node via a vehicular communications system.

    ON DEVICE STRUCTURE LAYOUT RANDOMIZATION FOR BINARY CODE TO ENHANCE SECURITY THROUGH INCREASED ENTROPY

    公开(公告)号:US20190114401A1

    公开(公告)日:2019-04-18

    申请号:US16119294

    申请日:2018-08-31

    Abstract: Techniques for securing executable code on a computing device are provided. An example method according to the disclosure includes accessing an image file comprising intermediate code or binary object code; accessing metadata associated with the image file, the metadata providing layout information for a layout of one or more randomizable components in the image file, where the one or more randomizable components comprise variables of one or more structure types, objects of one or more class types, one or more data sections in the image file, function argument list, or a combination of two or more of these; and randomizing the layout of elements of instances of the one or more randomizable components using the metadata to generate randomized intermediate code executable by a virtual machine or randomized binary object code executable by the computing device.

    IDENTIFYING AN ILLEGITIMATE BASE STATION

    公开(公告)号:US20210168615A1

    公开(公告)日:2021-06-03

    申请号:US16699075

    申请日:2019-11-28

    Abstract: Various embodiments include methods, components and wireless devices configured to identify illegitimate base station. The processor of the wireless device may determine that a device in communication with the wireless device is a suspect base station. The processor may send a fabricated message to the device, and may receive one or more response messages from the device. The processor may determine whether one or more of the response messages received from the device is an appropriate response or an inappropriate response to the fabricated message. In response to determining that a response message is an inappropriate response, the processor may determine that the device is an illegitimate base station. In response to determining that the device is an illegitimate base station, the wireless device may perform a protective action.

    TRANSACTION ELIMINATION USING METADATA
    6.
    发明申请

    公开(公告)号:US20180253258A1

    公开(公告)日:2018-09-06

    申请号:US15448203

    申请日:2017-03-02

    Abstract: Various aspects are described herein. In some aspects, the present disclosure provides a method of communicating data between an electronic unit of a system-on-chip (SoC) and a dynamic random access memory (DRAM). The method includes initiating a memory transaction corresponding to first data. The method includes determining a non-unique first signature and a unique second signature associated with the first data based on content of the first data. The method includes determining if the non-unique first signature is stored in at least one of a local buffer on the SoC separate from the DRAM or the DRAM. The method includes determining if the unique second signature is stored in at least one of the local buffer or the DRAM based on determining the non-unique first signature is stored. The method includes eliminating the memory transaction with respect to the DRAM based on determining the unique second signature is stored.

    MALICIOUS CALL ATTACK DETECTION AND MITIGATION

    公开(公告)号:US20250097341A1

    公开(公告)日:2025-03-20

    申请号:US18469370

    申请日:2023-09-18

    Abstract: Systems and techniques are provided for wireless communications. A process can include determining that a quantity of a plurality of Mobile Terminated (MT) calls received within a first time period is greater than a first configured threshold. A process can include determining a subset of non-verified MT calls from the plurality of MT calls based on a call verification score for each respective MT call of the plurality of MT calls received within the first time period. A process can include determining that a quantity of non-verified MT calls included in the subset is greater than a second configured threshold. A process can include performing modem-level blocking based on determining a corresponding calling party identity associated with a non-verified MT call included in the subset.

    DEVICES AND METHODS FOR UE-BASED DETECTION AND PREVENTION OF ILLEGITIMATE NETWORK CALLS

    公开(公告)号:US20230164198A1

    公开(公告)日:2023-05-25

    申请号:US17456527

    申请日:2021-11-24

    Abstract: Various embodiments may include methods and systems for avoiding connecting an illegitimate call within a telecommunications network. Various embodiments may include receiving, from a telecommunications network, an incoming call initiating message notifying the first wireless device of an incoming call, in which the incoming call initiating message includes caller information. Some embodiments may further include transmitting a provisional response message including callee information of the first wireless device in response to receiving the incoming call initiating message, transmitting a request message to a second wireless device based on the caller information and the callee information, determining whether the second wireless device initiated the incoming call based on a response message from the second wireless device, if received, in response to the request message, and taking an action to prevent connection of the incoming call in response to determining that the second wireless device did not initiate the incoming call.

    SYSTEM AND METHOD FOR COMPACT STORAGE AND EFFICIENT RETRIEVAL OF ACCESS POINT INFORMATION FOR DETECTING ROGUE ACCESS POINTS

    公开(公告)号:US20190130019A1

    公开(公告)日:2019-05-02

    申请号:US16164498

    申请日:2018-10-18

    Abstract: Systems, devices, and methods for communications among access points (APs) and mobile wireless devices are disclosed. A database having a persistent profile table (PPT) can be used to store information related to access point operations. Information related to a plurality of APs can be detected and stored in the PPT. Certain information may be common to multiple of the APs, allowing for compression of the data for more efficient storage. Fingerprint data related to the APs can be clustered based on a first order identifier (e.g., SSID, PLMN) and a second order identifier (e.g., MAC, MAC prefix, cell ID). The clusters can be further compressed by, for example, storing common features only once, and storing uncommon features individually, along with an identifier frame indicating which features are unique within the group of clusters. A mobile device can query the persistent profile table to verify the identity of unknown APs.

Patent Agency Ranking