Identifying and Reporting a Fraudulent Base Station

    公开(公告)号:US20220345892A1

    公开(公告)日:2022-10-27

    申请号:US17762410

    申请日:2019-10-25

    IPC分类号: H04W12/122

    摘要: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message. The system is configured to identify, by the analyser device, the base station as fraudulent when reports of the same base station as received from at least two different ones of the at least two radio devices are received within a threshold time duration with respect to each other

    Methods of evaluating source code using numeric array representations of source code elements

    公开(公告)号:US12111934B2

    公开(公告)日:2024-10-08

    申请号:US17797747

    申请日:2020-02-10

    IPC分类号: G06F21/57 G06F8/41

    CPC分类号: G06F21/577 G06F8/427

    摘要: Source code evaluation is provided. The source code includes a plurality of source code elements, and one of the source code elements is selected. A plurality of tokens is generated based on the source code element, and a binary AST representation is generated based on the plurality of tokens. The binary AST representation includes a plurality of binary AST nodes including binary AST token and null nodes. Each of the binary AST token nodes is based on a respective one of the plurality of tokens. Each of the binary AST token and null nodes is encoded into a respective numeric value. A numeric array representation of the source code element is generated based on the binary AST representation. The numeric values are mapped to locations in the numeric array representation based on respective locations of the binary AST token and null nodes in the binary AST representation.

    Identifying and reporting a fraudulent base station

    公开(公告)号:US12081987B2

    公开(公告)日:2024-09-03

    申请号:US17762410

    申请日:2019-10-25

    IPC分类号: H04W12/122

    CPC分类号: H04W12/122

    摘要: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message. The system is configured to identify, by the analyser device, the base station as fraudulent when reports of the same base station as received from at least two different ones of the at least two radio devices are received within a threshold time duration with respect to each other.

    Authentication of an Entity
    7.
    发明申请

    公开(公告)号:US20230006993A1

    公开(公告)日:2023-01-05

    申请号:US17781085

    申请日:2020-02-25

    IPC分类号: H04L9/40

    摘要: There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).