-
公开(公告)号:US20220345892A1
公开(公告)日:2022-10-27
申请号:US17762410
申请日:2019-10-25
IPC分类号: H04W12/122
摘要: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message. The system is configured to identify, by the analyser device, the base station as fraudulent when reports of the same base station as received from at least two different ones of the at least two radio devices are received within a threshold time duration with respect to each other
-
公开(公告)号:US20230328093A1
公开(公告)日:2023-10-12
申请号:US18022512
申请日:2021-01-27
发明人: Emrah Tomur , Zeki Bilgin , Mehmet Akif Ersoy , Elif Ustundag Soykan , Leyli Karacay , Ferhat Karakoc
IPC分类号: H04L9/40
CPC分类号: H04L63/1433 , H04L63/20 , H04L63/1416 , H04L63/1425
摘要: A technique for determining a safety-critical state in a cyber-physical system, CPS, is disclosed. A method implementation of the technique is performed by a safety component of the CPS and comprises obtaining (S302) combined sensor data from a plurality of sensors available in the CPS, the combined sensor data being indicative of a current state of the CPS, obtaining (S304) at least one intent-based safety policy, wherein an intent-based safety policy corresponds to a safety policy indicative of a predefined safety-related intent concerning an operational state of the CPS, and checking (S306) the combined sensor data against the at least one intent-based safety policy to determine whether or not the CPS is in a safety-critical state.
-
公开(公告)号:US20240284181A1
公开(公告)日:2024-08-22
申请号:US18289730
申请日:2021-11-23
IPC分类号: H04W12/122 , H04L61/50 , H04L101/654 , H04W12/73
CPC分类号: H04W12/122 , H04L61/50 , H04W12/73 , H04L2101/654
摘要: The invention relates to a method for operating a mobile entity in a cellular network, the method comprising: —receiving an identity request from a requesting entity, the identity request requesting a permanent, non-temporary identity of the mobile entity, by which the mobile entity is uniquely identified in the cellular network, —transmitting, in response to the identity request, a response to the requesting entity, the response including the permanent, non-temporary identity of the mobile entity, —transmitting, in response to the identity request, a verification request requesting a verification of the identity request to a verification entity of the cellular network.
-
公开(公告)号:US20230011576A1
公开(公告)日:2023-01-12
申请号:US17783374
申请日:2020-02-25
发明人: Zeki Bilgin , Emrah Tomur , Elif Ustundag Soykan
IPC分类号: H04W12/71 , H04W60/04 , H04W12/0433 , H04W76/10
摘要: There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.
-
5.
公开(公告)号:US12111934B2
公开(公告)日:2024-10-08
申请号:US17797747
申请日:2020-02-10
发明人: Zeki Bilgin , Elif Ustundag Soykan , Mehmet Akif Ersoy , Emrah Tomur , Pinar Comak , Leyli Karacay
CPC分类号: G06F21/577 , G06F8/427
摘要: Source code evaluation is provided. The source code includes a plurality of source code elements, and one of the source code elements is selected. A plurality of tokens is generated based on the source code element, and a binary AST representation is generated based on the plurality of tokens. The binary AST representation includes a plurality of binary AST nodes including binary AST token and null nodes. Each of the binary AST token nodes is based on a respective one of the plurality of tokens. Each of the binary AST token and null nodes is encoded into a respective numeric value. A numeric array representation of the source code element is generated based on the binary AST representation. The numeric values are mapped to locations in the numeric array representation based on respective locations of the binary AST token and null nodes in the binary AST representation.
-
公开(公告)号:US12081987B2
公开(公告)日:2024-09-03
申请号:US17762410
申请日:2019-10-25
IPC分类号: H04W12/122
CPC分类号: H04W12/122
摘要: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message. The system is configured to identify, by the analyser device, the base station as fraudulent when reports of the same base station as received from at least two different ones of the at least two radio devices are received within a threshold time duration with respect to each other.
-
公开(公告)号:US20230006993A1
公开(公告)日:2023-01-05
申请号:US17781085
申请日:2020-02-25
IPC分类号: H04L9/40
摘要: There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).
-
-
-
-
-
-