METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PERFORMING LOCATION AND VELOCITY CHECK AT SECURITY EDGE PROTECTION PROXY (SEPP) TO AVOID SPOOFING

    公开(公告)号:US20240349057A1

    公开(公告)日:2024-10-17

    申请号:US18135105

    申请日:2023-04-14

    摘要: A method for performing a location and velocity check at an SEPP to protect against a spoofing attack includes receiving an SBI request message relating to authentication of UE. The method further includes querying a database NF to obtain previous authentication information for the UE, the previous authentication information including a previous network identifier and a previous authentication time for the UE. The method further includes receiving a response from the database NF, the response including the previous network identifier and the previous authentication time. The method further includes reading, a current network identifier from the SBI request message, performing, using the current network identifier from the SBI request message, the previous network identifier, the previous authentication time, and a time of receipt by the SEPP of the SBI request message, a location and velocity check for the UE, and performing a network security action for the SBI request message based on results of the location and velocity check.

    Data transmission system and method, and apparatus thereof

    公开(公告)号:US11997491B2

    公开(公告)日:2024-05-28

    申请号:US17380455

    申请日:2021-07-20

    IPC分类号: H04W12/104 H04W4/029

    CPC分类号: H04W12/104 H04W4/029

    摘要: A data transmission method includes calculating, by a user equipment (UE), a first message authentication code of first location privacy setting data, sending, by the UE, the first message authentication code and the first location privacy setting data to a data management network element, receiving, by the UE, a second message authentication code from the data management network element, calculating, by the UE, a third message authentication code of the first location privacy setting data, determining, by the UE, that the first location privacy setting data is not tampered with when the second message authentication code is the same as the third message authentication code.

    Service processing method and device

    公开(公告)号:US11910197B2

    公开(公告)日:2024-02-20

    申请号:US17271281

    申请日:2018-09-07

    发明人: Zhuofei Li

    摘要: A service processing method includes receiving, by a mobile phone, a first identifier from a head device of a vehicle after the head device receives a trigger request to perform a vehicle door opening service, determining, by the mobile phone based on the first identifier, to perform authentication, indicating, by the mobile phone, the head device to perform the vehicle door opening service when the authentication succeeds, or determining, by the mobile phone based on the first identifier, not to perform the authentication, and sending, by the mobile phone, location information of the mobile phone, and an indication that indicating a location of the mobile phone and a location of the head device are normal to the head device.

    Using positioning techniques to detect false base stations

    公开(公告)号:US11895500B2

    公开(公告)日:2024-02-06

    申请号:US17084848

    申请日:2020-10-30

    摘要: Disclosed are techniques for detecting outlier cells based on positioning of a user equipment (UE). In an aspect, the UE or a location server determines a plurality of cells detectable by the UE, calculates a plurality of location estimates for the UE based on positioning measurements of a corresponding plurality of subsets of the plurality of cells, identifies a subset of cells that provides a best location estimate for the UE, wherein the best location estimate maximizes a set of inlier cells, calculates a final location estimate for the UE based on positioning measurements of the subset of cells and the set of inlier cells, identifies any remaining cells of the plurality of cells other than the subset of cells and the set of inlier cells as at least one outlier cell, and performs a mitigation operation based on identifying the at least one outlier cell.

    SYSTEMS AND METHODS FOR THE GENERATION OF EVENT OPPORTUNITIES FOR DISPLAY ON DEVICES HAVING DIFFERING FORM FACTORS

    公开(公告)号:US20230362656A1

    公开(公告)日:2023-11-09

    申请号:US18314361

    申请日:2023-05-09

    申请人: SB22, Inc.

    摘要: Aspects of the present disclosure relate to an event application formatted for a wearable device such as a smartwatch. The wearable device user interface organizes event information so that it may be viewed and interacted with via the touchscreen and controls of the wearable device. The user may provide input to transition between event categories, events, and interactive elements associated with the event directly on their wearable device. The wearable device format provides increased access for the user wherever they are without requiring them to carry around a bulky external device. Further, the wearable device format provides access directly on the user's wrist making it easier for the user to perform other tasks and still access the event application. Ultimately, the wearable device format simplifies the user's ability to interact with the event application while maintaining application functionality on a smaller device.

    WIRELESS DISTANCE MEASURING METHODS, DEVICES AND SYSTEMS WITH VALIDATED MEASUREMENT COMMUNICATIONS

    公开(公告)号:US20240349055A1

    公开(公告)日:2024-10-17

    申请号:US18301865

    申请日:2023-04-17

    摘要: A method can include transmitting a request with a request integrity code (IC), receiving a first message at a time t2, executing a validation operation on the first measurement message that includes an operation on at least a portion of the first measurement message with a key. In response to the first measurement message being determined invalid, indicating time t2 as invalid. A second measurement message can be transmitted at a time t3. A third measurement message can be received that includes two remote time values t1 and t4. In response to times t1 to t4 being determined to be valid, a first distance value can be calculated with the times t1 to t4. First and second messages can include ICs generated by executing the operation on the corresponding messages with the key. Corresponding devices and systems are also disclosed.