Access point capable of mirroring wired and wireless data traffic

    公开(公告)号:US12101635B2

    公开(公告)日:2024-09-24

    申请号:US17806867

    申请日:2022-06-14

    摘要: Examples described herein relate to an access point (AP) capable of simultaneously capturing both wireless data traffic and wired data traffic and mirroring the captured data traffic to a communication port on the AP. The AP includes a data mirroring circuit to capture the wireless data traffic and/or wired data traffic and mirror the captured data traffic to the communication port so that the captured data is transferred to an external device (e.g., a USB flash drive) connected to the communication port. In some examples, to enable the capturing and mirroring of the data traffic, the AP includes a receiver and a transmitter. The receiver captures the wireless data traffic and the wired data traffic transmitted and received by a data processing circuit of the AP, and the transmitter transmits the captured data traffic to the communication port to store the captured data traffic in the external device.

    DETECTING SYSTEM AND DETECTING METHOD FOR UNAUTHORIZED DEVICE

    公开(公告)号:US20240305989A1

    公开(公告)日:2024-09-12

    申请号:US18207133

    申请日:2023-06-07

    IPC分类号: H04W12/121 G01S5/02 H04W12/63

    摘要: A detecting system for an unauthorized device having a movable locator is disclosed. The movable locator includes a location positioning unit, a signal sniffing unit, a signal collecting unit, and a device positioning unit. The location positioning unit detects a locator position of the movable locator. The signal sniffing unit detects Wi-Fi signal of an unauthorized device and generates a sensing report message. The signal collecting unit adds multiple sensing report messages to a sensing report record collection. The device positioning unit organizes multiple positioning combinations based on the content of the sensing report record collection, generates multiple positioning results respectively based on the multiple positioning combinations, and performs a weighting process to the multiple positioning results to generate a final positioning result of the unauthorized device.

    METHODS AND APPARATUS FOR MAINTAINING TRANSMISSION INTEGRITY AND AUTHENTICITY THROUGH CHANNEL MEASUREMENTS AND REPORTING

    公开(公告)号:US20240259799A1

    公开(公告)日:2024-08-01

    申请号:US18289197

    申请日:2022-05-02

    IPC分类号: H04W12/06 H04W12/121

    CPC分类号: H04W12/06 H04W12/121

    摘要: The connection between a user equipment (UE) and a base station may be authenticated in the physical layer, and the presence of an unauthorized intervening device may be identified based on predicted measurement values of downlink reference signals and the actual measurement values for the current downlink reference signals. The predicted measurement values are produced based on previous measurements of downlink reference signals that are known to be received from the base station, e.g., after upper layer initial authentication. The predicted values may be for positioning measurements, channel measurements, or velocity or direction of travel measurements, or a combination thereof. A difference between the predicted and actual measurement values indicates that the previously received reference signals and the currently received reference signals are not from the same entity, and thus, an intervening entity is likely present in the communication channel performing a man in the middle or replay attack.

    FEATURE ENGINEERING FOR MACHINE LEARNING IN A WIRELESS COMMUNICATION NETWORK

    公开(公告)号:US20240205679A1

    公开(公告)日:2024-06-20

    申请号:US18286174

    申请日:2022-03-29

    摘要: A method performed by feature engineering equipment comprises obtaining a first dataset that comprises datapoints for features of the first dataset, wherein the features of the first dataset include cell-specific features that are specific to respective cells in a wireless communication network, wherein each datapoint of the first dataset comprises one or more cell-specific sets that are specific to one or more respective cells, wherein each cell-specific set includes one or more values for one or more respective cell-specific features that are specific to the same cell. The method further comprises forming, from the first dataset, a second dataset that comprises datapoints for features of the second dataset, and providing the second dataset, or a derivative of the second dataset, to model training equipment for training a machine learning model or to inference-making equipment for making an inference.

    SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFIC BACKGROUND

    公开(公告)号:US20230345248A1

    公开(公告)日:2023-10-26

    申请号:US18347158

    申请日:2023-07-05

    发明人: Venson Shaw

    摘要: The technology includes a method performed by a system of a telecommunications network to manage network traffic of a 5G network. The system can instantiate a security system to sort incoming or outgoing network traffic at a perimeter of the 5G network into multiple groups that are each uniquely associated with multiple traffic types and multiple security levels. The system can inspect segments of data included in the incoming network traffic and sort multiple portions of the network traffic into the groups based in part on the inspection of the segments of the data. The system can dynamically adjust an available bandwidth of the 5G network based on each load of each of the groups and dispatch the portions of the network traffic in accordance with a traffic type and a security level of each of the groups.