-
公开(公告)号:US12225021B2
公开(公告)日:2025-02-11
申请号:US17321847
申请日:2021-05-17
Applicant: Citrix Systems, Inc.
Inventor: Andreas Varnavas , Ananthaneni Sai Teja Chowdary , Nikolaos Tsapakis , Premkumar S J , Manikam Muthiah
Abstract: A system and method that detects malicious account creation in a web-based platform. A method includes detecting suspicious events associated with an account creation process using a username classifier that evaluates a username used to create a new account, an IP address classifier that evaluates an IP address used to create the new account, and a domain classifier that evaluates a domain from an email address used to create the new account; analyzing each detected suspicious event with a density analysis classifier to determine if each detected suspicious event comprises a malicious event based on a density of detected suspicious events from a collections of account creation processes; and determining an alert condition based on at least one malicious event detection.
-
公开(公告)号:US20250016567A1
公开(公告)日:2025-01-09
申请号:US18793322
申请日:2024-08-02
Applicant: Intel Corporation
Inventor: Markus Dominik Mueck
Abstract: The present disclosure is related to reconfigurable radio equipment and edge computing, and in particular, to technologies for cyber security and radio equipment supporting certain features ensuring protection from fraud, and testing interfaces related to reconfigurable radio equipment. Other embodiments may be described and/or claimed.
-
公开(公告)号:US12177673B2
公开(公告)日:2024-12-24
申请号:US17459064
申请日:2021-08-27
Applicant: The Toronto-Dominion Bank
Inventor: Michael Avni
Abstract: A system and method for determining physical locations associated with activities detected on mobile devices is disclosed. The method includes accessing at least one enterprise rule set which is based on a plurality of security vulnerability events, and for monitoring at least one application used on the mobile devices. Device data indicative of one or more actions performed on a mobile device and a time associated with each action is used to detect whether actions performed on the mobile device breach a rule of the enterprise rule set. Geolocation information associated with the mobile device at the time associated with the breach is received based on an identifier associated with the mobile device or with wireless network access points in range of the mobile device. The received geolocation information, enterprise rules, and device data is used determine if a security vulnerability is associated with the mobile device.
-
公开(公告)号:US20240422545A1
公开(公告)日:2024-12-19
申请号:US18334765
申请日:2023-06-14
Inventor: Patrick G. TRAYNOR , Kevin BUTLER , Christian PEETERS , Tyler TUCKER
IPC: H04W12/12
Abstract: Methods described herein relate to identifying an audio rogue base station intercept of a call using a modified distance bounding algorithm. Methods may include: establishing a shared resource for a session with a remote end device; selecting a nonce and provide the nonce to the remote end device; generating a sequence of bits; dividing the sequence of bits into a predetermined number of sub-sequences; performing a bit exchange with the remote end device using dual tone multi-frequency (DTMF) tones; determining, from the bit exchange, an average time of transmission; and identifying the presence or absence of an adversary intercepting the session.
-
公开(公告)号:US20240406731A1
公开(公告)日:2024-12-05
申请号:US18262770
申请日:2022-02-03
Applicant: QUALCOMM Incorporated
Inventor: Weimin DUAN , Alexandros MANOLAKOS , Naga BHUSHAN , Krishna Kiran MUKKAVILLI , Tingfang JI , Gavin Bernard HORN
Abstract: In an aspect, a wireless node performs a first RSRP measurement of an RS-P based on a first set of samples within a first time window of an RS-P symbol or resource, and determines whether a spoofing attack is associated with RS-P based on the first RSRP measurement and one or more other RSRP measurements of one or more other sets of samples within one or more earlier time windows of the RS-P symbol or resource. The wireless node transmits, to a communications device (e.g., position estimation entity), an indication (e.g., in a measurement report) of the spoofing attack determination. The communications device performs at least one action based at least in part upon the indication of the spoofing attack determination.
-
公开(公告)号:US12156029B2
公开(公告)日:2024-11-26
申请号:US17947066
申请日:2022-09-16
Applicant: Apple Inc.
Inventor: Shang-Te Yang , Xu Chen , Alejandro J. Marquez , Mohit Narang , Indranil S. Sen
Abstract: Wireless communication between two electronic devices may be used to determine a distance between the two devices, even in the presence of an otherwise-disruptive attacker. A wireless receiver system of one device may receive a true wireless ranging signal from a first transmitting device and a false wireless ranging signal from an attacker. The wireless receiver system may correlate the wireless signals with a known preamble sequence and perform channel estimation using the result, obtaining a channel impulse response for the wireless signals. The wireless receiver system may filter the channel impulse response for the plurality of wireless signals by removing at least part of the channel impulse response due to the false wireless ranging signal while not removing at least part of the channel impulse response due to the true wireless ranging signal. The receiver system may perform a wireless ranging operation using the filtered channel impulse response.
-
7.
公开(公告)号:US20240388914A1
公开(公告)日:2024-11-21
申请号:US18320352
申请日:2023-05-19
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Flemming Stig Andreasen
IPC: H04W12/12 , H04W12/033 , H04W28/02
Abstract: A method to counter vulnerabilities associated with user equipment in operating via a 5G core architecture. The method includes monitoring a session between a user equipment and an endpoint, obtaining a vulnerability score for a vulnerability affecting the user equipment, selecting, based on the vulnerability score, a selected user plane function and a security service, accessible via the selected user plane function, to counter the vulnerability affecting the user equipment, and causing a packet flow of the session to be steered to the security service via the selected user plane function.
-
公开(公告)号:US12089048B2
公开(公告)日:2024-09-10
申请号:US17710968
申请日:2022-03-31
Applicant: YAZAKI CORPORATION
Inventor: Jun Goto
IPC: H04W12/12 , B60R16/023 , B60W50/02 , H04W12/122
CPC classification number: H04W12/122 , B60R16/0232 , B60W50/0225
Abstract: An in-vehicle system includes a zone control unit and lower-level control units. The zone control unit includes: a power supply control unit configured to control power supply to each of the lower-level control units; a communication control unit configured to control communication with each of the lower-level control units; and an abnormality detection unit configured to detect presence or absence of an abnormality in each of the lower-level control units. In a case in which an abnormality for two or more of elements including a power supply current value, a communication response time, and a MAC address is detected in at least one of the lower-level control units, the abnormality detection unit is configured to recognize that the at least one of the lower-level control units is an unauthorized device.
-
公开(公告)号:US12087137B2
公开(公告)日:2024-09-10
申请号:US18137230
申请日:2023-04-20
Applicant: Capital One Services, LLC
Inventor: Mitchell Miller
IPC: G07F19/00 , H04W12/041 , H04W12/069 , H04W12/12 , H04W12/63
CPC classification number: G07F19/207 , G07F19/204 , H04W12/041 , H04W12/069 , H04W12/12 , H04W12/63
Abstract: Systems and methods include a kiosk that performs an electronic payment transaction based on instructions received from a portable device of a user. The system further includes a transmitting device electrically coupled to the kiosk. The transmitting device is configured to transmit a first signal to the portable device at a first direction. The system further includes a receiving device electrically coupled to the kiosk. The receiving device is configured to receive a second signal from the portable device at a second direction. The transmitting device and receiving device are positioned such that the first and second direction enable determination of a position of the user, where the processor enables the electronic payment transaction to be processed only when the portable device is at a location relative to the kiosk. The location is disposed within a transmission path coextensive with both the first direction and the second direction.
-
公开(公告)号:US12081595B2
公开(公告)日:2024-09-03
申请号:US17553987
申请日:2021-12-17
Applicant: Alarm.com Incorporated
Inventor: Matthew Daniel Correnti , Michael Kelly
IPC: H04L29/06 , G06N20/00 , G08B13/196 , G08B25/00 , G08B29/18 , H04L9/40 , H04W12/00 , H04W12/03 , H04W12/08 , H04W12/12 , H04W12/122 , H04W12/79
CPC classification number: H04L63/205 , G06N20/00 , G08B13/19613 , G08B13/19645 , G08B13/19697 , G08B25/009 , G08B29/186 , H04L63/101 , H04L63/1408 , H04L63/1491 , H04W12/03 , H04W12/08 , H04W12/122 , H04L63/1416 , H04W12/79
Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for securing a network associated with a property in response to the detection of a hacking drone within a vicinity of the property. In one aspect, a method includes obtaining sensor data from one or more sensors located at a property, detecting, based on the obtained sensor data, the presence of a drone, determining, based on the obtained sensor data, that the detected drone is an unauthorized drone, determining, by the monitoring system, that the unauthorized drone (i) is communicating or (ii) attempting to communicate with a network associated with the property, selecting one or more network adjustment policies, and transmitting one or more instructions to (i) one or more monitoring system components or (ii) one or more network components that are configured to adjust network parameters based on the one or more selected network adjustment policies.
-
-
-
-
-
-
-
-
-