-
公开(公告)号:US20240334192A1
公开(公告)日:2024-10-03
申请号:US18293445
申请日:2022-08-02
发明人: Advitiya VASHIST , Zhan Wei LIM
IPC分类号: H04W12/104 , H04W12/12
CPC分类号: H04W12/104 , H04W12/12
摘要: The present disclosure provides an apparatus and a method for determining a location-spoofing application, the method comprising: generating a numeric representation of an application name of an application used for generating a geolocation position signal of a user using a variable derived from a list of application names relating to a plurality of other applications capable of generating a geolocation position signal of a user; and determining a prediction on whether the application is a location-spoofing application based on a scale of the generated numeric representation of the application name.
-
公开(公告)号:US12106307B2
公开(公告)日:2024-10-01
申请号:US17827466
申请日:2022-05-27
申请人: Block, Inc.
发明人: Max Guise , Andrew John Leiserson , Dino Dai Zovi
CPC分类号: G06Q20/4016 , G06Q20/20 , G06Q20/204 , G06Q20/3278 , G06Q20/341 , H04W4/80 , H04W12/12
摘要: A payment terminal may include payment interfaces to receive payment information from payment devices. The payment interfaces can include an interface configured to receive a payment card. Monitoring components may monitor the payment interfaces. In addition, a detection signal can be provided while a payment card is communicatively coupled to its corresponding payment interface. The monitored information and the detection signal may be used by the payment terminal to determine whether a transaction is fraudulent or if a tamper attempt is ongoing, based on local test criteria. In addition, the monitored information and detection signal may be provided to a server, which may store the monitored information and detection signal, test for fraudulent transactions and tamper attempts based on server test criteria, and determine updates to the local test criteria.
-
公开(公告)号:US12101354B2
公开(公告)日:2024-09-24
申请号:US18384966
申请日:2023-10-30
申请人: BioCatch Ltd.
发明人: Oren Kedem , Avi Turgeman , Itai Novick , Alexander Basil Zaloum , Leonid Karabchevsky , Shira Mintz , Ron Uriel Maor
IPC分类号: H04L9/40 , G01C9/00 , G06F16/00 , G06F21/31 , G06F21/55 , G06Q20/40 , H04W12/12 , H04W12/128 , H04W12/68 , G06F3/02 , G06F3/0354 , G06F3/04883 , H04L67/02
CPC分类号: H04L63/1483 , G01C9/00 , G06F16/00 , G06F21/316 , G06F21/554 , G06Q20/4016 , H04L63/1425 , H04W12/12 , H04W12/128 , H04W12/68 , G06F3/0227 , G06F3/03543 , G06F3/04883 , H04L67/02
摘要: Devices, systems, and methods of detecting a vishing attack, in which an attacker provides to a victim step-by-step over-the-phone instructions that command the victim to log-in to his bank account and to perform a dictated banking transaction. The system monitors transactions, online operations, user interactions, gestures performed via input units, speed and timing of data entry, and user engagement with User Interface elements. The system detects that the operations performed by the victim, follow a pre-defined playbook of a vishing attack. The system detects that the victim operates under duress or under dictated instructions, as exhibited in irregular doodling activity, data entry rhythm, typographical error introduction rhythm, unique posture of the user, alternating pattern of listening to phone instructions and performing online operations via a computer, and device orientation changes or spatial changes that characterize a device being used to perform an online transaction while also talking on the phone.
-
公开(公告)号:US12101340B1
公开(公告)日:2024-09-24
申请号:US17453089
申请日:2021-11-01
发明人: Jared Stanley Anderson , Carolee Ann-Eckert Peterson , Jane Hollis , Jennifer Lynn Struzyk , Mary Louise Hurd
CPC分类号: H04L63/1416 , G06Q20/382 , H04L63/083 , H04W12/12
摘要: Systems and methods are disclosed for security breach notification. In one implementation, an indication of a security breach is received, at a first device with respect to a user account. Based on the indication of the security breach, a processing device generates a security breach notification, the security breach notification including an instruction to initiate at an account repository one or more actions with respect to the user account. An attempt is made to transmit the security breach notification to the account repository via a first communication interface of the first device. In response to a determination that the security breach notification was not successfully transmitted to the account repository, the security breach notification is transmitted to a second device via a second communication interface of the first device.
-
公开(公告)号:US20240314565A1
公开(公告)日:2024-09-19
申请号:US18676878
申请日:2024-05-29
申请人: NEC Corporation
发明人: Linghang FAN , Toshiyuki TAMURA , Iskren IANEV
摘要: New methods are proposed to detect misbehaving UEs based on 5GS. The methods allow the network to react accurately and efficiently to deal with misbehaving UE(s).
-
公开(公告)号:US12089047B2
公开(公告)日:2024-09-10
申请号:US17551445
申请日:2021-12-15
IPC分类号: H04W12/12 , H04W4/021 , H04W4/029 , H04W12/126
CPC分类号: H04W12/12 , H04W4/021 , H04W4/029 , H04W12/126
摘要: A method and system for wirelessly tracking power tools and related devices to aid with inventory management and to help minimize, prevent, and recover misplaced or stolen tools throughout the job site. The tools and/or batteries include wireless transmitting capabilities (e.g., an ISM unit) to transmit data to a fob, puck repeater, and/or gateway over an ISM network. The gateway is operable to translate and output the ISM communications over a cellular network to a remote monitoring unit, such as a personal computer or smart phone. Additionally, the gateway is further operable to translate and output cellular communications from the remote monitoring unit to ISM communications over the ISM network. A wireless tethering system and method is also disclosed whereby an ISM battery places a power tool in a lock-out or limp mode after the ISM battery remains outside of ISM communications for a prolonged period of time.
-
7.
公开(公告)号:US20240292223A1
公开(公告)日:2024-08-29
申请号:US18175859
申请日:2023-02-28
发明人: Timothy E. COYLE , Ammara ESSA , Matthew KAPALA , Hector Alejandro GARCIA CRESPO , Mark David LUFBURROW , Jacob S. LYNCH
CPC分类号: H04W12/12 , H04L63/1466 , H04W12/104
摘要: In some aspects, the techniques described herein relate to a method including: receiving an identity of fraudulent user equipment (UE); identifying a plurality of candidate UEs based on locations associated with the fraudulent UE and a duration of a session of the fraudulent UE; computing vectors representing the plurality of candidate UEs based on activity data associated with the plurality of candidate UEs recorded during the duration; comparing the plurality of vectors to a vector associated with activity data associated with the fraudulent UE to compute distances between the plurality of candidate UEs and the fraudulent UE; sorting the plurality of candidate UEs based on the distances; storing a top subset of the plurality of candidate UEs as co-located UEs; and performing an action using the top subset of the plurality of candidate UEs.
-
公开(公告)号:US12069078B2
公开(公告)日:2024-08-20
申请号:US17960517
申请日:2022-10-05
IPC分类号: H04L29/06 , H04L9/40 , H04L41/069 , H04L43/062 , H04L43/0876 , H04L43/16 , H04L67/50 , H04W12/033 , H04W12/12 , H04W12/60
CPC分类号: H04L63/1425 , H04L41/069 , H04L43/062 , H04L43/0876 , H04L43/16 , H04L63/1408 , H04L67/535 , H04W12/033 , H04W12/12 , H04W12/60 , H04L63/0263 , H04L63/20
摘要: A method at a network element for monitoring user plane traffic for a user equipment, the method including configuring a set of characteristics and a range of values for each of the set of characteristics for user plane traffic between the user equipment and the network element; monitoring user plane traffic for the user equipment at the network element, the monitoring determining whether at least one characteristic of the user plane traffic falls outside of the configured range of a values, resulting in a characteristic violation; and if the at least one characteristic of the user plane traffic falls outside the configured range of a values, performing an action resulting from the characteristic violation.
-
公开(公告)号:US20240275813A1
公开(公告)日:2024-08-15
申请号:US18645150
申请日:2024-04-24
申请人: McAfee, LLC
CPC分类号: H04L63/145 , G06F21/568 , G06F21/6245 , G06F21/629 , H04L63/102 , H04W12/08 , H04W12/12 , H04W12/128
摘要: There is disclosed in one example a computer-implemented system and method, including upon determining that an application has a non-benign reputation, selectively installing the application based on a user input; and personalizing the application by running the application concurrently with a personalization engine to limit the application to benign behavior.
-
10.
公开(公告)号:US12033152B2
公开(公告)日:2024-07-09
申请号:US17516701
申请日:2021-11-02
发明人: Cathal Mc Daid , Giulio De Vecchi
CPC分类号: G06Q20/4016 , G06Q20/4015 , H04L67/52 , H04W4/029 , H04W12/12
摘要: A method for identification of malicious activity based on analysis of a travel path of a mobile device through multiple geographic areas includes receiving at least three location data associated with the mobile communication device, the first location data comprising indication of the geographic area of the mobile subscriber and a receipt timestamp; determining the actual travel time of the mobile subscriber from the first geographic area and the third geographic area based on a difference between timestamps of the first location data and the third location data; determining a minimum transition time for the subscriber of the mobile device to move from the first geographic area to the third geographic area; and identifying a malicious activity based on comparison of the actual travel time and the minimum transition time wherein actual travel time is less than minimum transition time between the first geographic area and the third geographic area.
-
-
-
-
-
-
-
-
-