-
1.
公开(公告)号:WO2023043162A1
公开(公告)日:2023-03-23
申请号:PCT/KR2022/013673
申请日:2022-09-14
发明人: CHANNAPPAGOUDAR, Manjunath , SEENIVASAN, Varadarajan , BALASUBRAMANIAN, Saravanan , THAKWANI, Mahesh Sawan
IPC分类号: H04W12/12 , H04W84/06 , H04B17/345 , H04B17/373
摘要: Embodiments of disclosure relate to a method and an electronic device for identifying aggressor nodes in communication network. The method comprises receiving data related to a plurality of nodes of the communication network, from a network management entity, wherein the data comprises information on aggressor nodes and one or more victim nodes associated with the aggressor nodes; predicting an interference pattern indicating an interference caused by each of the aggressor nodes on the one or more victim nodes for at least one of a plurality of time instances, using a trained estimation model; and identifying at least one aggressor node having a possibility to interfere with the one or more victim nodes during the at least one of the plurality of time instances based on the interference pattern.
-
公开(公告)号:WO2022250807A1
公开(公告)日:2022-12-01
申请号:PCT/US2022/025135
申请日:2022-04-15
IPC分类号: H04L9/40 , H04W12/12 , H04W12/122 , H04W12/104 , H04W4/029 , H04W12/79
摘要: Disclosed are systems, methods, and non-transitory media for detecting a positioning attack based on wireless position signaling. For example, a location server can determine a positioning reference signal having at least a first signal portion and at least a second signal portion. An indication of a positioning attack associated with the positioning reference signal can be obtained. The location server can provide, to a base station, a message of transmission preemption of the second signal portion of the positioning reference signal based on the indication of the positioning attack.
-
3.
公开(公告)号:WO2022167105A1
公开(公告)日:2022-08-11
申请号:PCT/EP2021/060946
申请日:2021-04-27
摘要: A computer-implemented method, by a first node (111), for handling security in a communications system (100). The first node (111) receives (301), from another node (115), a first message. The first message requests subscription to receive at least one indication indicating a security attack, of at least one of: i) a first indication of one or more applications, and ii) a second indication of one or more devices (130), that are a target or a source of the attack. The first node (111) initiates (302) instructing, based on the first message, at least one of: one or more additional nodes (112, 113) and a first device (131), to monitor information indicative of the attack. The first node (111) initiates (307) sending, with the proviso that the security attack is detected, another message to the another node (115) comprising the at least one of the first and the second indication.
-
公开(公告)号:WO2022146362A1
公开(公告)日:2022-07-07
申请号:PCT/TR2021/051504
申请日:2021-12-24
发明人: ARSLAN, Hüseyin , AYGÜL, Mehmet Ali
摘要: The invention relates to a method (100) that enables the following steps to be performed in any order to ensure that at least one attack to be made to any at least one OSI layer and/or to any at least one sub-layer of said OSI layer in communication systems can be predicted/detected and thus precautions are taken in advance; - Creating the training dataset by determining the machine inputs (G) and machine outputs (Ç) in the first step - Making the training datasets understandable by the machine (computer) in the second step - Designing machine learning in the third step - Creating the validation dataset in the fourth step - Training the machine (or trained machine) in the fifth step - Obtaining test data (or sets) in the sixth step - In the seventh step, estimating (or testing) the machine outputs (Ç) using the machine trained in the fifth step and the test input set obtained in the sixth step.
-
公开(公告)号:WO2022144908A1
公开(公告)日:2022-07-07
申请号:PCT/IN2020/051071
申请日:2020-12-30
发明人: PADMANABHAN, Kavita
摘要: Embodiments of the present disclosure provide a method, a network node, and a computer program product for detecting anomalous access behaviours in a plurality of network nodes in a communication network (100). The method is performed in a network node (10) in the communication network. The method comprises obtaining (S11) session logs associated with the plurality of network nodes (10a-10n) in the communication network (100). The method comprises extracting (S12) session features for each session by evaluating the session logs associated with the plurality of network nodes (10a-10n). Further, the method comprises determining (S13) access behaviours associated with each session based on the extracted session features, the access behaviours associated with each session comprising a representation indicative of one or more of session characteristics, user access characteristics, network node access characteristics and command usage characteristics. The method further comprises detecting (S14) anomalous access behaviours by analysing the determined access behaviours.
-
公开(公告)号:WO2022132563A1
公开(公告)日:2022-06-23
申请号:PCT/US2021/062619
申请日:2021-12-09
申请人: SELEX ES INC.
发明人: CHILD, Todd , HOWE, Bernard
摘要: A system and method to identify and track one or more targets of interest. The system may include a plurality of collection systems to capture information related to visual identifiers and/or electronic signatures associated with targets in selected locations. The system may further include an intelligence system to determine a target of interest based on the information related to visual identifiers and/or electronic signatures and to track the target of interest.
-
7.
公开(公告)号:WO2022086596A1
公开(公告)日:2022-04-28
申请号:PCT/US2021/033030
申请日:2021-05-18
摘要: Methods, systems, and computer readable media for validating a session management function (SMF) registration request are disclosed. One method occurs at a network node. The method comprises: receiving, from a first SMF in a home network, a registration request indicating a first network identifier identifying a visited network where a user device is roaming; determining whether the registration request is valid by comparing the first network identifier and a second network identifier associated with an access and mobility management function (AMF) serving the user device; and performing at least one action based on the determining.
-
公开(公告)号:WO2022084624A1
公开(公告)日:2022-04-28
申请号:PCT/FR2021/051828
申请日:2021-10-20
申请人: ORANGE
发明人: DECRAENE, Bruno , ATHIAS, Isabelle
摘要: L'invention concerne un procédé de priorisation d'un flux de paquets, le procédé étant mis en œuvre par le nœud routeur connecté au nœud récepteur et comprenant : • la réception d'un message comprenant la valeur attendue du paramètre de protection, en provenance d'un dispositif associé au nœud récepteur, • la priorisation des paquets comprenant la valeur attendue du paramètre de protection.
-
公开(公告)号:WO2022075500A1
公开(公告)日:2022-04-14
申请号:PCT/KR2020/013607
申请日:2020-10-07
申请人: 엘지전자 주식회사
发明人: 김준웅
摘要: 본 명세서의 일 양상에 따르면, 네트워크에 RLOS 연결 절차를 수행하고, UE의 사용자 계정과 관련된 정보가 저장된 서버로 UE와 네트워크 사이의 연결 상태 정보를 포함하는 인증 요청을 전송하며, 서버에 의해 연결 상태 정보에 기반하여 생성된 네트워크에 대한 인증 정보를 포함하는 인증 응답을 서버로부터 수신하며, 인증 정보에 기반하여 네트워크의 진위 여부를 판단하고, 서버 및 인증 정보를 표시한다.
-
公开(公告)号:WO2022046527A1
公开(公告)日:2022-03-03
申请号:PCT/US2021/046786
申请日:2021-08-19
申请人: APPLE INC.
发明人: VICTA, Kenneth U. , DETWILER, Benjamin A. , NILAKANTAN, Nikhil , WHEELER, Todd , MAYOR, Robert W. , LEDVINA, Brent M. , ERDMANN, E. Thomas , HARIHARAN, Sriram
摘要: The presence of a wireless device and/or accessory that cannot maintain an independent network connection can be detected by network connected wireless devices and the location of the detected device and/or accessory can be reported to a device location service. As the wireless devices and/or accessories do not have independent network connections, periodic maintenance is performed on those devices by nearby owner devices to which the wireless devices and/or accessories are paired or associated. Described herein are systems, methods, and associated devices to maintain a locatable wireless device by a set of multiple owner devices for that wireless device.
-
-
-
-
-
-
-
-
-