METHODS AND SYSTEMS FOR CONTEXT BASED ANOMALY MONITORING

    公开(公告)号:CA3023697A1

    公开(公告)日:2017-12-21

    申请号:CA3023697

    申请日:2017-05-25

    Applicant: QUALCOMM INC

    Abstract: Various embodiments include methods, and computing devices configured to implement the methods, for anomaly monitoring using context-based sensor output correlation. A computing device may obtain output of a first sensor and may determine that an anomaly is likely to occur based on the obtained output of the first sensor. The computing device may transmit a message indicating that the anomaly is likely to occur, causing receiving computing devices to begin logging output of sensors of the receiving computing devices. The computing device may determine whether the anomaly did occur. If the anomaly did occur, the computing device may transmit a sensor output request. Nearby computing devices may receive this sensor output request and may transmit collected sensor data to the first computing device. The first computing device may receive the sensor output collected by the various receiving devices and may correlate the first sensor output with the received sensor output.

    Rogue access point detection using multi-path verification

    公开(公告)号:AU2017396514B2

    公开(公告)日:2022-06-09

    申请号:AU2017396514

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

    Procedimientos y sistemas para utilizar información recogida de múltiples sensores para proteger un vehículo contra software malicioso y ataques

    公开(公告)号:ES2959851T3

    公开(公告)日:2024-02-28

    申请号:ES17711390

    申请日:2017-02-24

    Applicant: QUALCOMM INC

    Abstract: Diversas realizaciones incluyen métodos y dispositivos informáticos que implementan los métodos para analizar la información del sensor para identificar un comportamiento anormal del vehículo. Un dispositivo informático puede monitorear sensores (por ejemplo, un sensor de vehículo estrechamente integrado, un sensor de vehículo poco integrado, un sensor que no es de vehículo, etc.) en el vehículo para recopilar la información del sensor, analizar la información del sensor recopilada para generar un análisis. resultado y utilizar el resultado del análisis generado para determinar si un comportamiento del vehículo es anormal. El dispositivo informático también puede generar un mensaje de comunicación en respuesta a determinar que el comportamiento del vehículo es anormal y enviar el mensaje de comunicación generado a una entidad externa. (Traducción automática con Google Translate, sin valor legal)

    Rogue access point detection using multi-path verification

    公开(公告)号:AU2017396514A1

    公开(公告)日:2019-07-11

    申请号:AU2017396514

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

    Procedimientos y sistemas para la supervisión de anomalías basada en el contexto

    公开(公告)号:ES2829050T3

    公开(公告)日:2021-05-28

    申请号:ES17730604

    申请日:2017-05-25

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento de supervisión de sensores basada en el contexto, que comprende: obtener, (402) por un primer dispositivo informático, una salida de un primer sensor; determinar, (404) por el primer dispositivo informático, si es probable que se produzca un evento de anomalía en base, al menos en parte, a la salida obtenida del primer sensor; transmitir, (406) antes de la aparición del evento de anomalía, un mensaje a al menos un segundo dispositivo informático, en el que el mensaje está configurado para provocar que el al menos un segundo dispositivo informático registre las salidas de los sensores del al menos un segundo dispositivo informático en respuesta a la determinación de que es probable que se produzca el evento de anomalía; determinar, (408) por el primer dispositivo informático, si se produjo el evento de anomalía; transmitir, (410) por el primer dispositivo informático, una solicitud de salida de los sensores en respuesta a la determinación de que se produjo el evento de anomalía, en el que la solicitud de salida de los sensores está configurada para provocar que el al menos un segundo dispositivo informático transmita, al primer dispositivo informático, los datos de salida de los sensores incluyendo la salida registrada de los sensores del al menos un segundo dispositivo informático; recibir (412) por el primer dispositivo informático, los datos de salida de los sensores desde el al menos un segundo dispositivo informático.

    Data compression techniques for handover and radio link failure recovery

    公开(公告)号:AU2015346144A1

    公开(公告)日:2017-04-20

    申请号:AU2015346144

    申请日:2015-11-13

    Applicant: QUALCOMM INC

    Abstract: A user equipment (UE) and source base station may use data compression techniques for data packets sent between them. During a handover, the source base station may provide data compression context to a target base station, thus enabling the target base station to continue the data compression following the handover without having to reestablish the data compression context. The source base station may determine data compression capabilities of the UE or the target base station, or both, and may communicate the determined data compression capabilities to the UE or target base station. The source base station may identify at least one gap in a sequence of packets received from the UE, and communicate the existence of the gap to the target base station, which may request retransmission of packets associated with the gap.

    ROGUE ACCESS POINT DETECTION USING MULTI-PATH VERIFICATION

    公开(公告)号:SG11201905582PA

    公开(公告)日:2019-08-27

    申请号:SG11201905582P

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: DetermineNO YES Whether Access Point is a Rogue Access Point 508 Maintain connection to server z— 510 Drop connection to server FIG. 5 O 71' 00 (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 02 August 2018 (02.08.2018) WIP0 I PCT °Ens °nolo olomollm En oimIE (10) International Publication Number WO 2018/140132 Al 5007; (51) International Patent Classification: H04L 29/06 (2006.01) H04W 48/16 (2009.01) H04W 12/12 (2009.01) (21) International Application Number: PCT/US2017/063591 (22) International Filing Date: 29 November 2017 (29.11.2017) (25) Filing Language: English (26) Publication Language: English (30) Priority Data: 15/418,693 28 January 2017 (28.01.2017) US (71) Applicant: QUALCOMM INCORPORATED [US/US]; ATTN: International IP Administration, 5775 Morehouse Drive, San Diego, California 92121-1714 (US). (72) Inventors: AHMADZADEH, Seyed Ali; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). DAS, Sau- mitra Mohan; 5775 Morehouse Drive, San Diego, Cal- ifornia 92121-1714 (US). CHEN, Yin; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). NANDHA PREMNATH, Sriram; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). (74) Agent: HANSEN, ROBERT M. et al.; The Marbury Law Group, PLLC, 11800 Sunrise Valley Drive 15th Floor, Re- ston, Virginia 20191 (US). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, (54) Title: ROGUE ACCESS POINT DETECTION USING MULTI-PATH VERIFICATION Transmit first probe to a server via first network 502 connection & second probe via second network connection Receiving a first probe reply I ^ 504 and a second probe reply from the serer (57) : Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point. [Continued on next page] WO 2018/140132 Al MIDEDIMODOMMER I II III MMOIROMMOIIIMEHOIS OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). Declarations under Rule 4.17: as to applicant's entitlement to apply for and be granted a patent (Rule 4.17(11)) as to the applicant's entitlement to claim the priority of the earlier application (Rule 4.17(iii)) Published: — with international search report (Art. 21(3))

Patent Agency Ranking