ROGUE ACCESS POINT DETECTION USING MULTI-PATH VERIFICATION

    公开(公告)号:SG11201905582PA

    公开(公告)日:2019-08-27

    申请号:SG11201905582P

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: DetermineNO YES Whether Access Point is a Rogue Access Point 508 Maintain connection to server z— 510 Drop connection to server FIG. 5 O 71' 00 (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 02 August 2018 (02.08.2018) WIP0 I PCT °Ens °nolo olomollm En oimIE (10) International Publication Number WO 2018/140132 Al 5007; (51) International Patent Classification: H04L 29/06 (2006.01) H04W 48/16 (2009.01) H04W 12/12 (2009.01) (21) International Application Number: PCT/US2017/063591 (22) International Filing Date: 29 November 2017 (29.11.2017) (25) Filing Language: English (26) Publication Language: English (30) Priority Data: 15/418,693 28 January 2017 (28.01.2017) US (71) Applicant: QUALCOMM INCORPORATED [US/US]; ATTN: International IP Administration, 5775 Morehouse Drive, San Diego, California 92121-1714 (US). (72) Inventors: AHMADZADEH, Seyed Ali; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). DAS, Sau- mitra Mohan; 5775 Morehouse Drive, San Diego, Cal- ifornia 92121-1714 (US). CHEN, Yin; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). NANDHA PREMNATH, Sriram; 5775 Morehouse Drive, San Diego, California 92121-1714 (US). (74) Agent: HANSEN, ROBERT M. et al.; The Marbury Law Group, PLLC, 11800 Sunrise Valley Drive 15th Floor, Re- ston, Virginia 20191 (US). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, (54) Title: ROGUE ACCESS POINT DETECTION USING MULTI-PATH VERIFICATION Transmit first probe to a server via first network 502 connection & second probe via second network connection Receiving a first probe reply I ^ 504 and a second probe reply from the serer (57) : Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point. [Continued on next page] WO 2018/140132 Al MIDEDIMODOMMER I II III MMOIROMMOIIIMEHOIS OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). Declarations under Rule 4.17: as to applicant's entitlement to apply for and be granted a patent (Rule 4.17(11)) as to the applicant's entitlement to claim the priority of the earlier application (Rule 4.17(iii)) Published: — with international search report (Art. 21(3))

    Rogue access point detection using multi-path verification

    公开(公告)号:AU2017396514A1

    公开(公告)日:2019-07-11

    申请号:AU2017396514

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

    WAKE LOCK AWARE SYSTEM WIDE JOB SCHEDULING FOR ENERGY EFFICIENCY ON MOBILE DEVICES

    公开(公告)号:CA3023479A1

    公开(公告)日:2017-12-21

    申请号:CA3023479

    申请日:2017-05-25

    Applicant: QUALCOMM INC

    Abstract: Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing wake lock aware scheduling. The apparatus may receive a wake lock request by a wake lock profiler and acquire wake lock information of a wake lock event associated with the wake lock request. The wake lock information may include a wake lock time parameter. The apparatus may send a hint having the wake lock time parameter. The apparatus may receive the hint, determine whether ready jobs can execute during the wake lock event, and send a request for permission to schedule the ready jobs for execution during the wake lock event in response to determining that the ready jobs can execute during the wake lock event.

    Rogue access point detection using multi-path verification

    公开(公告)号:AU2017396514B2

    公开(公告)日:2022-06-09

    申请号:AU2017396514

    申请日:2017-11-29

    Applicant: QUALCOMM INC

    Abstract: Various embodiments provide methods, devices, and non-transitory processor- readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

    METHODS AND SYSTEMS FOR INTELLIGENTLY DETECTING MALWARE AND ATTACKS ON CLIENT COMPUTING DEVICES AND CORPORATE NETWORKS

    公开(公告)号:CA3016637A1

    公开(公告)日:2017-10-26

    申请号:CA3016637

    申请日:2017-03-29

    Applicant: QUALCOMM INC

    Abstract: A network and its devices may be protected from non-benign behavior, malware, and cyber attacks caused by downloading software by configuring a server computing device to work in conjunction with the devices in the network. The server computing device may be configured to receive a software application from an application download service, establish a secure communication link to a client computing device in the network, receive exercise information from the client computing device via the secure communication link, use the received exercise information to exercise the received software application in a client computing device emulator to identify one or more behaviors, and determine whether the identified behaviors are benign. The server computing device may send the software application to the client computing device in response to determining that the identified behaviors are benign, and quarantine the software application in response to determining that the identified behaviors are not benign.

Patent Agency Ranking