17816530. L1 SECURITY SIGNALING simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

L1 SECURITY SIGNALING

Organization Name

QUALCOMM Incorporated

Inventor(s)

Igor Gutman of Hod HaSharon (IL)

Yavuz Yapici of Florham Park NJ (US)

Tao Luo of San Diego CA (US)

Junyi Li of Fairless Hills PA (US)

L1 SECURITY SIGNALING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17816530 titled 'L1 SECURITY SIGNALING

Simplified Explanation

The abstract of this patent application describes a method for detecting and identifying potential attackers in a wireless communication network. The method involves the UE (User Equipment) detecting a suspected fabricated transmission attack based on PHY (Physical Layer) security. The UE then transmits an indication of the attack to a network node, along with characteristics associated with the potential attacker. The network node can use these indications to identify the geographical location of the potential attacker and compile an adversary pool.

  • The UE detects a suspected fabricated transmission attack based on PHY security.
  • The UE transmits an indication of the attack to a network node.
  • The UE also transmits characteristics associated with the potential attacker to the network node.
  • The network node receives the indications and characteristics from the UE.
  • The network node can identify the geographical location of the potential attacker based on the indications.
  • The network node compiles an adversary pool that includes compromised identities.

Potential applications of this technology:

  • Enhancing security in wireless communication networks.
  • Identifying potential attackers and their geographical locations.
  • Improving the detection and prevention of fabricated transmission attacks.

Problems solved by this technology:

  • Detecting and identifying potential attackers in wireless communication networks.
  • Enhancing the security of the network by identifying and mitigating fabricated transmission attacks.

Benefits of this technology:

  • Improved security in wireless communication networks.
  • Early detection and prevention of fabricated transmission attacks.
  • Ability to identify potential attackers and their geographical locations.


Original Abstract Submitted

A UE may detect, at the UE, a suspected fabricated transmission attack based on PHY security. The UE may transmit, to a network node, and the network node may receive, from the UE, an indication of the suspected fabricated transmission attack. The network node may receive, from the UE, an indication of one or more characteristics associated with a potential attacker associated with the suspected fabricated transmission attack. The UE may transmit, via a sidelink to at least one additional UE, a second indication of whether the UE identifies that the suspected fabricated transmission attack corresponds to the UE being attacked. The network node may identify a geographical location of the potential attacker based on a plurality of indications of the one or more characteristics associated with the potential attacker. The network node may compile an adversary pool including one or more compromised identities.