17931050. SENSOR MISBEHAVIOR DETECTION SYSTEM UTILIZING COMMUNICATIONS simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

SENSOR MISBEHAVIOR DETECTION SYSTEM UTILIZING COMMUNICATIONS

Organization Name

QUALCOMM Incorporated

Inventor(s)

Jean-Philippe Monteuuis of Northborough MA (US)

Jonathan Petit of Wenham MA (US)

Soumya Das of San Diego CA (US)

Mohammad Nekoui of San Diego CA (US)

Cong Chen of San Diego CA (US)

Mohammad Raashid Ansari of Lowell MA (US)

SENSOR MISBEHAVIOR DETECTION SYSTEM UTILIZING COMMUNICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17931050 titled 'SENSOR MISBEHAVIOR DETECTION SYSTEM UTILIZING COMMUNICATIONS

Simplified Explanation

The patent application is related to wireless communications and detecting malicious behavior based on sensor data and vehicle-based messages.

  • Detecting objects based on sensor data from at least one sensor of the network device
  • Receiving a vehicle-based message with message data related to the object
  • Comparing the sensor data and message data to detect malicious behavior

Potential Applications

  • Vehicle safety systems
  • Intrusion detection systems
  • Security systems for IoT devices

Problems Solved

  • Improving object detection accuracy
  • Enhancing security measures in wireless communications
  • Preventing malicious behavior in network devices

Benefits

  • Increased safety and security in wireless communication systems
  • Early detection of potential threats
  • Improved decision-making based on combined sensor and message data


Original Abstract Submitted

Disclosed are systems, apparatuses, processes, and computer-readable media for wireless communications. For example, an example of a process includes detecting an object based on sensor data from at least one sensor of the network device. The process further includes receiving, by the network device, a vehicle-based message comprising message data related to the object. The process further includes comparing, by the network device, the sensor data and the message data and detecting, by the network device, malicious behavior based on the comparing.