Jump to content

17816530. L1 SECURITY SIGNALING simplified abstract (QUALCOMM Incorporated)

From WikiPatents

L1 SECURITY SIGNALING

Organization Name

QUALCOMM Incorporated

Inventor(s)

Igor Gutman of Hod HaSharon (IL)

Yavuz Yapici of Florham Park NJ (US)

Tao Luo of San Diego CA (US)

Junyi Li of Fairless Hills PA (US)

L1 SECURITY SIGNALING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17816530 titled 'L1 SECURITY SIGNALING

Simplified Explanation

The abstract of this patent application describes a method for detecting and identifying potential attackers in a wireless communication network. The method involves the UE (User Equipment) detecting a suspected fabricated transmission attack based on PHY (Physical Layer) security. The UE then transmits an indication of the attack to a network node, along with characteristics associated with the potential attacker. The network node can use these indications to identify the geographical location of the potential attacker and compile an adversary pool.

  • The UE detects a suspected fabricated transmission attack based on PHY security.
  • The UE transmits an indication of the attack to a network node.
  • The UE also transmits characteristics associated with the potential attacker to the network node.
  • The network node receives the indications and characteristics from the UE.
  • The network node can identify the geographical location of the potential attacker based on the indications.
  • The network node compiles an adversary pool that includes compromised identities.

Potential applications of this technology:

  • Enhancing security in wireless communication networks.
  • Identifying potential attackers and their geographical locations.
  • Improving the detection and prevention of fabricated transmission attacks.

Problems solved by this technology:

  • Detecting and identifying potential attackers in wireless communication networks.
  • Enhancing the security of the network by identifying and mitigating fabricated transmission attacks.

Benefits of this technology:

  • Improved security in wireless communication networks.
  • Early detection and prevention of fabricated transmission attacks.
  • Ability to identify potential attackers and their geographical locations.


Original Abstract Submitted

A UE may detect, at the UE, a suspected fabricated transmission attack based on PHY security. The UE may transmit, to a network node, and the network node may receive, from the UE, an indication of the suspected fabricated transmission attack. The network node may receive, from the UE, an indication of one or more characteristics associated with a potential attacker associated with the suspected fabricated transmission attack. The UE may transmit, via a sidelink to at least one additional UE, a second indication of whether the UE identifies that the suspected fabricated transmission attack corresponds to the UE being attacked. The network node may identify a geographical location of the potential attacker based on a plurality of indications of the one or more characteristics associated with the potential attacker. The network node may compile an adversary pool including one or more compromised identities.

(Ad) Transform your business with AI in minutes, not months

Custom AI strategy tailored to your specific industry needs
Step-by-step implementation with measurable ROI
5-minute setup that requires zero technical skills
Get your AI playbook

Trusted by 1,000+ companies worldwide

Cookies help us deliver our services. By using our services, you agree to our use of cookies.