Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019204089 - MITIGATION OF LEAKY AND ROGUE ACCESS POINTS

Publication Number WO/2019/204089
Publication Date 24.10.2019
International Application No. PCT/US2019/026714
International Filing Date 10.04.2019
IPC
H04W 12/12 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12Fraud detection
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 52/02 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
52Power management
02Power saving arrangements
CPC
H04B 7/0413
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
BTRANSMISSION
7Radio transmission systems, i.e. using radiation field
02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
04using two or more spaced independent antennas
0413MIMO systems
H04B 7/0693
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
BTRANSMISSION
7Radio transmission systems, i.e. using radiation field
02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
04using two or more spaced independent antennas
06at the transmitting station
0686Hybrid systems, i.e. switching and simultaneous transmission
0691using subgroups of transmit antennas
0693switching off a diversity branch, e.g. to save power
H04L 63/1425
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1425Traffic logging, e.g. anomaly detection
H04W 12/1202
H04W 12/1205
H04W 52/0229
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
52Power management, e.g. TPC [Transmission Power Control], power saving or power classes
02Power saving arrangements
0209in terminal devices
0225using monitoring of external events, e.g. the presence of a signal
0229where the received signal is a wanted signal
Applicants
  • QUALCOMM INCORPORATED [US]/[US]
Inventors
  • HOMCHAUDHURI, Sandip
  • YENGANTI, Pradeep Kumar
Agents
  • DONNELLY, Kevin M.
Priority Data
15/956,68318.04.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) MITIGATION OF LEAKY AND ROGUE ACCESS POINTS
(FR) ATTÉNUATION DE POINTS D'ACCÈS AVEC FUITE ET INDESIRABLES
Abstract
(EN)
Certain aspects relate to methods, apparatuses, computer readable mediums and access terminals that effectively (1) detect leaky or rogue access points and (2) take one or more actions based on such detection.
(FR)
Certains aspects concernent des procédés, des appareils, des supports lisibles par ordinateur et des terminaux d'accès qui détectent efficacement (1) des points d'accès avec fuite ou indésirables et (2) prennent une ou plusieurs actions sur la base d'une telle détection.
Also published as
Latest bibliographic data on file with the International Bureau