Method and electronic device for determining security threat on radio access network

    公开(公告)号:US11716628B2

    公开(公告)日:2023-08-01

    申请号:US17091275

    申请日:2020-11-06

    Abstract: Provided are an electronic device and a method for controlling the electronic device. According to the disclosure, an electronic device configured to perform a radio access network function comprises: a communication interface comprising communication circuitry, a processor operatively connected with the communication interface, and a memory operatively connected with the processor, wherein the memory stores instructions which, when executed, cause the processor to: receive, via the communication interface, wireless communication data transmitted via a radio access network, process the received wireless communication data based on a radio access network protocol by at least one first virtualized module corresponding to at least one function of the radio access network, identify an abnormal sign based on the received wireless communication data or a result of processing of the wireless communication data by the at least one first virtualized module, transfer security information indicating the abnormal sign to a second virtualized module by the at least one first virtualized module, and determine an expected security threat on the radio access network based on the security information indicating the abnormal sign by the second virtualized module.

    Server and method for identifying integrity of application

    公开(公告)号:US11308238B2

    公开(公告)日:2022-04-19

    申请号:US16601983

    申请日:2019-10-15

    Abstract: A server is provided. The server according to an embodiment includes a memory, a communicator, and a processor configured to transmit an application check module for identifying integrity of an application stored in an electronic apparatus to the electronic apparatus through the communicator, and, based on identification information corresponding to the application being received from the electronic apparatus, identify integrity of the application based on the received identification information, wherein the processor is further configured to identify integrity of the application based on whether the received identification information is signed by a signature key included in the application check module, and whether the received identification information matches identification information that is pre-stored in the memory.

    SEMICONDUCTOR PACKAGE
    13.
    发明申请

    公开(公告)号:US20240421054A1

    公开(公告)日:2024-12-19

    申请号:US18617964

    申请日:2024-03-27

    Abstract: A semiconductor package according to an embodiment may include a printed circuit board that includes a first pad portion, a semiconductor chip that is mounted on the printed circuit board and includes a second pad portion, a coupling part that is between the first pad portion and the second pad portion, and a spacer that is between the coupling part and the first pad portion. The first pad portion and the second pad portion may be electrically coupled to each other through the coupling part and the spacer.

    ELECTRONIC APPARATUS AND METHOD OF CONTROLLING THEREOF

    公开(公告)号:US20210195425A1

    公开(公告)日:2021-06-24

    申请号:US17094470

    申请日:2020-11-10

    Abstract: An electronic apparatus determining whether an external device spoofs a location thereof includes a communicator, a memory, and a processor configured to receive a first beacon signal and a second beacon signal from a first external device and a second external device, respectively, through the communicator, obtain information on a first distance between the electronic apparatus and the first external device, and information on a second distance between the electronic apparatus and the second external device, based on the first beacon signal and the second beacon signal, respectively, receive information on a third distance between the first external device and the second external device from at least one of the first external device and the second external device through the communicator, and identify whether the first external device spoofs an actual location of the first external device relative to the electronic apparatus, based on the first distance, the second distance, and the third distance.

Patent Agency Ranking