Unlock instant, AI-driven research and patent intelligence for your innovation.

Software modem with hidden authentication commands

A technology of identification codes and program instructions, applied in modulation carrier systems, instruments, electrical components, etc., to solve problems such as the inability of the target to move, the inability to use it normally, and the inability to use the subscriber line.

Inactive Publication Date: 2004-09-01
ADVANCED MICRO DEVICES INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] Communication devices that use software to implement other communication protocols are also susceptible to some of the above problems, but there will be different degrees and levels of results
For example, software drivers for communication devices that use copper subscriber lines such as audio wideband modems (V.90), asymmetric digital subscriber line (ADSL) modems, and home telephone network networks (HomePNA) are vulnerable to attacks due to , resulting in the subscriber line being unusable or not working normally
For example, a group of infected software modems could keep calling a specific number under a denial of service attack and thus incapacitate the target

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software modem with hidden authentication commands
  • Software modem with hidden authentication commands
  • Software modem with hidden authentication commands

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Specific embodiments of the present invention will be described below. In order to simplify the description, not all features of an actual application are described in this specification. It is certainly expected that in the development of any such embodiment, various application-oriented decisions must be determined in advance in order to achieve the developer's specific goals, such as compatibility with related systems and related business constraints, which will vary from application to application. different. Again, while such developmental work is complex and time consuming, it would nevertheless become routine for those skilled in the art given the benefit of this invention.

[0032] refer to figure 1 , a block diagram of the communication system 10 is shown in the figure. The communication system 10 includes a subscriber base station 20 that can communicate with a central base station 30 through a communication channel 40 . In the illustrated embodiment, subs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A communication system includes a physical layer hardware unit and a processing unit. The physical layer hardware unit is adapted to communicate data over a communications channel in accordance with assigned transmission parameters. The physical layer hardware unit is adapted to receive an incoming signal over the communications channel and sample the incoming signal to generate a digital received signal. The processing unit is adapted to execute a software driver including program instructions adapted to extract control codes from the digital received signal, generate an authentication code, and transfer the control codes and the authentication code to the physical layer hardware unit. The physical layer hardware unit is adapted to signal a security violation in response to the control codes being inconsistent with the authentication code.

Description

technical field [0001] The present invention relates to modem communications, and more particularly, to software modems with hidden authentication instructions. Background technique [0002] In recent years, wireless telephony has grown in popularity. A radiotelephone is an example of a so-called "mobile base station" or "mobile terminal". In addition to wireless phones, mobile base stations can also take various forms, including computers with mobile communication capabilities (eg, portable computers). [0003] Telecommunications services are provided between the wireless cellular telecommunication network and the mobile base station through an air interface such as radio frequency. Usually, a dedicated International Mobile Subscriber Identity (IMSI, International Mobile Subscriber Identity) is assigned to each mobile base station. At any time, the mobile base station in standby can communicate with one or more base stations through the air interface. These base station...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/10H04W4/00G06F21/00H04B7/26H04L29/06H04W12/00
CPCH04L63/08H04L63/0428G06F21/55H04L27/00
Inventor B·C·巴恩斯D·W·史密斯T·L·科尔R·施密特G·S·斯特龙金M·巴克利
Owner ADVANCED MICRO DEVICES INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More