Patents by Inventor Elif Ustundag Soykan

Elif Ustundag Soykan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230328093
    Abstract: A technique for determining a safety-critical state in a cyber-physical system, CPS, is disclosed. A method implementation of the technique is performed by a safety component of the CPS and comprises obtaining (S302) combined sensor data from a plurality of sensors available in the CPS, the combined sensor data being indicative of a current state of the CPS, obtaining (S304) at least one intent-based safety policy, wherein an intent-based safety policy corresponds to a safety policy indicative of a predefined safety-related intent concerning an operational state of the CPS, and checking (S306) the combined sensor data against the at least one intent-based safety policy to determine whether or not the CPS is in a safety-critical state.
    Type: Application
    Filed: January 27, 2021
    Publication date: October 12, 2023
    Inventors: Emrah Tomur, Zeki Bilgin, Mehmet Akif Ersoy, Elif Ustundag Soykan, Leyli Karacay, Ferhat Karakoc
  • Publication number: 20230319567
    Abstract: There is provided a method for handling a request to initiate a call. The method is performed by a server entity. In response to receiving a first request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call, transmission of a first message is initiated towards one or more third client entities to inform the one or more third client entities of the first request. The first client entity is authorised to initiate the call only if a second message, acknowledging the first request, is received from at least one of the one or more third client entities.
    Type: Application
    Filed: January 29, 2021
    Publication date: October 5, 2023
    Inventors: Zeki BILGIN, Ferhat KARAKOC, Emrah TOMUR, Elif Ustundag SOYKAN, Leyli KARACAY, Mehmet Akif ERSOY, Pinar COMAK
  • Publication number: 20230252161
    Abstract: Source code evaluation is provided. The source code includes a plurality of source code elements, and one of the source code elements is selected. A plurality of tokens is generated based on the source code element, and a binary AST representation is generated based on the plurality of tokens. The binary AST representation includes a plurality of binary AST nodes including binary AST token and null nodes. Each of the binary AST token nodes is based on a respective one of the plurality of tokens. Each of the binary AST token and null nodes is encoded into a respective numeric value. A numeric array representation of the source code element is generated based on the binary AST representation. The numeric values are mapped to locations in the numeric array representation based on respective locations of the binary AST token and null nodes in the binary AST representation.
    Type: Application
    Filed: February 10, 2022
    Publication date: August 10, 2023
    Inventors: Zeki BILGIN, Elif USTUNDAG SOYKAN, Mehmet Akif ERSOY, Emrah TOMUR, Pinar COMAK, Leyli KARACAY
  • Publication number: 20230011576
    Abstract: There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.
    Type: Application
    Filed: February 25, 2020
    Publication date: January 12, 2023
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan
  • Publication number: 20230006993
    Abstract: There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).
    Type: Application
    Filed: February 25, 2020
    Publication date: January 5, 2023
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan, Mehmet Akif Ersoy
  • Publication number: 20220345892
    Abstract: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message.
    Type: Application
    Filed: October 25, 2019
    Publication date: October 27, 2022
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan, Mehmet Akif Ersoy