Patents by Inventor Elif Ustundag Soykan

Elif Ustundag Soykan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250203369
    Abstract: A technique for determining security attacks in wireless communication systems is disclosed. A method implementation of the technique is performed by a controller and includes obtaining a first statistics based on an amount of messages received from at least one packet forwarding entity within a pre-defined time interval, t, wherein the first statistics is a time-domain data; obtaining a second statistics based on at least one arriving-time difference, Td, between two consecutive messages; detecting an anomaly based on the second statistics; determining, if the anomaly is detected, a security attack based on the first statistics; and initiating a security attack notification to an orchestrator.
    Type: Application
    Filed: February 22, 2022
    Publication date: June 19, 2025
    Inventors: Ramin FULADI, Utku GÜLEN, Elif USTUNDAG SOYKAN, Ayse Bilge INCE, Leyli KARACAY
  • Publication number: 20250150462
    Abstract: According to a first aspect there is a method performed by a detector node in a communications network, wherein the detector node is for monitoring messages sent between a first client node, a second client node and a Federated Learning, FL, server, as part of a FL process wherein, as part of the FL process, the first client node sends a local model update to the second client node for forwarding to the FL server. The method comprising: receiving first information relating to the local model update sent from the first client node to the second client node; receiving second information relating to the local model update as received or forwarded by the second client node; and comparing the first information to the second information to determine whether the second client node correctly received or forwarded the first information relating to the local model.
    Type: Application
    Filed: December 23, 2022
    Publication date: May 8, 2025
    Inventors: Ferhat Karakoc, Elif Ustundag Soykan, Leyli Karacay, Pinar Comak De Cnudde, Ramin Fuladi, Utku Gülen
  • Publication number: 20250119296
    Abstract: Embodiments described herein provide methods and apparatuses for performing federated learning, FL.
    Type: Application
    Filed: July 11, 2022
    Publication date: April 10, 2025
    Inventors: Elif Ustundag Soykan, Ferhat Karakoc, Leyli Karacay, Pinar Comak, Ramin Fuladi, Utku Gülen
  • Patent number: 12111934
    Abstract: Source code evaluation is provided. The source code includes a plurality of source code elements, and one of the source code elements is selected. A plurality of tokens is generated based on the source code element, and a binary AST representation is generated based on the plurality of tokens. The binary AST representation includes a plurality of binary AST nodes including binary AST token and null nodes. Each of the binary AST token nodes is based on a respective one of the plurality of tokens. Each of the binary AST token and null nodes is encoded into a respective numeric value. A numeric array representation of the source code element is generated based on the binary AST representation. The numeric values are mapped to locations in the numeric array representation based on respective locations of the binary AST token and null nodes in the binary AST representation.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: October 8, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Zeki Bilgin, Elif Ustundag Soykan, Mehmet Akif Ersoy, Emrah Tomur, Pinar Comak, Leyli Karacay
  • Patent number: 12081987
    Abstract: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message. The system is configured to identify, by the analyser device, the base station as fraudulent when reports of the same base station as received from at least two different ones of the at least two radio devices are received within a threshold time duration with respect to each other.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: September 3, 2024
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan, Mehmet Akif Ersoy
  • Publication number: 20240284181
    Abstract: The invention relates to a method for operating a mobile entity in a cellular network, the method comprising: —receiving an identity request from a requesting entity, the identity request requesting a permanent, non-temporary identity of the mobile entity, by which the mobile entity is uniquely identified in the cellular network, —transmitting, in response to the identity request, a response to the requesting entity, the response including the permanent, non-temporary identity of the mobile entity, —transmitting, in response to the identity request, a verification request requesting a verification of the identity request to a verification entity of the cellular network.
    Type: Application
    Filed: November 23, 2021
    Publication date: August 22, 2024
    Inventors: Ferhat Karakoc, Ayse Bilge Ince, Elif Ustundag Soykan, Emrah Tomur, Leyli Karacay
  • Publication number: 20230328093
    Abstract: A technique for determining a safety-critical state in a cyber-physical system, CPS, is disclosed. A method implementation of the technique is performed by a safety component of the CPS and comprises obtaining (S302) combined sensor data from a plurality of sensors available in the CPS, the combined sensor data being indicative of a current state of the CPS, obtaining (S304) at least one intent-based safety policy, wherein an intent-based safety policy corresponds to a safety policy indicative of a predefined safety-related intent concerning an operational state of the CPS, and checking (S306) the combined sensor data against the at least one intent-based safety policy to determine whether or not the CPS is in a safety-critical state.
    Type: Application
    Filed: January 27, 2021
    Publication date: October 12, 2023
    Inventors: Emrah Tomur, Zeki Bilgin, Mehmet Akif Ersoy, Elif Ustundag Soykan, Leyli Karacay, Ferhat Karakoc
  • Publication number: 20230319567
    Abstract: There is provided a method for handling a request to initiate a call. The method is performed by a server entity. In response to receiving a first request for a first client entity to initiate a call to a second client entity without the second client entity rendering a notification of the call, transmission of a first message is initiated towards one or more third client entities to inform the one or more third client entities of the first request. The first client entity is authorised to initiate the call only if a second message, acknowledging the first request, is received from at least one of the one or more third client entities.
    Type: Application
    Filed: January 29, 2021
    Publication date: October 5, 2023
    Inventors: Zeki BILGIN, Ferhat KARAKOC, Emrah TOMUR, Elif Ustundag SOYKAN, Leyli KARACAY, Mehmet Akif ERSOY, Pinar COMAK
  • Publication number: 20230252161
    Abstract: Source code evaluation is provided. The source code includes a plurality of source code elements, and one of the source code elements is selected. A plurality of tokens is generated based on the source code element, and a binary AST representation is generated based on the plurality of tokens. The binary AST representation includes a plurality of binary AST nodes including binary AST token and null nodes. Each of the binary AST token nodes is based on a respective one of the plurality of tokens. Each of the binary AST token and null nodes is encoded into a respective numeric value. A numeric array representation of the source code element is generated based on the binary AST representation. The numeric values are mapped to locations in the numeric array representation based on respective locations of the binary AST token and null nodes in the binary AST representation.
    Type: Application
    Filed: February 10, 2022
    Publication date: August 10, 2023
    Inventors: Zeki BILGIN, Elif USTUNDAG SOYKAN, Mehmet Akif ERSOY, Emrah TOMUR, Pinar COMAK, Leyli KARACAY
  • Publication number: 20230011576
    Abstract: There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.
    Type: Application
    Filed: February 25, 2020
    Publication date: January 12, 2023
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan
  • Publication number: 20230006993
    Abstract: There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).
    Type: Application
    Filed: February 25, 2020
    Publication date: January 5, 2023
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan, Mehmet Akif Ersoy
  • Publication number: 20220345892
    Abstract: There is provided mechanisms for identifying a fraudulent base station. A system comprises an analyser device and at least two radio devices. The system is configured to provide a report, from any of the at least two radio devices and to the analyser device upon that any of the at least two radio devices having received from a base station an identity request message for a long-term identifier of that any of the at least two radio devices, of the identity request message.
    Type: Application
    Filed: October 25, 2019
    Publication date: October 27, 2022
    Inventors: Zeki Bilgin, Emrah Tomur, Elif Ustundag Soykan, Mehmet Akif Ersoy