This is our latest selection of worldwide publications and patents in english on Cybersecurity, between many scientific online journals, classified and focused on cybersecurity, malware, phishing, firewall, encriptaciónLa protección de datos, los exploits de día cero, la denegación de servicio, la violación de datos y la inteligencia sobre amenazas.
Network-independent dynamic encryption
Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])
Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]
Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.
dynamic encryption, digital documents, GPS chip, quick response code
Patent
Method and apparatus for confirming boarding of passenger in uam environment
Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])
Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]
Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.
boarding, passenger, UAM, fuselage
Patent
Electronic device, sink device, and control method thereof
Patent published on the 2025-03-06 in WO under Ref WO2025048378 by SAMSUNG ELECTRONICS CO LTD [KR] (Jee Hojeen [kr])
Abstract: An electronic device, a method for controlling the electronic device, a sink device, and a method for controlling the sink device are disclosed. Specifically, the electronic device may include: a communication unit; a memory for storing audio content; and a processor for broadcasting a first signal including the audio content in an encrypted state through the communication unit, wherein the processor: controls the communication unit to transmit a second signal including identification informatio[...]
Our summary: An electronic device and sink device control method involving encrypted audio content transmission and password sharing.
electronic device, control method, sink device, communication unit
Patent
Method and apparatus for supporting protection for control frame in wireless lan system
Patent published on the 2025-03-06 in WO under Ref WO2025048620 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])
Abstract: Disclosed are a method and an apparatus for supporting protection for a control frame in a wireless LAN system. A method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: identifying key information related to protection for a control frame; receiving, from a second STA, a control frame comprising information encrypted on the basis of a specific encryption protocol; and decrypting the encrypte[...]
Our summary: Method and apparatus for supporting protection for control frame in wireless LAN system, including identifying key information, receiving encrypted control frame, and decrypting for integrity check.
wireless LAN, protection, control frame, encryption
Patent
Method and apparatus for supporting protection of control frame in wireless lan system
Patent published on the 2025-03-06 in WO under Ref WO2025048617 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])
Abstract: Disclosed are a method and an apparatus for supporting protection of a control frame in a wireless LAN system. The method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: checking key information related to protection of a control frame; on the basis of a specific encryption protocol, receiving a control frame including encrypted information from a second STA; and on the basis of the key info[...]
Our summary: Method and apparatus for protecting control frames in a wireless LAN system by checking key information, receiving encrypted control frames, and performing decryption and integrity check based on the key information.
wireless LAN, control frame, encryption protocol, decryption
Patent
Identifying a phishing attempt
Patent published on the 2025-02-19 in EP under Ref EP4510508 by BLACKBERRY LTD [CA] (Sircar Shiladitya [ca])
Abstract: Systems, methods, and software can be used to determine a classification of a network accessible page, for example a web page on Internet. In some aspects, a method comprises receiving, at a gateway, a request for accessing a network accessible page from an end-user device; processing the network accessible page to generate a first embedding that characterizes network attributes of a domain of the network accessible page, and a second embedding that characterizes content attributes of the networ[...]
Our summary: Systems, methods, and software for identifying phishing attempts by analyzing network accessible pages, generating scores based on network and content attributes, and determining page classification.
Phishing, Classification, Network, Embedding
Patent
A Systematic Bibliometric Review
Published on 2025-02-18 by Ruhaimatu Abudu, Raj Bridgelall, Bright Parker Quayson, Denver Tolliver, Kwabena Dadson @MDPI
Abstract: Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace of cybersecurity implementation in the railroad industry is slow even as cyberthreats escalate. This study uniquely integrates bibliometric analysis with a[...]
Our summary: Systematic review of cybersecurity challenges in the rail industry, Integration of bibliometric analysis, Recommendations for stakeholders to address cybersecurity risks.
Cybersecurity, Rail industry, Bibliometric analysis, Technological evolution
Publication
A Blockchain-Based Smart Contract Approach
Published on 2025-02-15 by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman, Shi Dong @MDPI
Abstract: Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose s[...]
Our summary: Blockchain-based smart contract approach for enhancing sustainable transportation within smart cities, mitigating cyber threats in EV charging stations, and increasing user trust in EVCS systems.
Blockchain, Smart Contract, Hyperledger Fabric, EV Charging Infrastructure
Publication