×

Telecommunications defence system

  • US 10,498,757 B2
  • Filed: 09/10/2015
  • Issued: 12/03/2019
  • Est. Priority Date: 09/11/2014
  • Status: Active Grant
First Claim
Patent Images

1. A telecommunications defense system comprising at least one server, comprising at least one processor and memory, adapted to be in communication with a client telecommunications system via a telecommunications network, the telecommunications defense system comprising a shielding application and a scanning application;

  • a) the shielding application containing instructions which, when executed on the at least one server, cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability;

    b) the scanning application containing instructions which, when executed on the at least one server, generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield, wherein the telecommunications defense system produces a first vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal;

    c) the scanning application containing further instructions, which when executed on the at least one server, generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield, wherein the telecommunications defense system produces a second vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal;

    d) the telecommunications defense system being further operative to compare the first and second vulnerability signals and to generate an output signal based on the comparison, and indicative of any unshielded vulnerabilities.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×