Telecommunications defence system
First Claim
1. A telecommunications defense system comprising at least one server, comprising at least one processor and memory, adapted to be in communication with a client telecommunications system via a telecommunications network, the telecommunications defense system comprising a shielding application and a scanning application;
- a) the shielding application containing instructions which, when executed on the at least one server, cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability;
b) the scanning application containing instructions which, when executed on the at least one server, generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield, wherein the telecommunications defense system produces a first vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal;
c) the scanning application containing further instructions, which when executed on the at least one server, generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield, wherein the telecommunications defense system produces a second vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal;
d) the telecommunications defense system being further operative to compare the first and second vulnerability signals and to generate an output signal based on the comparison, and indicative of any unshielded vulnerabilities.
0 Assignments
0 Petitions
Accused Products
Abstract
A telecommunications defence system (TDS) comprises at least one server adapted to communicate with a client telecommunications system (ClientTS) via a telecommunications network, a shielding application (ShieldApp) and a scanning application (ScanApp). The ShieldApp causes the server to generate a shield signal providing at least one shield that shields the ClientTS from at least one external vulnerability. The ScanApp generates a first scanning signal which scans the ClientTS for vulnerabilities without shielding by the shield. The TDS produces a first signal indicative of vulnerabilities of the ClientTS determined by the first scanning signal. The ScanApp generates a second scanning signal which scans the ClientTS for vulnerabilities whilst being shielded. The TDS produces a second signal indicative of vulnerabilities of the ClientTS determined by the second scanning signal. The TDS compares the first and second signals and generates an output indicative of unshielded vulnerabilities.
-
Citations
24 Claims
-
1. A telecommunications defense system comprising at least one server, comprising at least one processor and memory, adapted to be in communication with a client telecommunications system via a telecommunications network, the telecommunications defense system comprising a shielding application and a scanning application;
-
a) the shielding application containing instructions which, when executed on the at least one server, cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability; b) the scanning application containing instructions which, when executed on the at least one server, generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield, wherein the telecommunications defense system produces a first vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal; c) the scanning application containing further instructions, which when executed on the at least one server, generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield, wherein the telecommunications defense system produces a second vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal; d) the telecommunications defense system being further operative to compare the first and second vulnerability signals and to generate an output signal based on the comparison, and indicative of any unshielded vulnerabilities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A server or server network, comprising at least one processor and memory, of a telecommunications defense system, the server being adapted to be in communication with a client telecommunications system via a telecommunications network, the server or server network comprising a shielding application and a scanning application;
-
a) the shielding application containing instructions which, when executed on the at least one server, cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability; b) the scanning application containing instructions which, when executed on the at least one server, generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield, wherein a first vulnerability signal is produced indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal; c) the scanning application containing further instructions, which when executed on the at least one server, generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield, wherein a second vulnerability signal is produced indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal; d) the server being further operative to compare the first and second vulnerability signals and to generate an output signal based on the comparison, and indicative of any unshielded vulnerabilities.
-
-
23. A method of defending a client telecommunications system using a telecommunications defense system comprising at least one server comprising at least one processor and memory, adapted to be in communication with the client telecommunications system via a telecommunications network, the telecommunications defense system comprising a shielding application and a scanning application;
- the method comprising steps of;
a) executing instructions of the shielding application on the at least one server to cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability; b) executing instructions of the scanning application on the at least one server to generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield; c) producing a first vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal; d) executing further instructions of the scanning application on the at least one server to generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield; e) producing a second vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal; f) comparing the first and second vulnerability signals and generating an output signal based on the comparison, and indicative of any unshielded vulnerabilities.
- the method comprising steps of;
-
24. A telecommunications network comprising a telecommunications defense system provided with at least one server comprising at least one processor and memory, adapted to be in communication with a client telecommunications system via a telecommunications network, the telecommunications defense system comprising a shielding application and a scanning application;
-
a) the shielding application containing instructions which, when executed on the at least one server, cause the server to generate a shield signal which provides at least one shield operative to shield the client telecommunications system from at least one external vulnerability; b) the scanning application containing instructions which, when executed on the at least one server, generate a first scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities without being shielded from the client telecommunications system by the shield, wherein the telecommunications defense system produces a first vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the first scanning signal; c) the scanning application containing further instructions, which when executed on the at least one server, generate a second scanning signal over the telecommunications network which scans the client telecommunications system for vulnerabilities whilst being shielded from the client telecommunications system by the at least one shield, wherein the telecommunications defense system produces a second vulnerability signal indicative of any vulnerabilities of the client telecommunications system determined by the second scanning signal; d) the telecommunications defense system being further operative to compare the first and second vulnerability signals and to generate an output signal based on the comparison, and indicative of any unshielded vulnerabilities.
-
Specification