×

System and method for voice security in a telecommunications network

  • US 10,536,468 B2
  • Filed: 12/19/2016
  • Issued: 01/14/2020
  • Est. Priority Date: 07/21/2016
  • Status: Active Grant
First Claim
Patent Images

1. A telecommunications network comprising:

  • a first routing device in communication with a first client network in a first geographic location;

    a second routing device in communication with a second client network in a second geographic location;

    a central analysis system comprising a database of transmission signatures of security attacks on the telecommunications network, the central analysis system configured to;

    receive a first Layer 3 through Layer 7 transmission information of a first communication, wherein the first communication is transmitted to the first routing device by the first client network in the first geographic location;

    receive a second Layer 3 through Layer 7 transmission information of a second communication, wherein the second communication is transmitted to the second routing device by the second client network in the second geographic location;

    determine the second Layer 3 through Layer 7 transmission information is received within a particular time period of receiving the first Layer 3 through Layer 7 transmission;

    compare the first Layer 3 through Layer 7 transmission information and the second Layer 3 through Layer 7 transmission information to a stored transmission signature in the database;

    determine the first Layer 3 through Layer 7 transmission information and the second Layer 3 through Layer 7 transmission information match the stored transmission signature;

    determine a security attack occurred on the telecommunications network based on the first Layer 3 through Layer 7 transmission information and the second Layer 3 through Layer 7 transmission information being received within the particular time period and the first Layer 3 through Layer 7 transmission information and the second Layer 3 through Layer 7 transmission information matching the stored transmission signature;

    generate at least one mitigating instruction in response to the detected security attack on the telecommunications network, the mitigating instruction including first Layer 3 through Layer 7 transmission information and the second Layer 3 through Layer 7 transmission information for routing a received communication; and

    transmit the at least one mitigating instruction to at least one routing device along a transmission path of the security attack on the telecommunications networkwherein the at least one mitigating instruction comprises a Layer 3 through Layer 7 instruction to reroute received communications with the stored transmission signature in the database to a firewall device of the telecommunications network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×