Wireless communication network security method and system
First Claim
1. A radio access network security method, comprising the steps of:
- monitoring for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names;
notifying of a specific abnormality detected via a wireless communication link; and
receiving access, conditional access or limited access via the wireless communication link based on the specific abnormality detected.
4 Assignments
0 Petitions
Accused Products
Abstract
A security method (100) in a radio access network can include monitoring (102) (by either a base station controller or a mobile radio) for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names, notifying (104) of a specific abnormality detected, and receiving (108) access, conditional access or limited access based on the specific abnormality detected. The method can further include receiving updates (112) used for monitoring the abnormalities. The method can further include the optional step (106) of issuing a notification from a mobile radio to a base station controller if the specific abnormality is detected and suspending (110) one or more services based on the specific abnormality detected. The method can further include receiving (114) at the mobile radio an over the air programming instruction to suspend a specific service and alerting the mobile radio.
102 Citations
20 Claims
-
1. A radio access network security method, comprising the steps of:
-
monitoring for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names;
notifying of a specific abnormality detected via a wireless communication link; and
receiving access, conditional access or limited access via the wireless communication link based on the specific abnormality detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A radio access network security system, comprising:
-
a transceiver;
a processor coupled to the transceiver, wherein the processor is programmed to;
monitor for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names;
notify of a specific abnormality detected among the one or more abnormalities via a wireless communication link; and
receive access, conditional access or limited access via the wireless communication link based on the specific abnormality detected. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A radio access network system, comprising:
-
a transceiver; and
a processor coupled to the transceiver, wherein the processor is programmed to;
detect an abnormality in an application within a mobile radio in communication with the radio access network system; and
responsive to detecting the abnormality, perform at least one function among;
controlling access by the mobile radio to resources on the radio access network system selectively, while enabling access for the mobile radio to other resources on the radio access network system, and running one or more mitigation functions that mitigate the effects of the abnormality on the radio access network system. - View Dependent Claims (20)
-
Specification