Method of communications and communication network intrusion protection methods and intrusion attempt detection system
First Claim
1. A computer-implemented method for communicating with a mobile telephony device in a telecommunications system, the method comprising:
- assigning a valid variable cyber coordinate associated with a permanent identifier of the mobile telephony device, wherein the cyber coordinate defines a location or position of the mobile telephony device in a cyber space;
determining if a received identifier, received during a communication attempt, with the mobile telephony device, based on the permanent identifier, is the valid variable cyber coordinate associated with the permanent identifier;
enabling a communication with the mobile telephony device, if the received identifier is determined to be the valid variable cyber coordinate associated with the permanent identifier;
not enabling a communication with the mobile telephony device, if the received identifier is determined not to be the valid variable cyber coordinate associated with the permanent identifier;
changing the variable cyber coordinate; and
repeating the determining and enabling steps to at least one of maintain uninterrupted communications with the mobile telephony device and maintain communications capabilities with the mobile telephony device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
-
Citations
21 Claims
-
1. A computer-implemented method for communicating with a mobile telephony device in a telecommunications system, the method comprising:
-
assigning a valid variable cyber coordinate associated with a permanent identifier of the mobile telephony device, wherein the cyber coordinate defines a location or position of the mobile telephony device in a cyber space;
determining if a received identifier, received during a communication attempt, with the mobile telephony device, based on the permanent identifier, is the valid variable cyber coordinate associated with the permanent identifier;
enabling a communication with the mobile telephony device, if the received identifier is determined to be the valid variable cyber coordinate associated with the permanent identifier;
not enabling a communication with the mobile telephony device, if the received identifier is determined not to be the valid variable cyber coordinate associated with the permanent identifier;
changing the variable cyber coordinate; and
repeating the determining and enabling steps to at least one of maintain uninterrupted communications with the mobile telephony device and maintain communications capabilities with the mobile telephony device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification