Method of security management for wireless mobile device and apparatus for security management using the method
First Claim
1. A method of security management of a wireless mobile device, the method comprising:
- respectively managing a traffic map by each service-level, wherein wireless mobile devices frequently communicating with other wireless mobile devices are grouped and stored as a group, among wireless mobile devices on a network;
detecting a wireless mobile device determined to be associated with at least one of a security attack and a malicious code by analyzing data traffic received from a network switching center (NSC); and
isolating up to all wireless mobile devices within the group in which the detected wireless mobile device is included, from the network by referring to the traffic map.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of security management of a wireless mobile device interoperating with a network switching center (NSC) is provided, and an apparatus using the method. The method includes respectively managing a traffic map by each service-level, wherein wireless mobile devices frequently communicating with other wireless mobile devices are grouped and stored as a group, among wireless mobile devices on a network, detecting a wireless mobile device determined to be associated with at least any one of a security attack and a malicious code by analyzing data traffic received from a network switching center, and isolating up to all wireless mobile devices within the group in which the detected wireless mobile device is included, from the network by referring to the traffic map.
110 Citations
22 Claims
-
1. A method of security management of a wireless mobile device, the method comprising:
-
respectively managing a traffic map by each service-level, wherein wireless mobile devices frequently communicating with other wireless mobile devices are grouped and stored as a group, among wireless mobile devices on a network; detecting a wireless mobile device determined to be associated with at least one of a security attack and a malicious code by analyzing data traffic received from a network switching center (NSC); and isolating up to all wireless mobile devices within the group in which the detected wireless mobile device is included, from the network by referring to the traffic map. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable program storage medium storing a program for implementing a method of security management of a wireless mobile device, comprising:
-
a first set of instructions for respectively managing a traffic map by each service-level, wherein wireless mobile devices frequently communicating with other wireless mobile devices are grouped and stored as a group, among wireless mobile devices on a network; a second set of instructions for detecting a wireless mobile device determined to be associated with at least one of a security attack and a malicious code by analyzing data traffic received from a network switching center (NSC); and a third set of instructions for isolating up to all wireless mobile devices within the group in which the detected wireless mobile device is included, from the network by referring to the traffic map.
-
-
9. An apparatus for security management of a wireless mobile device within a network switching center (NSC), the device comprising:
-
a detection database for storing data used for detecting at least one of a security attack and a malicious code; a detection unit for checking input data traffic and detecting a wireless mobile device, determined to be associated with at least one of the security attack and the malicious code, by using the detection database; a traffic map database for grouping and storing wireless mobile devices that frequently communicate with other wireless mobile devices as a group by each service-level, among wireless mobile devices on a network; and an isolation unit for isolating up to all wireless mobile devices within the group in which the detected wireless mobile device is included, from the network by referring to the traffic map database. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for security management of a wireless mobile device, the device, comprising:
-
a detection database for storing data used for detecting a security attack and a malicious code; a detection unit for checking data traffic received from peripheral wireless mobile devices and detecting a wireless mobile device, which is determined to be associated with at least one of the security attack and the malicious code, included in the data traffic by using the detection database; a check/recovery unit for checking whether the wireless mobile device is infected or not and performing a recovery operation when infected; and a remote control unit for communicating with a network switching center (NSC) to control an operation of the check/recovery unit. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification