SECURITY BASED NETWORK ACCESS SELECTION
First Claim
1. A method of selecting a set of secure network connections between a wireless device in a wireless communication system and a target destination system, the method comprising:
- performing a first security assessment associated with each of a plurality of base station connections associated with respective each of a plurality of base stations available for wireless communications with the wireless device;
performing a second security assessment associated with each of a plurality of subsequent network connections available between the plurality of base stations and a target destination system; and
prioritizing, in response to performing the first security assessment and the second security assessment, a set of base station connections from the plurality of base station connections and a set of subsequent network connections from the plurality of subsequent network connections according to predetermined security criteria associated with the wireless device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and wireless device select a set of secure network connections (230) between a wireless device (108) in a wireless communication system and a target destination system (238). A first security assessment (708) associated with each of a plurality of base station connections associated with respective each of a plurality of base stations (116) available for wireless communications with the wireless device (108) is performed. A second security assessment (716) associated with each of a plurality of subsequent network connections available between the plurality of base stations (116) and a target destination system (238) is performed. A set of base station connections from the plurality of base station connections are prioritized according to predetermined security criteria associated with the wireless device (108). A set of subsequent network connections from the plurality of subsequent network connections (230) are prioritized according to predetermined security criteria associated with the wireless device (108).
50 Citations
20 Claims
-
1. A method of selecting a set of secure network connections between a wireless device in a wireless communication system and a target destination system, the method comprising:
-
performing a first security assessment associated with each of a plurality of base station connections associated with respective each of a plurality of base stations available for wireless communications with the wireless device; performing a second security assessment associated with each of a plurality of subsequent network connections available between the plurality of base stations and a target destination system; and prioritizing, in response to performing the first security assessment and the second security assessment, a set of base station connections from the plurality of base station connections and a set of subsequent network connections from the plurality of subsequent network connections according to predetermined security criteria associated with the wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, with an information processing system, for assessing security provided by a plurality of networks, the method comprising:
-
receiving a request from a wireless device for security information associated with at least one of a plurality of base stations and a plurality of subsequent network connections available between the plurality of base stations and a target destination system; performing, in response to the receiving, a first security assessment associated with each of a plurality of base station connections associated with respective each of the plurality of base stations; and performing, in response to the receiving, a second security assessment associated with each of the plurality of subsequent network connections, wherein each subsequent network connection in the plurality of subsequent network connections comprises a plurality of network components for allowing communication with the at least one target destination system. - View Dependent Claims (12)
-
-
13. A wireless device comprising:
-
a memory; a processor communicatively coupled to the memory; a transceiver communicatively coupled to the memory and the processor; and a security monitor service manager, communicatively coupled to the memory, the processor, and the transceiver, wherein the security monitor service manager is adapted to; determine at least one security requirement for at least one network connection for communicating to a target destination system; analyze a first security assessment associated with each of a plurality of base station connections associated with respective each of a plurality of base stations; dynamically select, in response to analyzing the first security assessment, a base station from the plurality of base stations that satisfies the at least one security requirement; analyze a second security assessment associated with each of a plurality of subsequent network connections available between the plurality of base stations and the target destination system; and dynamically select, in response to analyzing the second security assessment, a subsequent network connection from the plurality of subsequent network connections that satisfies the at least one security requirement. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification