METHOD OF COMMUNICATIONS AND COMMUNICATION NETWORK INTRUSION PROTECTION METHODS AND INTRUSION ATTEMPT DETECTION SYSTEM
First Claim
1. A computer-implemented system for communicating with a mobile telephony device in a telecommunications system, the system comprising:
- one or more computer processors configured to assign a valid variable cyber coordinate associated with a permanent identifier of the mobile telephony device, wherein the cyber coordinate defines a location or position of the mobile telephony device in a cyber space;
the computer processors configured to determine if a received identifier, received during a communication attempt, with the mobile telephony device, based on the permanent identifier, is the valid variable cyber coordinate associated with the permanent identifier;
the computer processors configured to enable a communication with the mobile telephony device, if the received identifier is determined to be the valid variable cyber coordinate associated with the permanent identifier;
the computer processors configured to not enable a communication with the mobile telephony device, if the received identifier is determined not to be the valid variable cyber coordinate associated with the permanent identifier;
the computer processors configured to change the variable cyber coordinate; and
the computer processors configured to repeat the determining and enabling steps to at least one of maintain uninterrupted communications with the mobile telephony device and maintain communications capabilities with the mobile telephony device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
20 Citations
36 Claims
-
1. A computer-implemented system for communicating with a mobile telephony device in a telecommunications system, the system comprising:
-
one or more computer processors configured to assign a valid variable cyber coordinate associated with a permanent identifier of the mobile telephony device, wherein the cyber coordinate defines a location or position of the mobile telephony device in a cyber space; the computer processors configured to determine if a received identifier, received during a communication attempt, with the mobile telephony device, based on the permanent identifier, is the valid variable cyber coordinate associated with the permanent identifier; the computer processors configured to enable a communication with the mobile telephony device, if the received identifier is determined to be the valid variable cyber coordinate associated with the permanent identifier; the computer processors configured to not enable a communication with the mobile telephony device, if the received identifier is determined not to be the valid variable cyber coordinate associated with the permanent identifier; the computer processors configured to change the variable cyber coordinate; and the computer processors configured to repeat the determining and enabling steps to at least one of maintain uninterrupted communications with the mobile telephony device and maintain communications capabilities with the mobile telephony device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for communicating with a mobile telephony device in a telecommunications system, and including one or more computer readable instructions embedded on a tangible computer readable medium and configured to cause one or more computer processors to perform the steps of:
-
assigning a valid variable cyber coordinate associated with a permanent identifier of the mobile telephony device, wherein the cyber coordinate defines a location or position of the mobile telephony device in a cyber space; determining if a received identifier, received during a communication attempt, with the mobile telephony device, based on the permanent identifier, is the valid variable cyber coordinate associated with the permanent identifier; enabling a communication with the mobile telephony device, if the received identifier is determined to be the valid variable cyber coordinate associated with the permanent identifier; not enabling a communication with the mobile telephony device, if the received identifier is determined not to be the valid variable cyber coordinate associated with the permanent identifier; changing the variable cyber coordinate; and repeating the determining and enabling steps to at least one of maintain uninterrupted communications with the mobile telephony device and maintain communications capabilities with the mobile telephony device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification