System and Method for Embedded Mobile (EM)/Machine to Machine (M2M) Security, Pattern Detection, Mitigation
First Claim
1. A security system for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising:
- means to capture data traffic originating from the plurality of devices on the network;
means for analysing the data traffic; and
means for identifying at least one of the M2M operated devices on the network, wherein the system is configured to dynamically adapt to different data traffic patterns on the network.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising: means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network wherein the system is configured to dynamically adapt to different data traffic patterns on the network.
-
Citations
37 Claims
-
1. A security system for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising:
-
means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network, wherein the system is configured to dynamically adapt to different data traffic patterns on the network. - View Dependent Claims (2, 3, 4, 7, 9, 10, 11, 12, 13, 14, 17, 18, 19, 20, 21, 25, 27, 31, 32)
-
-
5-6. -6. (canceled)
-
8. (canceled)
-
15-16. -16. (canceled)
-
22-24. -24. (canceled)
-
26. (canceled)
-
28-30. -30. (canceled)
-
33-35. -35. (canceled)
-
36. A method of providing security in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said method comprising:
-
capturing data traffic originating from the plurality of devices on the network; analysing the data traffic; and identifying at least one of the M2M operated devices on the network, wherein the method dynamically adapts to different data traffic patterns on the network.
-
-
37-38. -38. (canceled)
Specification