Method for detecting unauthorized modification of a communication or broadcast unit
First Claim
1. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
- a) transmitting, by the communication unit via the radio frequency communication resource, at a predetermined time interval, a message, wherein the message comprises a communication unit ID and a software change status indicator;
b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message;
c) transporting, by the receiver, the received message to a database unit;
d) accessing, by the database unit, a stored software change status indicator based on the communication unit ID;
e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and
f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the communication unit occurred.
2 Assignments
0 Petitions
Accused Products
Abstract
A database unit monitors the communications occurring within at least one communication system for a change status indicator of communication or broadcast units. Upon receiving the change status indicator, the database unit compares the one received with a stored change status indicator for the unit. When the stored change status indicator does not match the one received, the database unit indicates that the unit has undergone an unauthorized modification.
17 Citations
18 Claims
-
1. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
-
a) transmitting, by the communication unit via the radio frequency communication resource, at a predetermined time interval, a message, wherein the message comprises a communication unit ID and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the communication unit ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the communication unit occurred. - View Dependent Claims (2, 3, 4, 5, 14)
-
-
6. In a communication system that includes at least one base station and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a base station, the method comprises the steps of:
-
a) transmitting, by the base station via the radio frequency communication resource, at a predetermined time interval, a message, wherein the message comprises a base station ID and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the base station ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the base station occurred. - View Dependent Claims (7, 8, 9, 10)
-
-
11. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
-
a) determining, by the communication unit, that a modification has occurred to the communication unit; b) when the modification has occurred to the communication unit, transmitting, by the communication unit via the radio frequency communication resource, a message, wherein the message comprises a communication unit ID and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the communication unit ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the communication unit occurred. - View Dependent Claims (12)
-
-
13. In a communication system that includes at least one base station and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a base station, the method comprises the steps of:
-
a) determining, by the base station, that a modification has occurred to the base station; b) when the modification has occurred to the base station, transmitting, by the base station via the radio frequency communication resource, a message, wherein the message comprises a base station ID and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the base station ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the base station occurred.
-
-
15. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
-
a) transmitting, by the communication unit via the radio frequency communication resource, a message, wherein the message comprises a communication unit ID, a resource request and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the communication unit ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the communication unit occurred. - View Dependent Claims (16)
-
-
17. In a communication system that includes at least one base station and at least one radio frequency communication resource, a method of detecting an unauthorized modification of a base station, the method comprises the steps of:
-
a) transmitting, by the base station via the radio frequency communication resource, a message, wherein the message comprises a base station ID, a resource request and a software change status indicator; b) receiving, by a receiver via the radio frequency communication resource, the message, thus forming a received message; c) transporting, by the receiver, the received message to a database unit; d) accessing, by the database unit, a stored software change status indicator based on the base station ID; e) comparing, by the database unit, the software change status indicator with the stored software change status indicator; and f) when the software change status indicator and the stored software change status indicator do not substantially match, indicating, by the database unit, that an unauthorized modification to the base station occurred. - View Dependent Claims (18)
-
Specification