Network security architecture for a mobile network platform
First Claim
1. A network security architecture for monitoring security activities in a mobile network platform, comprising:
- a mobile network residing on the mobile network platform, the mobile network includes a plurality of user access points;
an address manager residing on the mobile network platform and operable to dynamically assign a network address to any one of the plurality of the user access points;
a security response actuator associated with each of the plurality of user access points, each security response actuator is operable to enforce an association of a network address with an assigned user access point;
an intrusion detection system connected to the mobile network and residing on the mobile network platform, the intrusion detection system operable to detect a security intrusion event that is associated with a first user access point from the plurality of user access points; and
a mobile security manager residing on the mobile network platform, the mobile security manager is adapted to receive the security intrusion event from the intrusion detection system and operable to issue a security response command in response to the security intrusion event, where the security response command is directed to said first user access point.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile platform security architecture is provided for monitoring security activities associated with a network residing on an aircraft. The security architecture includes a plurality of passenger connections to the network, such that each of the passenger connections has an enforced network address and is disposed in proximate location to a passenger seating area; an intrusion detection system connected to the network and operable to detect a security intrusion event whose origination is associated with network; and an airborne security manager connected to the network and adapted to receive the security intrusion event from the intrusion detection system. The security architecture is further operable to perform a security response in accordance with a security policy, where the security response is directed to at least one of the passenger connections.
-
Citations
6 Claims
-
1. A network security architecture for monitoring security activities in a mobile network platform, comprising:
-
a mobile network residing on the mobile network platform, the mobile network includes a plurality of user access points;
an address manager residing on the mobile network platform and operable to dynamically assign a network address to any one of the plurality of the user access points;
a security response actuator associated with each of the plurality of user access points, each security response actuator is operable to enforce an association of a network address with an assigned user access point;
an intrusion detection system connected to the mobile network and residing on the mobile network platform, the intrusion detection system operable to detect a security intrusion event that is associated with a first user access point from the plurality of user access points; and
a mobile security manager residing on the mobile network platform, the mobile security manager is adapted to receive the security intrusion event from the intrusion detection system and operable to issue a security response command in response to the security intrusion event, where the security response command is directed to said first user access point. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for monitoring security activities associated with a network residing in a mobile network platform, comprising:
-
providing a plurality of user access points to the network;
dynamically assigning a network address to one of the plurality of the user access points and enforcing an association of the network address with said one of the plurality of assigned user access points;
detecting a security intrusion event whose origination is associated with one of the plurality of user access points; and
performing a security response activity in response to the detected security intrusion event, when the security response activity is directed to said one of the plurality of user access points.
-
Specification