Wireless communication network security method and system
First Claim
1. A radio access network security method, comprising the steps of:
- monitoring for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names;
notifying of a specific abnormality detected via a wireless communication link;
receiving access, conditional access or limited access via the wireless communication link based on the specific abnormality detected; and
suspending packet data services at a mobile radio upon detection of a malicious software routine in the mobile radio while continuing to enable voice or circuit data calls.
4 Assignments
0 Petitions
Accused Products
Abstract
A security method (100) in a radio access network can include monitoring (102) (by either a base station controller or a mobile radio) for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names, notifying (104) of a specific abnormality detected, and receiving (108) access, conditional access or limited access based on the specific abnormality detected. The method can further include receiving updates (112) used for monitoring the abnormalities. The method can further include the optional step (106) of issuing a notification from a mobile radio to a base station controller if the specific abnormality is detected and suspending (110) one or more services based on the specific abnormality detected. The method can further include receiving (114) at the mobile radio an over the air programming instruction to suspend a specific service and alerting the mobile radio.
43 Citations
18 Claims
-
1. A radio access network security method, comprising the steps of:
-
monitoring for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names; notifying of a specific abnormality detected via a wireless communication link; receiving access, conditional access or limited access via the wireless communication link based on the specific abnormality detected; and suspending packet data services at a mobile radio upon detection of a malicious software routine in the mobile radio while continuing to enable voice or circuit data calls. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A radio access network security system, comprising:
-
a transceiver; a processor coupled to the transceiver, wherein the processor is programmed to; monitor for one or more abnormalities among CPU utilization, memory storage, memory read-write, malicious incoming or outgoing messages, and virus file names; notify of a specific abnormality detected among the one or more abnormalities via a wireless communication link; receive access, conditional access or limited access via the wireless communication link based on the specific abnormality detected; and suspend packet data services at a mobile radio upon detection of a malicious software routine in the mobile radio while continuing to enable voice or circuit data calls. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification