Methods and apparatus for automatic security checking in systems that monitor for improper network usage
First Claim
1. A system to mitigate improper network usage, the system comprising:
- memory including machine readable instructions; and
a processor responsive to the machine readable instructions to perform operations comprising;
determining whether to issue a notification in response to an activity alert corresponding to monitored usage of a communication network by a user device, the monitored usage occurring after the user device has been granted access to the communication network;
in response to the activity alert, initiating transmission of a session initiation protocol network-initiated re-authentication request to a voice over Internet protocol call processor to cause the user device to perform a re-authentication procedure with the voice over Internet protocol call processor;
in response to determining the session initiation protocol re-authentication procedure was unsuccessful, initiating subsequent transmission of (i) a teardown request to the voice over Internet protocol call processor to cause the voice over Internet protocol call processor to teardown a current session initiation protocol session with the user device, and (ii) a session initiation protocol network-initiated de-registration request to the voice over Internet protocol call processor to cause a session initiation protocol de-registration procedure to be performed to de-register the user device from the voice over Internet protocol call processor; and
causing the notification to be issued in response to the activity alert if both the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are unsuccessful, but not if at least one of the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are successful.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for automatic security checking in systems that monitor for improper network usage are disclosed. An example system to mitigate improper network usage disclosed herein comprises an alert processor to determine whether to issue a notification in response to an activity alert corresponding to monitored usage of a communication network by a user device, wherein the monitored usage occurs after the user device has been granted access to the communication network, and an automatic verifier to respond to the activity alert by causing at least one of an automatic validation command or an automatic disconnect command to be sent to the user device before the alert processor determines whether to issue the notification.
15 Citations
16 Claims
-
1. A system to mitigate improper network usage, the system comprising:
-
memory including machine readable instructions; and a processor responsive to the machine readable instructions to perform operations comprising; determining whether to issue a notification in response to an activity alert corresponding to monitored usage of a communication network by a user device, the monitored usage occurring after the user device has been granted access to the communication network; in response to the activity alert, initiating transmission of a session initiation protocol network-initiated re-authentication request to a voice over Internet protocol call processor to cause the user device to perform a re-authentication procedure with the voice over Internet protocol call processor; in response to determining the session initiation protocol re-authentication procedure was unsuccessful, initiating subsequent transmission of (i) a teardown request to the voice over Internet protocol call processor to cause the voice over Internet protocol call processor to teardown a current session initiation protocol session with the user device, and (ii) a session initiation protocol network-initiated de-registration request to the voice over Internet protocol call processor to cause a session initiation protocol de-registration procedure to be performed to de-register the user device from the voice over Internet protocol call processor; and causing the notification to be issued in response to the activity alert if both the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are unsuccessful, but not if at least one of the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to respond to a first activity alert corresponding to monitored usage of a communication network by a user device, the method comprising:
-
sending a session initiation protocol network-initiated re-authentication request to a voice over Internet protocol call processor to cause the user device to perform a session initiation protocol re-authentication procedure with the voice over Internet protocol call processor when the first activity alert corresponds to a first policy condition; subsequently sending (i) a teardown request to the voice over Internet protocol call processor to cause the voice over Internet protocol call processor to teardown a current session initiation protocol session with the user device, and (ii) a session initiation protocol network-initiated de-registration request to the voice over Internet protocol call processor to cause a session initiation protocol de-registration procedure to be performed to de-register the user device from the voice over Internet protocol call processor, in response to determining the session initiation protocol re-authentication procedure was unsuccessful; determining whether the first activity alert corresponds to improper activity based on a result of at least one of the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure; and sending a multimedia notification to a media device separate from the user device and associated with a user of the user device if both the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are unsuccessful, but not sending the multimedia notification to the media device if at least one of the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are successful. - View Dependent Claims (10, 11, 12)
-
-
13. A tangible machine readable storage device comprising machine readable instructions which, when executed, cause a machine to perform operations comprising:
-
sending a session initiation protocol network-initiated re-authentication request to a voice over Internet protocol call processor to cause a user device in a communication network to perform a session initiation protocol re-authentication procedure with the voice over Internet protocol call processor in response to a first activity alert corresponding to a first policy condition; subsequently sending (i) a teardown request to the voice over Internet protocol call processor to cause the voice over Internet protocol call processor to teardown a current session initiation protocol session with the user device, and (ii) a session initiation protocol network-initiated de-registration request to the voice over Internet protocol call processor to cause a session initiation protocol de-registration procedure to be performed to de-register the user device from the voice over Internet protocol call processor, in response to determining the session initiation protocol re-authentication procedure was unsuccessful; determining whether the first activity alert corresponds to improper activity based on a result of at least one of the session initiation protocol re-authentication procedure or the session initiation protocol de-registration procedure; and sending a multimedia notification to a media device separate from the user device and associated with a user of the user device if both the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are unsuccessful, but refraining from sending the multimedia notification to the media device if at least one of the session initiation protocol re-authentication procedure and the session initiation protocol de-registration procedure are successful. - View Dependent Claims (14, 15, 16)
-
Specification