×

Mobile user identity and/or SIM-based IoT identity and application identity based security enforcement in service provider networks

  • US 10,708,306 B2
  • Filed: 06/15/2017
  • Issued: 07/07/2020
  • Est. Priority Date: 06/15/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor; and

    a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to;

    monitor, in real-time, network traffic on a service provider network at a security platform to identify a subscriber identity for a new session, comprising to;

    identify, within the network traffic, a create session request message or a create PDP context request message to create the new session;

    identify, within the network traffic, a Radio Access Technology (RAT) type;

    extract the subscriber identity from the create session request message or the create PDP context request message, the subscriber identity including International Mobile Subscriber Identity (IMSI); and

    extract location from the create session request message or the create PDP context request message, the location including three or more of the following;

    CGI (Cell Global Identifier), SAI (Service Area Identifier), RAI (Routing Area Identifier), TAI (Tracking Area Identifier), ECGI (E-UTRAN Cell Global Identifier), and LAC (Location Area Identifier);

    determine an application identifier for user traffic associated with the new session at the security platform, comprising to;

    monitor, via deep packet inspection, tunneled user traffic after the new session has been created to obtain the application identifier, wherein the application identifier relates to web browsing using Hypertext Transfer Protocol (HTTP), a Domain Name System (DNS) request, a file transfer using File Transfer Protocol (FTP), Telnet, Dynamic Host Configuration Protocol (DHCP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Trivial File Transfer Protocol (TFTP), or any combination thereof, and wherein the tunneled user traffic includes GPRS Tunneling Protocol User Plane (GTP-U) traffic;

    determine a security policy to apply at the security platform to the new session based on the subscriber identity, the RAT type, the location, and the application identifier, wherein the security policy includes allowing or passing the new session, blocking or dropping the new session, or restricting access of the new session; and

    perform threat detection and threat prevention based on the subscriber identity, the RAT type, and the application identifier.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×