Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection of abnormal behavior of traffic transmitted from a mobile terminal in a radiocommunication network

A wireless communication network and mobile terminal technology, which is applied in the field of detecting abnormalities in the services transmitted by mobile terminals in the wireless communication network, can solve problems such as useless resource consumption, mobile terminal malfunction, etc., and achieve the effect of minimizing harmful effects

Inactive Publication Date: 2009-12-16
ALCATEL LUCENT SAS
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Other types of viruses can cause malfunction of the mobile terminal and useless resource consumption of the mobile terminal or of the wireless communication network to which the mobile terminal is connected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection of abnormal behavior of traffic transmitted from a mobile terminal in a radiocommunication network
  • Detection of abnormal behavior of traffic transmitted from a mobile terminal in a radiocommunication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] refer to figure 1 , the communication system according to the invention comprises in particular a wireless communication network RR, an alerting device DA, an operator server SO and at least one mobile terminal TM connected to or included in the wireless communication network RR.

[0026] For example, the wireless communication network RR is a digital cellular wireless communication network of the GSM (Global System for Mobile Communications) or UMTS (Universal Mobile Telecommunications System) or even CDMA (Code Division Multiple Access) type. A GSM type network can be coupled with a GPRS network to transfer data in packets using access management and mobility over the air. For example, the wireless communication network RR can authorize the mobile terminal to send and receive data via the RR network when the user of the mobile terminal is identified in the network eg by means of a subscriber identity module associated with the mobile terminal.

[0027] figure 1 Comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To detect an anomaly of traffic emitted from at least one mobile terminal (TM) in a radiocommunication network, a device able to communicate with a location register (HLR) of the radiocommunication network (RR), comprises an evaluation module (ME) for incrementing, over a predetermined time interval, an authentication count (CA) assigned to the mobile terminal, when security data (DS) are transmitted to an entity of the network so as to authenticate the mobile terminal, so as to detect an anomaly of traffic emitted by the mobile terminal if the authentication count exceeds a predetermined threshold on the expiry of the predetermined time interval, and so as to transmit a message relating to this traffic anomaly to a network entity responsible for taking all useful measures for removing said anomaly.

Description

technical field [0001] The present invention relates to detecting malfunctions in a mobile terminal within a wireless communication network, for example due to the presence of a virus in the mobile terminal that produces anomalies in the traffic sent by the mobile terminal. Background technique [0002] Currently, mobile terminals are becoming more complex, and they execute operating systems that can be infected by viruses or be targeted by malicious attackers. [0003] Certain types of viruses generate the transmission of shorter SMS (Short Message Service) messages from an infected mobile terminal to another terminal with a given call number, which increases the usage bill of the infected mobile terminal in an uncontrolled manner . Other types of viruses can cause malfunction of the mobile terminal and wasteful consumption of resources by the mobile terminal or the wireless communication network to which the mobile terminal is connected. [0004] Therefore, it is necessa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/04
CPCH04L63/0838H04L63/145H04W12/06H04L63/1425H04W4/14H04W12/082H04W12/128H04W24/08
Inventor J-M·杜博瓦R·雷诺
Owner ALCATEL LUCENT SAS