Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile access terminal security function

A security strategy and security module technology, applied in security devices, electrical components, transmission systems, etc.

Inactive Publication Date: 2010-01-20
MOTOROLA INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, there is no functionality to separate the mobile traffic in such a way that it prevents the emission of malicious traffic over the radio access network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile access terminal security function
  • Mobile access terminal security function
  • Mobile access terminal security function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which can be embodied in various forms. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a means of teaching one skilled in the art to vary substantially any suitable detailed structure. Use the representative basis of the invention. Furthermore, the terms and phrases used herein are not intended to be limiting; rather, they are intended to provide an understandable description of the invention.

[0025] As used herein, the term "a" is defined as one or more than one. The term "plurality" as used herein is defined as two or more than two. The term "another" as used herein is defined as at least a second or more. As used herein, the terms "comprising" and / or "having" are defined as com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a method, wireless communication device, and wireless communications system for managing packet data transmissions. The method includes receiving a set of security policies (126) from a service provider. A request from an application (124) is received to originate packet data. The set of security policies (126) provided by the service provider is analyzed in response to receiving the request to originate packet data. The method also includes determining, in response to the analyzing, if the set of security policies (126) allows the packet data to be transmitted. In response to the set of security policies (126) allowing the packet data to be transmitted, the packet data is allowed to be transmitted onto a wireless network (102). In response to the set of security policies (126) not allowing the packet data to be transmitted, the packet data from is prevented from being transmitted onto a wireless network (102).

Description

technical field [0001] The present invention relates generally to the field of wireless communications, and more particularly to monitoring and managing outgoing packets of wireless devices for the purpose of deterring malicious activity. Background technique [0002] As mobile phone networks evolve to utilize IP technology, they will become increasingly vulnerable to denial of service attacks. An element within the system, the mobile station, may be the target of an attack, or may be a proxy for initiating an attack through the use of "trojan horses". There is a current product called an inverse firewall implemented in a personal computer. A reverse firewall controls outgoing or egress IP traffic from suspicious applications. One problem with reverse firewalls is that in order for these applications to be effective, end users are required to maintain them. [0003] Reverse firewalls are also implemented in traditional IP networks consisting mainly of general-purpose comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04W12/08H04L63/20H04L63/0263H04W12/37
Inventor 克里斯托弗·L·维塔罗斯
Owner MOTOROLA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products