Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Controlling a mobile device in a telecommunications network

A technology for telecommunications networks and telecommunications equipment, applied in electrical components, wireless communications, electrical digital data processing, etc., can solve problems such as heavy, uncertain mobile phones that can be trusted, and equipment that cannot be trusted, and achieve the effect of reducing time

Inactive Publication Date: 2015-08-26
KONINK KPN NV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The disadvantage of the described method is that the subsequent control of the phone is directed from within the mobile device itself after a malicious act has been detected
But if a mobile device is already infected with malware, there may not be real certainty that detection methods or subsequent control of device behavior can be trusted
In operation of the method, the infected mobile phone polices itself, but the telecommunications network to which the phone is attached cannot be sure that the mobile phone can be trusted
[0007] Other solutions include forcing detachment of the device, but this may simply cause the device to try to attach again, resulting in more signaling within the network and maintaining the attachment between the infected device and the network
Alternatively, the network may release any bearers the device may have, but this may cause the device to enter emergency mode, in which case it maintains a connection to the network
The network can direct or force the device into emergency mode, but this will depend on the device itself, which may not be trusted due to infection
Alternatively, the network can change the device's subscription, but this is onerous
[0008] The problem is to protect the network from attacks from mobile telecommunication devices infected with malware or malicious applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling a mobile device in a telecommunications network
  • Controlling a mobile device in a telecommunications network
  • Controlling a mobile device in a telecommunications network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] figure 1 A telecommunications network is shown in which malicious behavior can be detected. As is known to those skilled in the art, there are a number of technologies described by the various telecommunication standards that define telecommunication systems. Typically they include the following layout, although those skilled in the art know and appreciate that there may be small variations and differences in the way the system works.

[0062] The telecommunications network comprises a transmitter 101 . This is commonly referred to as a base station, cell tower or in LTE networks as an eNodeB. The transmitter is controlled by a base station controller 102, although in eg a UMTS network this would be a radio network controller 102 and eg in an LTE network the control functions of the base station controller 102 may be contained in the eNodeB. Radio signals from handheld mobile devices are received at the transmitter 601, processed into signals and transmitted to the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system is described to control a mobile telecommunication device within a telecommunications network,when the mobile device is suspected of being, or has been found to be, infected by malicious software or viruses causing it to behave maliciously or aggressively within the network. The telecommunications network is arranged to identify the telecommunication device and limit the communication between the mobile telecommunication device and the telecommunications network. This may mean limiting the bandwidth of the bearer between the mobile telecommunications device and the telecommunications network or may mean limiting the communications between the mobile telecommunications device and a specificlocation.In further embodiments the telecommunications network quarantines the identified device by either transferring an attachment of the mobile telecommunications device to a second network, or, maintaining a list of devices and adding the identified mobile telecommunications device to the list.

Description

Background technique [0001] The invention relates to a system arranged to control mobile telecommunication devices within a telecommunication network. [0002] The telecommunications network provides radio telecommunications to users of mobile devices, typically according to agreed and standardized radio protocols as will be known to those skilled in the art, such as GSM, UTMS and LTE. [0003] Mobile telecommunication devices are common and include mobile phones and especially smart phones, tablet devices and other handheld computing devices, handheld personal assistants and even communication devices housed in vehicles. All can provide users with telecommunications with each other and access to the Internet while moving around. [0004] Access to the Internet exposes the device to malware and malicious applications that may be accidentally or otherwise downloaded from the Internet onto the mobile device. Typically, and often due to their smaller size and memory capacity, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04L29/06H04W88/16
CPCH04L63/1441G06F2221/2149H04W36/08H04W12/12H04L63/1416H04L2463/142H04L2463/144H04W88/16H04W12/128H04L63/10H04W12/00
Inventor F.弗兰森S.德基伊维特
Owner KONINK KPN NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products