17933891. AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK

Organization Name

International Business Machines Corporation

Inventor(s)

Mathews Thomas of Flower Mound TX (US)

Sagar Tayal of Ambala City (IN)

Utpal Mangla of Toronto (CA)

Dinesh C. Verma of New Castle NY (US)

SAURABH Agrawal of Bangalore (IN)

AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933891 titled 'AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK

Simplified Explanation

The abstract describes computer-implemented methods for autonomously identifying rogue devices in a communications network by analyzing connection trace data and performance characteristics of mobile devices.

  • Collect connection trace data for mobile devices in the network
  • Aggregate the connection trace data
  • Determine performance characteristics for groups of mobile devices based on type approval code
  • Compare performance characteristics of different groups
  • Designate type approval code as rogue if performance characteristics deviate by more than a threshold amount

Potential Applications

This technology could be applied in telecommunications networks, IoT devices, and cybersecurity systems to detect unauthorized or malicious devices.

Problems Solved

This technology helps in identifying rogue devices that may pose security risks or disrupt network operations.

Benefits

- Improved network security - Enhanced network performance - Efficient detection of unauthorized devices

Potential Commercial Applications

- Telecommunications companies - Cybersecurity firms - IoT device manufacturers

Possible Prior Art

One possible prior art could be network monitoring systems that analyze device behavior to detect anomalies and potential security threats.

Unanswered Questions

How does this technology handle false positives in identifying rogue devices?

This article does not address the issue of false positives in the identification of rogue devices. It would be important to understand how the system minimizes false alarms to prevent legitimate devices from being flagged incorrectly.

What measures are in place to ensure the privacy of user data during the analysis of connection trace data?

The article does not mention any specific privacy measures or data protection protocols. It would be crucial to know how user data is handled and secured to comply with privacy regulations and protect user information.


Original Abstract Submitted

Computer-implemented methods for autonomous identification of rouge devices in a communications network are provided. Aspects include collecting connection trace data including connection characteristics for each of a plurality of mobile devices in communication with a communications network and aggregating the connection trace data. Aspects also include determining performance characteristics for each of a plurality of groups of the plurality of mobile devices, wherein each of the plurality of groups corresponds to mobile devices having a type approval code and comparing the performance characteristics for each of the plurality of groups. Based on a determination that the performance characteristics of one of the plurality of groups deviate from the performance characteristics of a remaining set of the plurality of groups by more than a first threshold amount, aspects include designating the type approval code associated with the one of the plurality of groups as a rogue type approval code.