18279850. TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Revision as of 07:00, 8 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

[[:Category:Christian Sk�rby of Stockholm (SE)|Christian Sk�rby of Stockholm (SE)]][[Category:Christian Sk�rby of Stockholm (SE)]]

Jonathan Olsson of Sollentuna (SE)

Prajwol Kumar Nakarmi of Sollentuna (SE)

[[:Category:Walter M�ller of Upplands Väsby (SE)|Walter M�ller of Upplands Väsby (SE)]][[Category:Walter M�ller of Upplands Väsby (SE)]]

Loay Abdelrazek of Danderyd (SE)

TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 18279850 titled 'TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK

Simplified Explanation

The patent application abstract describes a method for handling radio communication of a malicious User Equipment (UE) in a wireless communication network. The method involves identifying the malicious UE, taking actions to deter or delay serving the malicious UE, and controlling resource allocation to allow the malicious UE to maintain communication with the network.

  • Identifying malicious User Equipment (UE) in a wireless communication network
  • Taking actions to deter or delay serving the malicious UE without terminating the radio communication
  • Controlling resource allocation to allow the malicious UE to retain communication with the network

Potential Applications

This technology could be applied in wireless communication networks to enhance security measures against malicious users.

Problems Solved

This technology helps in identifying and handling malicious User Equipment (UE) in a wireless communication network without completely terminating their communication.

Benefits

The method allows for the detection and management of malicious users in a wireless communication network without disrupting overall network operations.

Potential Commercial Applications

This technology could be valuable for wireless communication network operators, cybersecurity companies, and other organizations looking to enhance security in their networks.

Possible Prior Art

One possible prior art could be methods for detecting and handling malicious users in wireless communication networks, but the specific approach outlined in this patent application may offer unique features or improvements.

What are the potential impacts of this technology on network security?

This technology could significantly enhance network security by effectively identifying and managing malicious users without disrupting overall network operations.

How does this method compare to existing techniques for handling malicious users in wireless communication networks?

This method appears to offer a more targeted and controlled approach to handling malicious users, allowing for resource allocation control and communication management without immediate termination.


Original Abstract Submitted

A method is disclosed for handling a radio communication of a malicious user equipment, UE, in a wireless communication network. The method is performed by at least one network node in the wireless communication network. The method includes obtaining information identifying the malicious UE attached to the wireless communication network. The method includes performing at least one action to deter or delay serving the malicious UE without terminating the radio communication of the malicious UE with the wireless communication network. Further, the method includes controlling allocation of resources to the malicious UE to allow the malicious UE to retain the radio communication with the wireless communication network. Corresponding network node, and computer program products are also disclosed.