18446889. SECURITY MANAGEMENT WITH COMPROMISED-EQUIPMENT DETECTION IN A COMMUNICATION SYSTEM simplified abstract (Nokia Technologies Oy)

From WikiPatents
Jump to navigation Jump to search

SECURITY MANAGEMENT WITH COMPROMISED-EQUIPMENT DETECTION IN A COMMUNICATION SYSTEM

Organization Name

Nokia Technologies Oy

Inventor(s)

Suresh P. Nair of Estero FL (US)

Rakshesh Pravinchandra Bhatt of Bangalore (IN)

Ranganathan Mavureddi Dhanasekaran of Munich (DE)

SECURITY MANAGEMENT WITH COMPROMISED-EQUIPMENT DETECTION IN A COMMUNICATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18446889 titled 'SECURITY MANAGEMENT WITH COMPROMISED-EQUIPMENT DETECTION IN A COMMUNICATION SYSTEM

Simplified Explanation

The abstract describes techniques for security management with compromised-equipment detection in a communication system.

  • Intentional introduction of errors in communication protocol layers
  • Verification of received error indicators against expected error indicators
  • Detection of compromised user equipment, access points, or network entities
  • Correlation of verifications with security event logs

Potential Applications

  • Network security management
  • Intrusion detection systems
  • Cybersecurity solutions

Problems Solved

  • Detection of compromised equipment in a communication system
  • Prevention of security breaches
  • Identification of potential threats in the network

Benefits

  • Enhanced security measures
  • Early detection of compromised equipment
  • Improved network protection and integrity


Original Abstract Submitted

Techniques for security management with compromised-equipment detection in a communication system are disclosed. For example, a method comprises causing intentional introduction of one or more errors in at least one communication protocol layer of a communication network, wherein the communication network has a plurality of user equipment connected thereto via at least one access point. The method further comprises causing verification of one or more received error indicators against one or more expected error indicators to decide whether any of: (i) the plurality of user equipment; (ii) the at least one access point; or (iii) one or more network entities, may be compromised. In other examples, verifications may be correlated with other logs including, for example, security event logs.