20240015171. ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK simplified abstract (T-Mobile USA, Inc.)

From WikiPatents
Jump to navigation Jump to search

ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK

Organization Name

T-Mobile USA, Inc.

Inventor(s)

Venson Shaw of Kirkland WA (US)

Sunil Lingayat of Issaquah WA (US)

Gaviphat Lekutai of Kirkland WA (US)

ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240015171 titled 'ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK

Simplified Explanation

The disclosed embodiments include a software-defined security (SDS) service that can monitor the runtime behavior of a network of nodes in a wireless network and detect anomalous activity indicating contamination of the network. This contamination refers to unauthorized instructions designed to damage or interrupt the network's function.

  • The SDS service dynamically coordinates a blacklist and a whitelist. The blacklist contains indications of contaminated assets, while the whitelist contains indications of non-contaminated assets.
  • Contaminated assets are isolated in a cleanroom environment, where security resources sanitize them.
  • Indications of decontaminated assets are moved from the blacklist to the whitelist.
  • The use of security resources is dynamically adjusted based on the load ratio between the whitelist and the blacklist.

Potential applications of this technology:

  • Enhancing the security of wireless networks by detecting and isolating contaminated assets.
  • Protecting critical infrastructure systems, such as power grids or transportation networks, from unauthorized instructions that could disrupt their operations.
  • Safeguarding sensitive data and preventing unauthorized access in wireless networks.

Problems solved by this technology:

  • Detecting and mitigating the presence of unauthorized instructions or malware in a network of nodes.
  • Preventing damage or interruption to the function of a wireless network caused by contaminated assets.
  • Improving the overall security posture of wireless networks by dynamically adjusting security resources based on the presence of contaminated assets.

Benefits of this technology:

  • Enhanced security and protection against unauthorized instructions or malware in wireless networks.
  • Efficient detection and isolation of contaminated assets, minimizing the impact on network performance.
  • Dynamic adjustment of security resources based on the load ratio between non-contaminated and contaminated assets, optimizing resource allocation.


Original Abstract Submitted

the disclosed embodiments include a software-defined security (sds) service that can monitor runtime behavior of a network of nodes of a wireless network and detect anomalous activity indicating contamination of the network of nodes, where the contamination includes unauthorized instructions designed to damage or interrupt a function of the network of nodes. the sds service can dynamically coordinate a blacklist and a whitelist, where the blacklist includes an indication of contaminated assets and the whitelist includes an indication of non-contaminated assets. the contaminated assets are isolated with a cleanroom environment, where the security resources sanitize the contaminated assets. then, indications of the decontaminated assets are moved from the blacklist to the whitelist, and the use of the security resources are dynamically adjusted according to a load ratio between the whitelist and the blacklist.