International business machines corporation (20240098486). AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK simplified abstract

From WikiPatents
Jump to navigation Jump to search

AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK

Organization Name

international business machines corporation

Inventor(s)

Mathews Thomas of Flower Mound TX (US)

Sagar Tayal of Ambala City (IN)

Utpal Mangla of Toronto (CA)

Dinesh C. Verma of New Castle NY (US)

SAURABH Agrawal of Bangalore (IN)

AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240098486 titled 'AUTONOMOUS IDENTIFICATION OF ROUGE DEVICES IN A COMMUNICATIONS NETWORK

Simplified Explanation

The patent application describes computer-implemented methods for autonomously identifying rogue devices in a communications network. Here is a simplified explanation of the abstract:

  • Collect connection trace data for multiple mobile devices in the network.
  • Aggregate the connection trace data.
  • Determine performance characteristics for groups of mobile devices based on type approval codes.
  • Compare performance characteristics of different groups.
  • Designate type approval codes associated with deviant groups as rogue type approval codes.

---

      1. Potential Applications of this Technology

This technology could be applied in network security systems to detect unauthorized or malicious devices that may pose a threat to the network.

      1. Problems Solved by this Technology

This technology helps in identifying rogue devices that may be operating in a network without proper authorization, thus enhancing network security and integrity.

      1. Benefits of this Technology

- Improved network security - Efficient identification of rogue devices - Enhanced network performance and reliability

      1. Potential Commercial Applications of this Technology

The technology could be utilized by telecommunications companies, IT security firms, and network administrators to enhance the security and performance of their communication networks.

      1. Possible Prior Art

One possible prior art could be network monitoring systems that track device connections and performance characteristics to identify anomalies or unauthorized devices in the network.

---

      1. Unanswered Questions
        1. How does this technology handle false positives in identifying rogue devices?

The patent application does not specifically address how false positives are mitigated in the process of identifying rogue devices. It would be important to understand the accuracy and reliability of the system in distinguishing between legitimate and rogue devices.

        1. What measures are in place to ensure the privacy and data protection of the mobile devices being monitored?

The patent application does not mention any specific protocols or mechanisms for safeguarding the privacy and data security of the mobile devices whose connection trace data is being collected. It would be crucial to address these concerns to ensure compliance with data protection regulations and user privacy rights.


Original Abstract Submitted

computer-implemented methods for autonomous identification of rouge devices in a communications network are provided. aspects include collecting connection trace data including connection characteristics for each of a plurality of mobile devices in communication with a communications network and aggregating the connection trace data. aspects also include determining performance characteristics for each of a plurality of groups of the plurality of mobile devices, wherein each of the plurality of groups corresponds to mobile devices having a type approval code and comparing the performance characteristics for each of the plurality of groups. based on a determination that the performance characteristics of one of the plurality of groups deviate from the performance characteristics of a remaining set of the plurality of groups by more than a first threshold amount, aspects include designating the type approval code associated with the one of the plurality of groups as a rogue type approval code.