Telefonaktiebolaget lm ericsson (publ) (20240137770). TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK simplified abstract

From WikiPatents
Revision as of 04:51, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK

Organization Name

telefonaktiebolaget lm ericsson (publ)

Inventor(s)

[[:Category:Christian Sk�rby of Stockholm (SE)|Christian Sk�rby of Stockholm (SE)]][[Category:Christian Sk�rby of Stockholm (SE)]]

Jonathan Olsson of Sollentuna (SE)

Prajwol Kumar Nakarmi of Sollentuna (SE)

[[:Category:Walter M�ller of Upplands Väsby (SE)|Walter M�ller of Upplands Väsby (SE)]][[Category:Walter M�ller of Upplands Väsby (SE)]]

Loay Abdelrazek of Danderyd (SE)

TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137770 titled 'TREATMENT OF MALICIOUS USER EQUIPMENT IN A WIRELESS COMMUNICATION NETWORK

Simplified Explanation

The patent application describes a method for handling radio communication of a malicious user equipment (UE) in a wireless communication network. The method involves identifying the malicious UE, taking actions to deter or delay serving the malicious UE without terminating the communication, and controlling resource allocation to allow the malicious UE to maintain communication with the network.

  • Identifying malicious user equipment (UE) in a wireless communication network
  • Taking actions to deter or delay serving the malicious UE without terminating the communication
  • Controlling resource allocation to allow the malicious UE to retain communication with the network

Potential Applications

The technology could be applied in wireless communication networks to enhance security measures against malicious users.

Problems Solved

This technology helps in identifying and handling malicious user equipment in a wireless communication network without completely terminating their communication.

Benefits

The method provides a way to manage malicious users in a wireless network without disrupting overall network operations.

Potential Commercial Applications

The technology could be utilized by wireless network operators to enhance security and protect against malicious activities.

Possible Prior Art

Prior art related to handling malicious users in wireless communication networks may include methods for detecting and blocking unauthorized users.

Unanswered Questions

How does the method impact network performance and efficiency?

The article does not provide details on how the method may affect the overall performance and efficiency of the wireless communication network.

What are the potential legal implications of implementing this method?

The article does not address the potential legal considerations or implications that may arise from implementing this method in a wireless communication network.


Original Abstract Submitted

a method is disclosed for handling a radio communication of a malicious user equipment, ue, in a wireless communication network. the method is performed by at least one network node in the wireless communication network. the method includes obtaining information identifying the malicious ue attached to the wireless communication network. the method includes performing at least one action to deter or delay serving the malicious ue without terminating the radio communication of the malicious ue with the wireless communication network. further, the method includes controlling allocation of resources to the malicious ue to allow the malicious ue to retain the radio communication with the wireless communication network. corresponding network node, and computer program products are also disclosed.