US 11,659,396 B2
Intelligent cybersecurity protection system, such as for use in 5G networks
Venson Shaw, Kirkland, WA (US); and Sunil Lingayat, Issaquah, WA (US)
Assigned to T-Mobile USA, Inc., Bellevue, WA (US)
Filed by T-Mobile USA, Inc., Bellevue, WA (US)
Filed on Nov. 18, 2022, as Appl. No. 17/990,014.
Application 17/990,014 is a continuation of application No. 17/354,086, filed on Jun. 22, 2021, granted, now 11,558,747.
Application 17/354,086 is a continuation of application No. 16/874,659, filed on May 14, 2020, granted, now 11,057,774, issued on Jul. 6, 2021.
Prior Publication US 2023/0091852 A1, Mar. 23, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 88/08 (2009.01); H04W 12/122 (2021.01); H04W 84/04 (2009.01); H04W 92/04 (2009.01); H04W 92/20 (2009.01)
CPC H04W 12/122 (2021.01) [H04W 84/042 (2013.01); H04W 88/08 (2013.01); H04W 92/045 (2013.01); H04W 92/20 (2013.01)] 20 Claims
OG exemplary drawing
1. At least one non-transitory, computer-readable medium, storing instructions, which when executed by at least one data processor, performs a method, the method comprising:
monitoring a connected device that has been authorized by a fifth-generation (5G) network;
determining, by a computing device associated with the 5G network, that the connected device is at risk of a cyber-attack based on at least one of: information regarding a manufacturer of the connected device, or information regarding a service provider of the connected device;
in response to determining that the connected device is at risk of the cyber-attack, detecting a communication pattern associated with the connected device based at least in part on past interactions between the connected device and the 5G network;
detecting a deviation from the communication pattern based on the monitoring of the connected device; and
in response to detecting the deviation, deauthorizing the connected device.