白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for dynamic security micronetwork protection of network connected devices

專(zhuān)利號(hào)
US11997126B1
公開(kāi)日期
2024-05-28
申請(qǐng)人
CABLE TELEVISION LABORATORIES, INC.(US CO Louisville)
發(fā)明人
Michael Glenn
IPC分類(lèi)
G06F21/60; H04L9/40
技術(shù)領(lǐng)域
dsdn,subnetwork,router,device,guest,network,or,step,in,infected
地域: CO CO Louisville

摘要

Dynamic Software Defined Networking (DSDN) systems and methods provide secure and isolated subnetworks within a larger network. Each subnetwork may be formed with varied policies and communication restrictions based on at least device type, device grouping, and risk level. The DSDN systems and methods may also be applied to form a network, with or without subnetworks, of devices that are spatially separated, thereby reducing the attack surface of the DSDN-formed network.

說(shuō)明書(shū)

RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 16/591,459, which was filed on Oct. 2, 2019. U.S. application Ser. No. 16/591,459 is a continuation of U.S. application Ser. No. 15/443,855, filed Feb. 27, 2017, now U.S. Pat. No. 10,440,043, which prior application claims the benefit of and priority to U.S. Provisional Patent Application Ser. No. 62/300,641, filed Feb. 26, 2016, the disclosures of all of which are incorporated herein by reference in their entireties.

BACKGROUND

Network operators have been dealing with infected subscriber's devices for more than 15 years. Many operators have botnet notification and remediation systems in place to identify and mitigate infected devices on their network. A description of such systems is described in RFC 6561 on Recommendations for the Remediation of Bots in ISP Networks. Such systems have been in production since 2005. One patent for identifying infected devices is described in U.S. Pat. No. 9,027,138.

SUMMARY OF THE INVENTION

Dynamic Software Defined Networking (DSDN) can be used to provide network level security protections for different types of devices, such as a network of Internet of Things (IoT) devices or other systems of wired and or wirelessly interconnected devices.

Devices that no longer have security patches or are infected with malware can be either quarantined, or their network traffic can be limited to only approved network destination points.

權(quán)利要求

1
What is claimed is:1. A wireless communication system, comprising:a software defined network (SDN) including a first subnetwork, and a second subnetwork different from the first subnetwork; anda router having SDN functionality, and configured to (i) operably communicate with a first device and a second device, (ii) determine a first risk level for the first device and a second risk level for the second device, (iii) provision the first device to access the SDN through the first subnetwork based on the first risk level, and (iv) provision the second device to access the SDN through the second subnetwork based on the second risk level,wherein the first risk level is different from the second risk level.2. The system of claim 1, further comprising at least one switch.3. The system of claim 2, wherein the at least one switch is one or more of a hardware component and a software component within the router.4. The system of claim 1, wherein the SDN comprises a wireless communication network configured to operably communicate with at least one of the first and second devices over a wireless communication channel, and wherein the first subnetwork enables a higher level of device access to the SDN than the second subnetwork.5. The system of claim 4, wherein the router is further configured to operably communicate with a third device different from the first second devices, determine a third risk level for the third device different from the first and second risk levels, and prevent the third device from accessing the SDN based on the third risk level.6. The system of claim 5, wherein the second subnetwork enables a higher level access to the SDN for the second device than for the third device.7. The system of claim 5, wherein the router is further configured to determine the first, second, and third risk levels through a system application layer configured to connect with the respective device.8. The system of claim 7, wherein the router is further configured to provision the first and second devices through a system control layer configured to dynamically provision the respective device.9. The system of claim 1, further comprising a third subnetwork including a portion of the SDN and a remote network separate from the SDN.10. The system of claim 9, wherein the third subnetwork comprises at least one of the first subnetwork and the second subnetwork.11. The system of claim 1, wherein the SDN further comprises a virtual private networking (VPN) tunnel to an approved network location.12. The system of claim 11, wherein the approved network location includes one or more of an SDN cloud, a medical cloud, a medical office, a hospital, a device manufacturer, and a service provider.13. The system of claim 11, wherein the VPN tunnel forms an isolated subnetwork within the SDN.14. The system of claim 13, wherein the isolated subnetwork comprises a portion of a separate remote network.15. The system of claim 1, wherein the first device is at least one of a medical device, an electronic lock, an appliance, a smart phone, a computer, a tablet, audio/visual equipment, a camera, a weather station, a motion detector, a signaling device, a smart hub, an extender, and an Internet of Things device.16. The system of claim 1, wherein the router is further configured to provide dynamic provisioning.17. The system of claim 16, wherein the dynamic provisioning of the first and second devices is based at least in part on a device type of the respective device.18. The system of claim 17, wherein the router is further configured to dynamically monitor the first and second devices to reevaluate the respective first and second risk levels.19. The system of claim 18, wherein at least one of the first and second risk levels is based on one or more an infection by malicious software, an availability of a security patch, a predetermined access level, and a predetermined limit of data flow for the respective device.20. The system of claim 1, wherein the SDN router is further configured provision the first device to access the SDN through the second subnetwork based on the first risk level, and prevent the second device from accessing the SDN through the first subnetwork based on the second risk level.21. The system of claim 19, wherein the SDN is further configured to (i) determine that the second risk level is based on the infection by malicious software, and (ii) provision the second subnetwork as an isolation subnetwork within the SDN.
微信群二維碼
意見(jiàn)反饋