Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM AND METHOD FOR SECURING COMMUNICATION AND INFORMATION OF MOBILE DEVICES THROUGH A CONTROLLED CELLULAR COMMUNICATION NETWORK
Document Type and Number:
WIPO Patent Application WO/2022/215070
Kind Code:
A1
Abstract:
The present invention provides a method for securing the data communication of cellular network subscribers using a security service, comprising: - associating subscribers listed to the security service with a group. - wherein the group association for each subscriber is determined a-priory, based on the identity of the subscriber, or dynamically, based on the communication pattern of the subscriber; - Configuring the cellular network connectivity to the public PDN with security GW, the data flow of the subscriber's service is routed through the security GW; - applying plurality security rules comprising group related rules and individual related rules associated with by the security GW; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer is determined by the individual identity of the subscriber and a second layer is based on the group to which the subscriber is associated.

Inventors:
WEINBERG ADAM (IL)
KLEINEWOERDEMANN FRANK (IL)
Application Number:
PCT/IL2022/050355
Publication Date:
October 13, 2022
Filing Date:
April 05, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FIRSTPOINT MOBILE GUARD LTD (IL)
International Classes:
H04L9/40; H04L67/30; H04W88/16
Foreign References:
US20190306200A12019-10-03
US20190387399A12019-12-19
US20190261172A12019-08-22
US20180367569A12018-12-20
Attorney, Agent or Firm:
ZER, Yoram et al. (IL)
Download PDF:
Claims:
CLAIMS

1. A method for securing the data communication of cellular network subscribers using a security service, said method comprising: associating subscribers listed to the security service with a group. Configuring the cellular network connectivity to the public PDN with at least one security GW, such that data flow of the subscribers listed to the security service is routed through the at least one security GW; applying plurality of security rules comprising group related rules and individual related rules associated with by at least one the security GW., wherein the security rules are configured for inspecting the data communication and determining if to block or allow the data communication; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer which is determined by the individual identity of the subscriber and a second layer which is based on the group to which the subscriber is associated. applying the plurality of security rules relevant for user ID profile and associated group by tracing the rules at each firewall nodes.

2. The method of claim 1 wherein the group association for subscriber is determined dynamically, based the communication pattern of the subscriber.

3. The method of claim 1 wherein the group association per subscriber is determined a-priory based on the identity of the subscriber or device type specific or device owner specific, usage type.

4. The method of claim 1 wherein the security rules are implemented on virtualized computing entities (containers) in a swarm deployment of firewalls nodes.

5. The method of claim 4 wherein the mobile subscriber address is assigned by the system upon network connection, wherein a routing path through the container swarm (individual and group level) is established upon address assignment.

6. The method of claim 1 wherein the security profiles are defined for the subscriber and its group are applied to the firewall nodes along the routing path and applied to data traversing in either direction along that path.

7. The method of claim 1 wherein the security rules associated with group and/or individual rules for the data protection engines (subscriber/individual and group level) are generated dynamically based on abstract rules including at least one of destination IP geo-fence , and/or static rules including at least one of list of specific addresses, protocols, time.

8. The method of claim 1 in which the security GW is connected to feeds of threat intelligence providers wherein the data retrieved from the feeds are validated and adapted to the system format, wherein the threat intelligence feed source can be selected on individual and as well as group level.

9. The method of claim 1 wherein the Security rules applied at the group layer are bypassed for specific individual rules;

10. The method of claim 1, in which DNS based protection is applied by supplying DNS services to the devices listed to the protection service ("protected mobile devices").

Wherein the usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that an attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile.

11. The method of claim 9 wherein the system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein the system applies security rules including at least one of pass, alert/notify, block.

12. The method of claim 9 wherein the DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

13. The method of claim 1, in which re-routing detection and protection is applied, by using a SIM applet functionality for verifying the data path between each protected individual device and the data protection system, wherein the functionality is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW.

14. The method of claim 1, in which re-routing detection and protection is applied by detecting absence of communication from the subscriber through the security GW for above a predefined time period.

15. A system for securing the data communication of cellular network subscribers using a security service, said system comprised of:

Controller configured for identifying client profile and associated groups

Managing the address assigned to each of the UCD and determines personal/customized rules; at least one security GW for Configuring the cellular network connectivity to the public PDN with, such that data flow of the subscribers listed to the security service is routed through the at least one security GW; group and personal firewalls for applying plurality of security rules comprising group related rules and individual related rules associated with by at least one the security GW, wherein the security rules are configured for inspecting the data communication and determining if to block or allow the data communication; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer which is determined by the individual identity of the subscriber and a second layer which is based on the group to which the subscriber is associated applying the plurality of security rules relevant for user ID profile and associated group by tracing the rules at each firewall nodes.

16. The system of claim 15 wherein the group association for subscriber is determined dynamically, based the communication pattern of the subscriber.

17. The system of claim 15 wherein the group association per subscriber is determined a-priory based on the identity of the subscriber or device type specific or device owner specific, usage type.

18. The system of claim 15 wherein the security rules are implemented on virtualized computing entities (containers) in a swarm deployment of firewalls nodes.

19. The system of claim 18 wherein the mobile subscriber address is assigned by the system upon network connection, wherein a routing path through the container swarm (individual and group level) is established upon address assignment.

20. The system of claim 15 wherein the security profiles are defined for the subscriber and its group are applied to the firewall nodes along the routing path and applied to data traversing in either direction along that path.

21. The system of claim 15 wherein the security rules associated with group and/or individual rules for the data protection engines (subscriber/individual and group level) are generated dynamically based on abstract rules including at least one of destination IP geo-fence , and/or static rules including at least one of list of specific addresses, protocols, time.

22. The system of claim 15 in which the security GW is connected to feeds of threat intelligence providers wherein the data retrieved from the feeds are validated and adapted to the system format, wherein the threat intelligence feed source can be selected on individual and as well as group level.

23. The system of claim 15, in which DNS based protection is applied by supplying DNS services to the devices listed to the protection service ("protected mobile devices").

Wherein the usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that an attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile.

24. The system of claim 15 wherein the system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein Device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein the system applies security rules including at least one of pass, alert/notify, block).

25. The system of claim 24 wherein the DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

26. The system of claim 15, in which the re-routing detection and protection is applied, by using a SIM applet functionality for verifying the data path between each protected individual device and the data protection system, wherein the functionality is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW.

27. The system of claim 15, in which re-routing detection and protection is applied by detecting absence of communication from the subscriber through the security GW for above a predefined time period.

28. The system of claim 15 Wherein the Security rules applied at the group layer are bypassed for specific individual rules.

Description:
SYSTEM AND METHOD FOR SECURING COMMUNICATION AND INFORMATION OF MOBILE DEVICES THROUGH A CONTROLLED CELLULAR

COMMUNICATION NETWORK

FIELD OF THE INVENTION

[0001] The present invention generally relates to the field of cellular networks. More specifically, it addresses issues of communication and data security and privacy over cellular networks.

BACKGROUND OF THE INVENTION

[0002] The abundance and diversity of threats to security and privacy over cellular networks is a well-established fact. Perpetrators may tap into various sources of data that are either stored on or communicated with any cellular device. For example, they may violate the privacy of cellular network subscribers by gaining access to stored files and private information, remotely operating the cellular device’s camera and microphone, implanting malicious software, and even obtaining knowledge of their physical whereabouts.

[0003] Mobile phones as well as other portable devices that are employed for business use typically possess a wide variety of communication interfaces, each of which is vulnerable to cyber- attacks. Examples for such interfaces are:

• Voice calls;

• Text messages;

• Private emails and company emails;

• Private apps, and company apps;

• Access to company databases, business calendars and customer data; and

• Any type of media

[0004] Attackers may choose to hack data pertaining to a cellular subscriber through a variety of methods. Examples for such methods include:

• International Mobile Subscriber Identity (IMSI) catcher;

• Man-in-the-middle (MitM) attacks;

• Network attacks, e.g. by exploiting Signaling System 7 (SS7) loopholes; and

• Different types of social engineering methods, for the purpose of information gathering, fraud, or gaining system access. [0005] Attackers may choose to interface the target User Cellular Device (UCD) through a variety of access points, e.g. through the cellular network, Wi-Fi, Bluetooth or a USB connection.

[0006] Attackers may choose to target ‘ordinary’ cellular network interfacing devices (e.g. smartphones, tablets and laptop computers) as well as Internet of Things (IoT) devices, such as Machine to Machine (M2M) and connected cars.

[0007] Attackers may choose to target personal information stored on cellular devices (e.g. passwords), in order to ultimately target data that is stored elsewhere (e.g. email or drop-box accounts).

[0008] Prior art includes tools that provide some degree of security by monitoring the activity on the UCD from the end-users' perspective, such as various anti-malware software tools. Such tools are limited in their scope of response to threats:

• They require installation of the security tool on the UCD, and rely on updates from external sources;

• They do not relate to threats posed to the UCD from the cellular network’s perspective; and

• They do not control the interaction of cellular subscribers with the hosting network.

[0009] Some network security solutions (e.g. US2016226913: “Technologies For Scalable Security Architecture Of Virtualized Network” and US20160308837: “Methods And Apparatus To Configure Virtual Private Mobile Networks For Security ”) disclose methods for securing the functionality of modules of the cellular network, but do not directly address UCD data security and the privacy of cellular network subscribers.

[0010] The disclosed invention addresses the issue of cellular security in a comprehensive perspective, addressing threats of multiple categories and sources, from both the UCD’s and the network’s perspective. SUMMARY OF THE INVENTION

The present invention provides A method for securing the data communication of cellular network subscribers using a security service, said method comprising: associating subscribers listed to the security service with a group wherein the group association for each subscriber is determined a-priory, based on the identity of the subscriber, or dynamically, based on the communication pattern of the subscriber;

Configuring the cellular network connectivity to the public PDN with at least one security GW, such that data flow of the subscribers listed to the security service is routed through the at least one security GW; applying plurality security rules comprising group related rules and individual related rules associated with by at least one the security GW., wherein the security rules are configured for inspecting the data communication and determining if to block or allow the data communication; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer which is determined by the individual identity of the subscriber and a second layer which is based on the group to which the subscriber is associated.

Wherein the Security rules applied at the group layer are bypassed for specific individual rules; applying the plurality of security rules relevant for user ID profile and associated group by tracing the rules at each firewall nodes

According to some embodiments of the present invention the group are determined based on at least one of, device type specific, usage type specific, device owner specific; wherein the security rules are implemented on virtualized computing entities (containers) in a swarm deployment of firewalls nodes; wherein the mobile subscriber address is assigned by the system upon network connection, wherein a routing path through the container swarm (individual and group level) is established upon address assignment wherein the security profiles defined for the subscriber and its group are applied to the firewall nodes along the routing path and applied to data traversing in either direction along that path. wherein the security associated with group and/or individual rules for the data protection engines (subscriber/individual and group level) are generated dynamically based on abstract rules including at least one of destination IP geo-fence, and/or static rules including at least one of list of specific addresses, protocols, time.

According to some embodiments of the present invention the security GW is connected to feeds of threat intelligence providers wherein the data retrieved from the feeds are validated and adapted to the system format, wherein the threat intelligence feed source can be selected on individual and as well as group level.

According to some embodiments of the present invention the DNS based protection is applied by supplying DNS services to the protected mobile devices (the devices listed to the protection service).

Wherein the usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that an attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile.

According to some embodiments of the present invention the system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein Device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein the system applies security rules (pass, alert/notify, block) based on this analysis.

According to some embodiments of the present invention wherein the DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

According to some embodiments of the present invention the re-routing detection and protection is applied, by using a SIM applet functionality for verifying the data path between each protected individual device and the data protection system, wherein the functionality is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW.

According to some embodiments of the present invention the re-routing detection and protection is applied by detecting absence of communication from the subscriber through the security GW for above a predefined time period.

The present invention provides a method for securing the data communication of cellular network subscribers using a security service, said method comprising: associating subscribers listed to the security service with a group. Configuring the cellular network connectivity to the public PDN with at least one security GW, such that data flow of the subscribers listed to the security service is routed through the at least one security GW; applying plurality of security rules comprising group related rules and individual related rules associated with by at least one the security GW., wherein the security rules are configured for inspecting the data communication and determining if to block or allow the data communication; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer which is determined by the individual identity of the subscriber and a second layer which is based on the group to which the subscriber is associated. applying the plurality of security rules relevant for user ID profile and associated group by tracing the rules at each firewall nodes.

According to some embodiments of the present invention the group association for subscriber is determined dynamically, based the communication pattern of the subscriber.

According to some embodiments of the present invention the group association per subscriber is determined a-priory based on the identity of the subscriber or device type specific or device owner specific, usage type.

According to some embodiments of the present invention the security rules are implemented on virtualized computing entities (containers) in a swarm deployment of firewalls nodes.

According to some embodiments of the present invention the mobile subscriber address is assigned by the system upon network connection, wherein a routing path through the container swarm (individual and group level) is established upon address assignment.

According to some embodiments of the present invention the security profiles are defined for the subscriber and its group are applied to the firewall nodes along the routing path and applied to data traversing in either direction along that path.

According to some embodiments of the present invention the security rules associated with group and/or individual rules for the data protection engines (subscriber/individual and group level) are generated dynamically based on abstract rules including at least one of destination IP geo-fence , and/or static rules including at least one of list of specific addresses, protocols, time.

According to some embodiments of the present invention the security GW is connected to feeds of threat intelligence providers wherein the data retrieved from the feeds are validated and adapted to the system format, wherein the threat intelligence feed source can be selected on individual and as well as group level.

According to some embodiments of the present invention the Security rules applied at the group layer are bypassed for specific individual rules;

According to some embodiments of the present invention the DNS based protection is applied by supplying DNS services to the devices listed to the protection service ("protected mobile devices").

Wherein the usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that an attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile.

According to some embodiments of the present invention the system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein the system applies security rules including at least one of pass, alert/notify, block.

According to some embodiments of the present invention the DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

According to some embodiments of the present invention the re-routing detection and protection is applied, by using a SIM applet functionality for verifying the data path between each protected individual device and the data protection system, wherein the functionality is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW.

According to some embodiments of the present invention the re-routing detection and protection is applied by detecting absence of communication from the subscriber through the security GW for above a predefined time period.

The present invention provides a system for securing the data communication of cellular network subscribers using a security service, said system comprised of:

Controller configured for identifying client profile and associated groups Managing the address assigned to each of the UCD and determines personal/customized rules; at least one security GW for Configuring the cellular network connectivity to the public PDN with, such that data flow of the subscribers listed to the security service is routed through the at least one security GW; group and personal firewalls for applying plurality of security rules comprising group related rules and individual related rules associated with by at least one the security GW, wherein the security rules are configured for inspecting the data communication and determining if to block or allow the data communication; wherein plurality of the security rules applied in the security GW are implemented in two layers: a first layer which is determined by the individual identity of the subscriber and a second layer which is based on the group to which the subscriber is associated applying the plurality of security rules relevant for user ID profile and associated group by tracing the rules at each firewall nodes.

According to some embodiments of the present invention wherein the group association for subscriber is determined dynamically, based the communication pattern of the subscriber.

According to some embodiments of the present invention the group association per subscriber is determined a-priory based on the identity of the subscriber or device type specific or device owner specific, usage type. According to some embodiments of the present invention the security rules are implemented on virtualized computing entities (containers) in a swarm deployment of firewalls nodes.

According to some embodiments of the present invention the mobile subscriber address is assigned by the system upon network connection, wherein a routing path through the container swarm (individual and group level) is established upon address assignment.

According to some embodiments of the present invention the security profiles are defined for the subscriber and its group are applied to the firewall nodes along the routing path and applied to data traversing in either direction along that path.

According to some embodiments of the present invention the security rules associated with group and/or individual rules for the data protection engines (subscriber/individual and group level) are generated dynamically based on abstract rules including at least one of destination IP geo-fence , and/or static rules including at least one of list of specific addresses, protocols, time.

According to some embodiments of the present invention the security GW is connected to feeds of threat intelligence providers wherein the data retrieved from the feeds are validated and adapted to the system format, wherein the threat intelligence feed source can be selected on individual and as well as group level.

According to some embodiments of the present invention the DNS based protection is applied by supplying DNS services to the devices listed to the protection service ("protected mobile devices").

Wherein the usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that an attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile. According to some embodiments of the present invention the system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein Device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein the system applies security rules including at least one of pass, alert/notify, block).

According to some embodiments of the present invention the DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

According to some embodiments of the present invention in which re-routing detection and protection is applied, by using a SIM applet functionality for verifying the data path between each protected individual device and the data protection system, wherein the functionality is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW.

According to some embodiments of the present invention the re-routing detection and protection is applied by detecting absence of communication from the subscriber through the security GW for above a predefined time period.

According to some embodiments of the present invention the Security rules applied at the group layer are bypassed for specific individual rules.

BREIF DESCRIPTION OF THE DRAWINGS

[0011] Figure 1 illustrate a block diagram, depicting the messaging security platform, according to prior art.

[0012] Figure 2 illustrate a block diagram depicting the messaging security platform, according to some embodiments of the present invention.

[0013] Figure 3 illustrate a block diagram, depicting the messaging security platform, according to some embodiments of the present invention.

[0014] Figure 4 is a block diagram which depicts depicting the messaging security platform, including option of visited network according to some embodiments of the present invention. [0015] Figures 5A &B is a block diagram which configuration of subscriber and group firewalls according to some embodiments of the present invention.

[0016] Figure 6 is a flow diagram of routing secured message according to the configuration of fig 3, according to some embodiments of the present invention. [0017] Figure 7 is a flow diagram of the action performed by the firewall instance, according to some embodiments of the present invention.

[0018] Figure 8 is a flow diagram of firewall path routing, according to some embodiments of the present invention.

[0019] Figure 9 is a flow diagram of the action performed by the DNS, according to some embodiments of the present invention.

[0020] Figure 10 is a flow diagram of re-routing of secured message protection according to the configuration of fig 4, according to some embodiments of the present invention.

[0021] Figure 11 is a flow diagram of routing secured message according to the configuration of fig 3, according to some embodiments of the present invention. [0022] Figure 12 is a flow diagram of firewall path routing and controller actions, according to some embodiments of the present invention.

[0023] Figure 13 is a flow diagram of the action performed by the DNS, according to some embodiments of the present invention

[0024] Figure 14 is a flow diagram of routing secured message action between the UCD and the data protection system according to the configuration of fig 3, according to some embodiments of the present invention.

DETAILED DESCRIPTION OF SOME EMBODIMENTS OF THE INVENTION

[0025] Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of the components set forth in the following description or illustrated in the drawings. The invention is applicable to other embodiments or of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting.

[0026] Following is a table of definitions of the terms used throughout this application.

A system/solution for protecting cellular mobile devices against cyber-attack. The system/solution includes the following:

[0027] The solution is aimed in providing the protection only to designated mobile subscribers which are listed to the protection service (not to all users or devices of the cellular network)

[0028] The cellular network data flow of the listed subscribers is configured so that the connectivity to the (possibly hostile) public PDN (i.e.to the Internet) is routed through a dedicated security GW. One possibility for achieving this is by using a dedicated APN to be installed on the protection service listed devices.

Another possibility (generalization) is that the there are several such dedicated security GWs, each security server is allocated to certain sub-set of the protected subscribers - so that each such sub-set of devices is connected to the PDN through a another security GW. The clustering can be based on issues like: distinction of the applied security features of the sub-set, need of the relevant users to be separated for management and internal security reasons, scalability and processing power need, and more.

[0029] In the security GW (either single or several) several data protection features are applied, as further detailed bellow:

[0030] Destination based protection: a. Each protected mobile device is member of a group (ad hoc, device type specific, usage type specific, device owner specific, etc.). b. The individual protection is applied on two levels: personal and group. c. The data protection features are implemented on virtualized computing entity (container) in swarm deployment. d. The mobile subscriber address is assigned by the system upon network connection. A routing path through the container swarm (individual and group level) is established upon address assignment. e. The security profiles defined for the subscriber and its group are applied to the nodes along the routing path and applied to data traversing in either direction along that path. f. Access security rules for the data protection engines (subscriber and group level) are generated dynamically based on abstract rules e.g. destination IP geo-fence as well as static rules e.g. list of specific addresses, protocols, time etc. g. The system may be connected to feeds of thread intelligence providers (public, commercial or private). The data retrieved from the feeds are validated and adopted to the system format. The threat intelligence feed source can be selected on individual and as well as group level. h. The system provides means to bypass group level security rules for specific traffic on individual level e.g. allow specific application traffic despite prohibitive group rules.

[0031] DNS based protection a. The system supplies DNS services to the protected mobile devices (the devices listed to the protection service). b. The usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber. An attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile. c. The system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system. Device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not. The system applies security rules (pass, alert/notify, block) based on this analysis. d. DNS queries are escalated to verified service providers by secure (encrypted) protocol and the DNS query response is sanitized by the system.

[0032] Re-routing protection a. Option A: a SIM applet functionality is used to verify the data path between each protected individual device and the data protection system. This is achieved by establishing an independent network IP connectivity from the SIM applet to the security system (e.g. BIP connectivity), and verifying that this connectivity is handled through the designated security GW. b. Option B: Alternatively, the absence of communication from the subscriber through the security GW for a long time is considered suspicious. c. Deviations are considered as suspicious and notified to the device owner/operator and/or its organization. d. By path protection

[0033] Figure 1 illustrate a block diagram, depicting the messaging security platform, according to prior art.

[0034] Figure 2 illustrate a block diagram depicting the messaging security platform, according to some embodiments of the present invention.

[0035] The messaging security platform is comprised of data domain protection consisting of group and personal firewalls nodes 52, 54, which check the user messages requests which are delivered from user though PLMN/PDN/GRX network, using PGW 20 and/or designated PGW 35, or Designated LNS , which routs the messages to customized/personalized path (using firewall path routing (4).

[0036] Figure 3 illustrate a block diagram, depicting the messaging security platform, according to some embodiments of the present invention.

[0037] The messaging security platform is comprised of data domain protection consisting of group and personal firewalls nodes 52, 54, which check the user messages requests which are delivered from user though PLMN/PDN/GRX network, using PGW 20 and/or designated PGW 35, or Designated LNS , which routs the messages to customized/personalized path (using firewall path routing (4).

[0038] The personal and group fire wall nodes are arranged in a graph structure of multiple nodes 56 and 53 respectively, each node including specific rules. By specifying a path through the graph structure are determined sequence of rules a specific request of user is tested by.

[0039] Controller 100 identifies client profile and associated groups Managing the address assigned to each of the UCD and determines personal/customized rules, the groups are either pre-defined or created ad hoc or based on user profiles for applying destination-based protection which is customized to user profile and group. [0040] The IP poll manager manages the address assigned to each of the UCD. [0041] Figure 4 is a block diagram which depicts depicting the messaging security platform, including option of visited network according to some embodiments of the present invention.

[0042] The is diagram show different information flow of the message routing in different network configuration of equivalent functionality with different system owner (service provider or designated security service provided based present invention technology

Path Verification 1 of one possible configuration disclose using designated security SIM applet, which communicates with the Security & Policy function either on the PDN of the home network.

[0043] Path Verification 2 of one possible configuration disclose using designated security SIM applet, which communicates with the Security & Policy function on the PDN of GSMA regulated infrastructure.

[0044] Path Verification 3: designated security SIM applet communicates with the Security & Policy function via hostile internet, in which the communication is routed through unknown server.

[0045] All communication paths end at the home networker core, which implements the security platform 106 as suggested by the present invention, which include the security policy as suggested by the present invention [0046] See figure 10 for information flow for this block diagram.

[0047] Figures 5A &B is a block diagram which configuration of subscriber and group firewalls according to some embodiments of the present invention.

[0048] Figure 6 is a flow diagram of routing of secured message according to the configuration of fig 3, according to some embodiments of the present invention.

[0049] The routing of secured message includes at least one of the following steps:

[0050] Identifying client profile and associated groups by Controller 104;

[0051] Managing the address assigned to each of the UCD by the Controller 100 using IP Pool Management 106

[0052] Assign UCD address upon data service connection attempt by the IP pool management module [Pointing on link LNS, P-GW, FP GGSN <-> IP Pool Management w. DHCP/Radius ???)

[0053] determines the route path through firewall nodes is determined by UCD the source address 108

[0054] Monitoring/probing UCD data communication requests and their destination 110

[0055] Monitoring/probing responses to UCD data communication requests and their origin 120; [0056] Determining by the controller personal/customized rules for the personal level and the group level, the groups are either pre-defined or created ad hoc or based on user profiles for applying destination-based protection which is customized to user profile and group [Pointing to link Controller <-> Firewall Blocks / ACL & DNS]

130

[0057] Clustering of groups is based on parameters such as: Distinction of the applied security features of the sub-set, need of the relevant users to be separated for management and internal security reasons, scalability and processing power [‘Layout’ of the blue/green areas]

[0058] Figure 7 is a flow diagram of the action performed by the firewall instance, according to some embodiments of the present invention.

[0059] The firewall processing includes at least one of the following steps:

[0060] Data is retrieved from threat intelligence feeds, updated as needed, validated and adapted to system format access rules. 208

[0061] Access/security rules for the data protection engines (subscriber and group level) are generated dynamically based on abstract rules, e.g. Destination IP geo-fence as well as static rules e.g. list of specific addresses, threat intelligence data, protocols, time etc. 210

[0062]

[0063] Applying security rules relevant for user ID profile and associated group by tracing the rules at each firewall node and DNS; 212

[0064] Tracing DNS queries per UCD and Sanitizing DNS query responses against threat intelligence data and other parametric 214;

[0065] Re-building DNS cache of UCD: Device communication is been analyzed to determine whether the peer address was resolved through a DNS query or not. The system applies security rules (pass, alert/notify, block) based on this analysis, 216; [0066] Usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber. An attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile 218; [0067] Possibility to bypass group level security rules for specific; allow specific traffic despite prohibitive group rules 220;

[0068] Figure 8 is a flow diagram of firewall path routing, according to some embodiments of the present invention. [0069] According to this flow the route path through firewall nodes is determined based on UCD source address.

[0070] Figure 9 is a flow diagram of the action performed by the DNS, according to some embodiments of the present invention.

[0071] The actions performed by the DNS include at least one of the following steps:

[0072] DNS queries are escalated to verified service providers by secure (encrypted) protocol 312;

[0073] Tracing DNS queries; Sanitizing DNS query responses against threat intelligence data and other parametric 314;

[0074] DNS specific data is retrieved from threat intelligence feeds, updated as needed, validated and adapted to system format access rules.316

[0075] The usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber, such that. An attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile.318

[0076] The system rebuilds a DNS cache individually for the subscriber based on the individual DNS traffic analyzed by the system, wherein. Device communication is been analyzed passively to determine whether the peer address was resolved through a DNS query or not, wherein. The system applies security rules (pass, alert/notify, block) based on this analysis. 320 the DNS queries are escalated to verified service providers by secure [0077] (encrypted) protocol and the DNS query response is sanitized by the system. 322

[0078] Figure 10 is a flow diagram of re-routing of secured message protection according to the configuration of fig 4, according to some embodiments of the present invention.

[0079] The re-routing of secured message protection comprises at least one of the following steps:

[0080] Option A: A SIM applet functionality is used to verify the data path between each protected individual device and the data protection system. 410 [0081] SIM applet establishes IP connection to the security system 412 [0082] Security system verifies that SIM applet connectivity is handled through the designated security GW [red or green path] 414 [0083] Option B: The absence of communication from the UCD through the security GW for a long time is considered suspicious. 416 [0084] Deviations are considered as suspicious and notified to the device owner/operator and/or its organization 418

[0085] Figure 11 is a flow diagram of routing secured message according to the configuration of fig 3, according to some embodiments of the present invention. [0086] The routing of secured message comprises at least one of the following steps:

[0087] Sends, Attach Request from the USD 2 to the packet gateway (20,35), Request UCD IP from the IP poll management (90), based on received UCD IP, assign UCD Address upon service connection;

[0088] Identifying UCD profile and associated groups, by the controller 100 and [0089] Determining personal/customized rules, the groups are either pre-defined or created ad hoc or based on UCD profile for applying destination-based protection which is customized to UCD profile and group;

[0090] The UCD Source address determines route path through firewall nodes; [0091] Monitoring/Probing UCD communication including: Data communication request and their destination, Responses to data communication and their origin; [0092] Clustering of groups is based on parameters such as: Distinction of the applied security features of the sub-set, need of the relevant users to be separated and management and internal security reasons, scalability and processing power.

Option A: Packet Gateway notification Option B : IP Pool Management notification Option A: Packet Gateway notification Option B : IP Pool Management notification

[0093] Figure 12 is a flow diagram of firewall path routing and controller actions, according to some embodiments of the present invention.

[0094] The firewall path routing and controller actions comprise at least one of the following steps:

[0095] Applying rules relevant for user ID profile and associated group by tracing the rules at each firewall node and DNS; [0096] Tracing DNS queries per UCD; Sanitizing DNS query responses against threat intelligence data and other parametric 210;

[0097] Re-building DNS cache of UCD: Device communication is been analyzed to determine whether the peer address was resolved through a DNS query or not. The system applies security rules (pass, alert/notify, block) based on this analysis. 612 [0098] Usage of the designated DNS is enforced by a rule being part of the security profile defined for that subscriber. An attempt to bypass the designated DNS is notified and corrected if such rule exists on the subscriber security profile 608 [0099] Possibility to bypass group level security rules for specific; allow specific traffic despite prohibitive group rules 214

Data is retrieved from threat intelligence feeds, updated as needed, validated and adapted to system format access rules;

[00100] Access rules for the data protection engines (subscriber and group level) are generated dynamically based on abstract rules e.g. Destination IP geo-fence as well as static rules e.g. list of specific addresses, threat intelligence data, protocols, time etc. [00101] DNS specific data is retrieved from threat intelligence feeds, updated as needed, validated and adapted to system format access rules.

[00102] DNS queries are escalated to verified service providers by secure (encrypted) protocol

[00103] Tracing DNS queries; Sanitizing DNS query responses against threat intelligence data and other parametric

[00104] Figure 13 is a flow diagram of the action performed by the DNS, according to some embodiments of the present invention [00105] Option A: Packet Gateway notification [00106] Option B: IP Pool Management notification [00107] DNS queries are escalated to verified service providers by secure (encrypted) protocol

[00108] Tracing DNS queries; Sanitizing DNS query responses against threat intelligence data and other parametric

[00109] Threat intelligence updates continuously and according to schedule [00110] Figure 14 is a flow diagram of routing secured message action between the UCD and the data protection system according to the configuration of fig 3, according to some embodiments of the present invention.

[00111] The routing secured message action between the UCD and the data protection system, comprise one if the following steps:

Option A: A SIM applet functionality is used to verify the data path between each protected individual device and the data protection system.

SIM applet establishes IP connection to the security system

Security system verifies that SIM applet connectivity is handled through the designated security GW

Option B: The absence of communication from the UCD through the security GW for a long time is considered suspicious.

Deviations are considered as suspicious and notified to the device owner/operator and/or its organization.

[00112] The system of the present invention may include, according to certain embodiments of the invention, machine readable memory containing or otherwise storing a program of instructions which, when executed by the machine, implements some or all of the apparatus, methods, features and functionalities of the invention shown and described herein. Alternatively or in addition, the apparatus of the present invention may include, according to certain embodiments of the invention, a program as above which may be written in any conventional programming language, and optionally a machine for executing the program such as but not limited to a general purpose computer which may optionally be configured or activated in accordance with the teachings of the present invention. Any of the teachings incorporated herein may wherever suitably operate on signals representative of physical objects or substances.

[00113] Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions, utilizing terms such as, "processing", "computing", "estimating", "selecting", "ranking", "grading", "calculating", "determining", "generating", "reassessing", "classifying", "generating", "producing", "stereo-matching", "registering", "detecting",

"associating", "superimposing", "obtaining" or the like, refer to the action and/or processes of a computer or computing system, or processor or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories, into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. The term "computer" should be broadly construed to cover any kind of electronic device with data processing capabilities, including, by way of non-limiting example, personal computers, servers, computing system, communication devices, processors (e.g. digital signal processor (DSP), microcontrollers, field programmable gate array (FPGA), application specific integrated circuit (ASIC), etc.) and other electronic computing devices.

[00114] The present invention may be described, merely for clarity, in terms of terminology specific to particular programming languages, operating systems, browsers, system versions, individual products, and the like. It will be appreciated that this terminology is intended to convey general principles of operation clearly and briefly, by way of example, and is not intended to limit the scope of the invention to any particular programming language, operating system, browser, system version, or individual product.

[00115] It is appreciated that software components of the present invention including programs and data may, if desired, be implemented in ROM (read only memory) form including CD-ROMs, EPROMs and EEPROMs, or may be stored in any other suitable typically non-transitory computer-readable medium such as but not limited to disks of various kinds, cards of various kinds and RAMs. Components described herein as software may, alternatively, be implemented wholly or partly in hardware, if desired, using conventional techniques. Conversely, components described herein as hardware may, alternatively, be implemented wholly or partly in software, if desired, using conventional techniques.

[00116] Included in the scope of the present invention, inter alia, are electromagnetic signals carrying computer-readable instructions for performing any or all of the steps of any of the methods shown and described herein, in any suitable order; machine- readable instructions for performing any or all of the steps of any of the methods shown and described herein, in any suitable order; program storage devices readable by machine, tangibly embodying a program of instructions executable by the machine to perform any or all of the steps of any of the methods shown and described herein, in any suitable order; a computer program product comprising a computer useable medium having computer readable program code, such as executable code, having embodied therein, and/or including computer readable program code for performing, any or all of the steps of any of the methods shown and described herein, in any suitable order; any technical effects brought about by any or all of the steps of any of the methods shown and described herein, when performed in any suitable order; any suitable apparatus or device or combination of such, programmed to perform, alone or in combination, any or all of the steps of any of the methods shown and described herein, in any suitable order; electronic devices each including a processor and a cooperating input device and/or output device and operative to perform in software any steps shown and described herein; information storage devices or physical records, such as disks or hard drives, causing a computer or other device to be configured so as to carry out any or all of the steps of any of the methods shown and described herein, in any suitable order; a program pre-stored e.g. in memory or on an information network such as the Internet, before or after being downloaded, which embodies any or all of the steps of any of the methods shown and described herein, in any suitable order, and the method of uploading or downloading such, and a system including server/s and/or client/s for using such; and hardware which performs any or all of the steps of any of the methods shown and described herein, in any suitable order, either alone or in conjunction with software. Any computer-readable or machine-readable media described herein is intended to include non-transitory computer- or machine-readable media.

[00117] Any computations or other forms of analysis described herein may be performed by a suitable computerized method. Any step described herein may be computer-implemented. The invention shown and described herein may include (a) using a computerized method to identify a solution to any of the problems or for any of the objectives described herein, the solution optionally include at least one of a decision, an action, a product, a service or any other information described herein that impacts, in a positive manner, a problem or objectives described herein; and (b) outputting the solution.

[00118] The scope of the present invention is not limited to structures and functions specifically described herein and is also intended to include devices which have the capacity to yield a structure, or perform a function, described herein, such that even though users of the device may not use the capacity, they are, if they so desire, able to modify the device to obtain the structure or function.

[00119] Features of the present invention which are described in the context of separate embodiments may also be provided in combination in a single embodiment.

[00120] For example, a system embodiment is intended to include a corresponding process embodiment. Also, each system embodiment is intended to include a server- centered "view" or client centered "view", or "view" from any other node of the system, of the entire functionality of the system, computer-readable medium, apparatus, including only those functionalities performed at that server or client or node.