摘要:
A system architecture for managing resources in a communication network comprises in combination at least the following elements: a plurality of radio equipments working in a given frequency band and with identical frequency hopping rules; the radio equipments are managed by a master device; and a radio equipment comprises at least: a radiocommunication module that carries the radiocommunications; a module suitable for tapping, monitoring and intercepting radio signals in the environment and for recording them locally in a database; a module suitable for disrupting non-authorized communications; and a local “3 in 1” management module receiving the orders emitted by the master device, the management module being suitable for controlling the various modules of the radio equipment; a radio-router module; and a tapping and monitoring module.
摘要:
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP client carrying a web application layer message that violates a condition of a security rule, the AD transmits an alert package to an automatic attribute value generation and rule feedback module (AVGRFM). The AVGRFM uses the alert package, and optionally other alert packages from the same AD or other ADs, to automatically generate a new set of attribute values for each of a set of attribute identifiers for use, by the AD or other ADs, in a different security rule than the violated security rule. The new set of attribute values may be used in an attack specific rule to detect a previously unknown web application layer attack.
摘要:
A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device.
摘要:
Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.
摘要:
A processing device identifies comparison subjects comprising a first subject and a second subject. The processing device builds a first network of a first profile of the first subject and a second network of a second profile of the second subject, wherein the first network and the second network are multi-degree connections networks. The processing device the first network and second network to produce a similarity score. The processing device examining first-degree connections between the first network and the second network and accounting for centralities that rely on information about the first network and the second network. Responsive to the similarity score exceeding a similarity threshold, indicating the first profile and the second profile correspond to a common profile for the first subject and the second subject.
摘要:
Some aspects of what is described here relate to systems, devices, and computer-implemented methods for capturing data related to a mobile device in a wireless network. In one example, a method may include receiving, at a mobile device, data capture configuration information from a wireless network, the data capture configuration information indicating a data type to be captured from the mobile device in an off-network environment. Thereafter, in response to detecting the off-network environment at the mobile device, a data element is stored in a local memory of the mobile device. The data element corresponds to the data type indicated by the data capture configuration information. The data element is sent to the wireless network, for instance, when the mobile device has access to the wireless network.
摘要:
A system is described for communicating with a mobile device. The mobile device exchanges an electronic message with a messaging server, where the message is encrypted with a messaging key. The mobile device encrypts a copy of the message with a monitoring key different from the messaging key, and sends the encrypted copy to a monitoring server remote from the messaging server. The mobile device communicates with the messaging server via a network router. The network router is configured to block transmission of an encrypted electronic message between the mobile device and the messaging server when an access condition is not met.
摘要:
This technology relates generally to lawful interception and more particularly to methods and systems for lawful interception. In one embodiment, a method for lawful interception in a communication network is disclosed. The method includes detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds. The method further includes analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria. Moreover, the method includes correcting, selectively, the adulterated content based on satisfaction of the predefined criteria.
摘要:
In one embodiment, a method of serving media includes receiving user profiles from a layer3 node in an access network, and receiving a request to serve media content to a user equipment. The user profiles include information relating to user account and/or network characteristics of the user equipment. The method further includes using an user equipment information from the user profiles, assigning a first media server from a hierarchical set of media servers to serve the user equipment if the media content to be served is cacheable. The hierarchical set of media servers include a plurality of first type of media servers deployed in a plurality of layer2 (L2) access networks. The user equipment is coupled to a content delivery network through a layer2 access network of the plurality of layer2 access networks.
摘要:
Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of people who are subject to security or law enforcement limitations or otherwise reside within a controlled or correctional facility. All submitted information requires administrative approval, either by a human administrator or an automated process, before it can be viewed by other members of the social network.