摘要:
A lawful interception system to perform operations comprising determining an appropriate session continuity server, a content duplication element associated with a source communication network and one or more communication network properties associated with the source communication network; initiating, duplication of one or more first data packets associated with the ongoing voice and data session by the content duplication element; detecting a handover of the ongoing voice and data session from the source communication network to a destination communication network; determining the content duplication element associated with the destination communication network and one or more communication network properties associated with the destination communication network; and initiating, duplication of one or more second data packets associated with the ongoing voice and data session by the content duplication element.
摘要:
The present invention relates to a method and system for tracking information transfer between devices. The method includes receiving, by an information logger system, information from a source device. The information is routed from the source device to a destination device through the information logger system. The information includes control information and meaningful information. An information type of the information is detected by the information logger system. The meaningful information is captured from the information based on the information type. The meaningful information is further stored in a predetermined format. Moreover, the information is forwarded to the destination device. The information logger system includes a receiving module, a detecting module, a controlling module, a memory, and a forwarding module.
摘要:
Methods and systems for controlling wireless communications are provided. A method includes sending, from a mobile base station mimicking system, signals that mimic a first base station of a wireless communication system. The method also includes selectively routing, at the mobile base station mimicking system, communications associated with at least one communication device, wherein selectively routing the communications comprises forwarding a first communication associated with the at least one communication device and blocking a second communication associated with the at least one communication device.
摘要:
An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the UE is connected; reporting location information for the UE to an evolved Packet Data Gateway over an SWu interface using Internet Key Exchange version 2 (IKEv2) protocol, wherein the location information includes, at least in part, a UE location in GPS coordinates, a service set identifier, the retrieved AP MAC address and cell identity information for the UE; and populating a location database with the location information. The method can include embedding the location information in an identity initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message using a Network Access Identifier (NAI) and communicating the location information from the ePDG to a PGW over an S2b interface using a private extension information element of GPRS Tunneling Protocol version 2 (GTPv2).
摘要:
A mediation server for controlling contents of incoming and outgoing communication information exchanged as part of a conversation is provided. The mediation server may be a centralized server between an internal (private) network and an external network, utilized for enforcing the internal network's policy and detecting a potential security compromise in the internal network. Predefined evaluation criteria are utilized to enforce internal policy or security policy within the internal network. When communication information is exchanged, the mediation server may monitor potential policy or security breaches in the communication information utilizing the predefined evaluation criteria and execute an appropriate action to prevent potential policy or security breaches.
摘要:
Messages from wireless devices are intercepted by a controller, such as an access point for a wireless network, a security system controller, a home automation controller, an industrial or business automation controller, or a combination thereof. The controller logs device-identifying information about the devices that sent the messages that that were intercepted. Examples of the device-identifying information include a MAC address, a device name, a brand of the device, an SSID of an AP connected to the device, or a class of device. The intercepted message is used to trigger one or more events, either based solely on intercepting the message or in combination with other parameters.
摘要:
An information leakage prevention apparatus 100 receives, from a LAN 109, communication data transmitted by a PC 112 to Internet 111, and when the received data has been encrypted, analyzes a log describing content of data processing performed in the PC 112 and extracts a key used to encrypt the communication data in the PC 112. Further, the information leakage prevention apparatus 100 decrypts the communication data using the extracted key and determines whether or not a keyword is included in a decryption result. If the keyword is not included in the decryption result, the information leakage prevention apparatus 100 transmits the communication data to the Internet 111 through a WAN 110.
摘要:
In an embodiment, a first client device establishes a P2P connection with a second client device. While the P2P connection is still established, the first client device receives a request to send data to the second client device via the P2P connection, and then sends the data to a server along with an indication of a temporary identifier of the second client device without notifying an operator of the first client device that the data is being sent to the server. In another embodiment, the server receives the data, maps the temporary identifier to a unique network address of the second client device and generates a record of the data transmission between the respective client devices. In another embodiment, the server maintains an association for the temporary identifier after the first and second client devices are disconnected from their P2P connection to permit supplemental communication.
摘要:
Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass.
摘要:
Methods, systems, and devices for offloading traffic flows without service disruption are disclosed herein. User equipment (UE) is configured to receive an indication that a current packet data network (PDN) connection can be optimized. The current PDN connection is established over a first PDN gateway (PGW). The UE requests connection over a new PDN connection to a same type of service as the current PDN connection without releasing the connection over the first PGW. The UE routes new traffic flows over a second PGW corresponding to the new PDN connection and routes old traffic flows over the first PGW.