摘要:
A method, system, and medium are provided for determining the identity of a user associated with a wireless device located near a geographic location at a specific time. In response to the occurrence of an event at a geographic location, a request can be issued by a wireless provider to users of wireless devices to provide the geographic locations of their respective devices and their identities to one or more entities. Upon receiving an affirmative response to the request, the wireless provider communicates information to the entities allowing the entities to contact the users to solicit information regarding the occurrence of the event. A wireless provider may send a request for authorization to users of wireless devices to provide geographic locations when the wireless device enters a predefined geographic area.
摘要:
A system and method for removing radio frequency emissions from an electronic device. The system comprises collectors for collection of the radio frequency signals, combiners for combining the signals to produce a combined signal, fiber optic transmitter for up-converting the combined radio frequency signals to an optical wave length signal, optical fiber for directing the optical signal, and a termination device for terminating the optical signal.
摘要:
Apparatuses and methods are described, which perform control in relation to a connection for proximity service between at least two devices, perform lawful interception in relation to the proximity service with respect to at least one device to be intercepted of the at least two devices, and configure at least one radio access network control element to perform the lawful interception in relation to the proximity service.
摘要:
A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.
摘要:
A system to detect anomalies in internet protocol (IP) flows uses a set of machine-learning (ML) rules that can be applied in real time at the IP flow level. A communication network has a large number of routers that can be equipped with flow monitoring capability. A flow collector collects flow data from the routers throughout the communication network and provides them to a flow classifier. At the same time, a limited number of locations in the network monitor data packets and generate alerts based on packet data properties. The packet alerts and the flow data are provided to a machine learning system that detects correlations between the packet-based alerts and the flow data to thereby generate a series of flow-level alerts. These rules are provided to the flow time classifier. Over time, the new packet alerts and flow data are used to provide updated rules generated by the machine learning system.
摘要:
A system is provided for intercepting signals transmitted between a target served by a fiber optic network and a subscriber. A network is described having a phone switch at a central office configured to receive signals for transmission to and from a target, such as the target of a criminal investigation. A signal received at the central office is assigned to an analog circuit, and a monitoring device configured to intercept and monitor the signal is installed along the analog circuit at a location that allows the monitoring of communications without notifying the target that he is under surveillance. After the signal has been monitored, it is converted to a digital signal for transmission. A method is also provided for intercepting a signal transmitted between the target served by a fiber optic network and a subscriber, such that a monitoring device may be installed without alerting the target.
摘要:
A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information, and converts both into an ASCII string for presentation to a data port of a satellite phone, allowing out-of-band control of a non-secure satellite system (e.g., AT command control of a data port) by a user on a secure side of an encryption device, by including the ability to interpret control signals and control the satellite system appropriately. A false dial tone is presented to the encryption device, and the data stream coming from the encryption device is monitored for the presence of dual-tone, multi-frequency (DTMF) tones representing control signals, the DTMF tones are converted to ASCII characters, which are in turn received as control signals by the satellite phone, allowing control of the functions of the satellite system directly from the secure side of the encryption device.
摘要:
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
摘要:
In an embodiment, a computer-implemented method detects a network or application abuse to a service provider environment. In the method, data is collected describing incoming requests from plurality of different external source addresses to the service provider environment. The collected data is used to compare the incoming requests against a heuristic. When the incoming requests are determined to match the heuristic, the requests, having the plurality of different external source addresses, are from a common abuse entity. Finally, the collected data is evaluated to determine that the common abuse entity is a potential network abuser of the service provider environment.
摘要:
Technology for distributing presence information by a presence server in an Internet protocol (IP) multimedia subsystem (IMS) based dynamic adaptive streaming over hypertext transfer protocol (HTTP) (DASH) service is disclosed. In an example, a user equipment (UE) can be operable to act as a presentity and include computer circuitry configured to: Generate a trigger event during a DASH session; and publish presence information including content being consumed to a presence server. The published content can include DASH content.