摘要:
A system and method for removing radio frequency emissions from an electronic device. The system comprises collectors for collection of the radio frequency signals, combiners for combining the signals to produce a combined signal, fiber optic transmitter for up-converting the combined radio frequency signals to an optical wave length signal, optical fiber for directing the optical signal, and a heat sink for terminating the optical signal.
摘要:
An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the UE is connected; reporting location information for the UE to an evolved Packet Data Gateway over an SWu interface using Internet Key Exchange version 2 (IKEv2) protocol, wherein the location information includes, at least in part, a UE location in GPS coordinates, a service set identifier, the retrieved AP MAC address and cell identity information for the UE; and populating a location database with the location information. The method can include embedding the location information in an identity initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message using a Network Access Identifier (NAI) and communicating the location information from the ePDG to a PGW over an S2b interface using a private extension information element of GPRS Tunneling Protocol version 2 (GTPv2).
摘要:
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time, To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record, if they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record.
摘要:
A validation method for validating IP information header in data packets from user equipment connected to a mobile telecommunications network (1) and accessing an IP network (5) through a proxy. In the method trusted location information of the user equipment (2) from a trusted source of the telecommunications network is requested (109). Then, the trusted location information is inserted into the IP information header of a message (112) to be sent to a location based function (17).
摘要:
The present application provides an IPv6 address tracing method, apparatus, and system, where the method includes: receiving a to-be-traced target IPv6 address; selecting, in a longest match manner, IPv6 address information that matches the target IPv6 address, where the IPv6 address information includes an IPv6 address or IPv6 prefix information; and acquiring a user identifier corresponding to the IPv6 address information. The present application implements IPv6 address tracing.
摘要:
A wireless communication system comprises: a first communication device (110); a second communication device (190) and; a target device (150), wherein the target device (150) is operable to establish a first connection over a first network with the first communication device (110) and a second connection over a second network with the second communication device (190), characterised in that first data which is exchanged between the first communication device (110) and the target device (150) is encrypted by an encryption means, and in that second data which is exchanged between the second communication device (190) and the target device (150) is unencrypted, such that a first user of the first communication device (110) can communicate with a second user of the second communication device (190).
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.
摘要:
A device receives a connection from a user device, and provides, to a database, connection information associated with the user device. The device receives, from the database, user device information based on the connection information, where the user device information includes a location associated with the user device. The device also receives a trigger instructing the device to provide the user device information to a content provider device, and provides the user device information to the content provider device when the trigger is received.
摘要:
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar STE device over an ISDN link for decryption. The present invention is embodied in a system that provides secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.