摘要:
A computer-implemented monitoring method includes electronically determining destination naming conventions of packets passing out of a first computing device for transmission on an electronic communication network, and electronically determining if each destination naming convention is that same as the naming convention of a second computing device. When at least one destination naming convention is not the same as the naming convention of the second computing device, the second computing device is electronically notified.
摘要:
When accepting an establishment request (Cx-LIR) for establishing an information communication path between a sending-side UE and a receiving-side UE, an HSS performs control so as to establish the information communication path between the sending-side UE and the receiving-side UE via an MGW and an existing 3G network if the receiving-side UE exists in an IMS network and is a communication interception target terminal.
摘要:
In one embodiment, a method of serving media includes receiving a request to serve media content to an user equipment, and receiving caching information regarding the media content. The caching information includes information regarding whether the media content requested by the user equipment is cacheable. A first media server is assigned from a hierarchical set of media servers to serve the user equipment if the media content to be served is cacheable. The hierarchical set of media servers includes a plurality of first type of media servers deployed in a plurality of layer2 (L2) access networks. The user equipment is coupled to the content delivery network through a layer2 access network of the plurality of L2 access networks.
摘要:
A Mutual Aid QoS Function (MAQF) performs a method for determining policy for user equipment (UE) providing mutual aid in a mutual aid enterprise operating area of a Long Term Evolution (LTE) system. The method includes: receiving an indication that a UE is assigned to provide mutual aid in a mutual aid enterprise operating area, wherein the UE has a home enterprise operating area that is different than the mutual aid enterprise operating area; detecting that the UE has entered the mutual aid enterprise operating area; selecting a set of mutual aid policy rules for the UE while the UE is providing mutual aid in the mutual aid enterprise operating area.
摘要:
A method of packet processing, includes: providing a plurality of network appliances that form a cluster, wherein two or more of the plurality of network appliances in the cluster are located at different geographical locations, are communicatively coupled via a private network or an Internet, and are configured to collectively perform out-of-band packet processing; receiving a packet by one of the network appliances in the cluster; processing the packet using two or more of the plurality of the appliances in the cluster; and passing the packet to one or more network monitoring tools after the packet is processed.
摘要:
An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information.
摘要:
The present invention relates to methods and arrangements for optimizing monitoring capacity in a telecommunication system comprising at least one information element receiving unit. One activity report request along with identities of a target to be monitored are received at the element receiving unit. At least two information elements belonging to a first element group, related to the specified target by different identities and comprise duplicate information are also received at the target. The element receiving unit selects one of the received at least two elements.
摘要:
A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over Internet protocol (VoIP) network, that employs a session initiation protocol (SIP). The method includes receiving a subscription request from a third party subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect SIP events corresponding to state transitions associated with the communication sessions. A system for facilitating surveillance of a targeted user includes an application programming interface (API) operable to receive a subscription request from a third party subscriber, the subscription request identifying the targeted user, wherein the third party subscriber is not a participant in the one or more communication sessions, and a SIP events monitoring module operable to detect one or more predetermined SIP events associated with the communication sessions based on the subscription request and notify the third party subscriber of the detected SIP events.
摘要:
According to one embodiment, a computer system executing a computer program is coupled to multiple secure network domains configured in a multi-level security architecture. The computer program simultaneously establishes a voice connection with a first terminal configured on a first secure network domain and a second terminal configured on a second secure network domain. The computer program may then selectively couple an electroacoustical transducer to the first terminal or the second terminal, and generate an indicator on a user interface indicating the security level of the selected terminal.
摘要:
Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names.