Methods and systems for handling malicious attacks in a wireless communication system
    1.
    发明授权
    Methods and systems for handling malicious attacks in a wireless communication system 有权
    在无线通信系统中处理恶意攻击的方法和系统

    公开(公告)号:US09344894B2

    公开(公告)日:2016-05-17

    申请号:US14176784

    申请日:2014-02-10

    Abstract: Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.

    Abstract translation: 本公开的某些方面涉及用于处理恶意攻击的方法和装置。 在一个方面,所述方法和装置被配置为至少部分地基于由无线设备接收的分组将恶意源接收的分组识别,所述分组将无线设备的状态从休眠状态改变为连接状态,选择性地断开 无线设备从分组数据网络(PDN)通过在监视期间内识别为从恶意源接收到的数量的分组达到阈值数目时释放用于将无线设备连接到PDN的第一互联网协议(IP)地址, 并且使用与第一IP地址不同的第二IP地址将无线设备重新连接到PDN。 在另一方面,在PDN断开连接之后,维护与IP多媒体子系统(IMS)PDN的连接。

    METHODS AND APPARATUS FOR PRIORITIZING IMS CLIENTS OVER SOFTAP
    4.
    发明申请
    METHODS AND APPARATUS FOR PRIORITIZING IMS CLIENTS OVER SOFTAP 审中-公开
    通过SOFTAP优化IMS客户端的方法和设备

    公开(公告)号:US20150237641A1

    公开(公告)日:2015-08-20

    申请号:US14185762

    申请日:2014-02-20

    Abstract: A method for wireless communication by a wireless relay device comprises receiving, over a first wireless connection of a first connection type between a first wireless device and the relay device, a request to establish a connection between the first wireless device and a network via the first wireless connection and a second wireless connection of a second connection type between the relay device and the network. The method further comprises determining a priority associated with the first wireless device based on at least one parameter associated with the first wireless device. The method further comprises establishing, at the relay device, the connection between the first wireless device and the network when the priority associated with the first wireless device is higher than a priority associated with at least one of a plurality of other wireless devices having a connection with the network via the second wireless connection.

    Abstract translation: 一种由无线中继设备进行无线通信的方法包括:经由第一无线设备与中继设备之间的第一连接类型的第一无线连接接收通过第一无线设备建立第一无线设备与网络之间的连接的请求 无线连接和中继设备与网络之间的第二连接类型的第二无线连接。 该方法还包括基于与第一无线设备相关联的至少一个参数来确定与第一无线设备相关联的优先级。 所述方法还包括当与所述第一无线设备相关联的优先级高于与具有连接的多个其他无线设备中的至少一个相关联的优先级时,在所述中继设备处建立所述第一无线设备与所述网络之间的连接 与网络通过第二个无线连接。

    METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM
    5.
    发明申请
    METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM 有权
    在无线通信系统中处理恶意攻击的方法和系统

    公开(公告)号:US20150230091A1

    公开(公告)日:2015-08-13

    申请号:US14176784

    申请日:2014-02-10

    Abstract: Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.

    Abstract translation: 本公开的某些方面涉及用于处理恶意攻击的方法和装置。 在一个方面,所述方法和装置被配置为至少部分地基于由无线设备接收的分组将恶意源接收的分组识别,所述分组将无线设备的状态从休眠状态改变为连接状态,选择性地断开 无线设备从分组数据网络(PDN)通过在监视期间内识别为从恶意源接收到的数量的分组达到阈值数目时释放用于将无线设备连接到PDN的第一互联网协议(IP)地址, 并且使用与第一IP地址不同的第二IP地址将无线设备重新连接到PDN。 在另一方面,在PDN断开连接之后,维护与IP多媒体子系统(IMS)PDN的连接。

Patent Agency Ranking