会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Lawful intercept trigger support within service provider networks
    • 在服务提供商网络中合法拦截触发器支持
    • US08548132B1
    • 2013-10-01
    • US12695845
    • 2010-01-28
    • Margaret ZielinskiPaul Raison
    • Margaret ZielinskiPaul Raison
    • H04M11/00
    • H04M7/006G06Q10/06G06Q10/10G06Q50/18H04L43/028H04L43/18H04L63/00H04L63/30H04M3/2281
    • The invention is directed to techniques for initiating lawful intercept of packets associated with subscriber sessions on a network device of a service provider network based on identification triggers. A law enforcement agency may send an intercept request for a subscriber to an administration device of the service provider network. The administration device may then configure one or more identification triggers for the subscriber based on the intercept request. The techniques described herein initiate lawful intercept when one or more subscriber sessions on a network device match the one or more identification triggers. The techniques described herein include configuring trigger rules that include identification triggers for subscribers on a network device via a command line interface (CLI) of the network device. In addition, the techniques described herein include configuring identification triggers in a subscriber profile on an authentication device connected to a network device.
    • 本发明涉及用于基于识别触发来启动与服务提供商网络的网络设备上的订户会话相关联的分组的合法拦截的技术。 执法机构可以向用户提供对服务提供商网络的管理设备的拦截请求。 然后,管理设备可以基于拦截请求来为用户配置一个或多个标识触发。 当网络设备上的一个或多个订户会话与一个或多个标识触发相匹配时,本文描述的技术启动合法拦截。 本文描述的技术包括通过网络设备的命令行界面(CLI)配置包括网络设备上的订户的标识触发的触发规则。 此外,本文描述的技术包括在连接到网络设备的认证设备上的订户简档中配置标识触发。
    • 5. 发明授权
    • Lawful intercept trigger support within service provider networks
    • 在服务提供商网络中合法拦截触发器支持
    • US07657011B1
    • 2010-02-02
    • US11414974
    • 2006-05-01
    • Margaret ZielinskiPaul Raison
    • Margaret ZielinskiPaul Raison
    • H04M11/00
    • H04M7/006G06Q10/06G06Q10/10G06Q50/18H04L43/028H04L43/18H04L63/00H04L63/30H04M3/2281
    • The invention is directed to techniques for initiating lawful intercept of packets associated with subscriber sessions on a network device of a service provider network based on identification triggers. A law enforcement agency may send an intercept request for a subscriber to an administration device of the service provider network. The administration device may then configure one or more identification triggers for the subscriber based on the intercept request. The techniques described herein initiate lawful intercept when one or more subscriber sessions on a network device match the one or more identification triggers. The techniques described herein include configuring trigger rules that include identification triggers for subscribers on a network device via a command line interface (CLI) of the network device. In addition, the techniques described herein include configuring identification triggers in a subscriber profile on an authentication device connected to a network device.
    • 本发明涉及用于基于识别触发来启动与服务提供商网络的网络设备上的订户会话相关联的分组的合法拦截的技术。 执法机构可以向用户提供对服务提供商网络的管理设备的拦截请求。 然后,管理设备可以基于拦截请求来为用户配置一个或多个标识触发。 当网络设备上的一个或多个订户会话与一个或多个标识触发相匹配时,本文描述的技术启动合法拦截。 本文描述的技术包括通过网络设备的命令行界面(CLI)配置包括网络设备上的订户的标识触发的触发规则。 此外,本文描述的技术包括在连接到网络设备的认证设备上的订户简档中配置标识触发。
    • 6. 发明授权
    • Fault tolerance for authentication, authorization, and accounting (AAA) functionality
    • 认证,授权和计费(AAA)功能的容错
    • US09253019B1
    • 2016-02-02
    • US13416864
    • 2012-03-09
    • Aleksey RomanovPaul Raison
    • Aleksey RomanovPaul Raison
    • H04L29/08H04L29/12
    • H04L41/0672H04L29/12509H04L61/203H04L61/2517H04L61/2567H04L63/08H04L63/0892H04L67/1008H04L67/142H04L67/145H04W4/50
    • An example network access device (NAD) includes a network interface to send and receive packets with an authentication, authorization, and accounting (AAA) server, and a subscriber management service unit (SMSU). The SMSU is configured to, responsive to determining that the AAA server is not reachable by the NAD, send a message from the NAD to the AAA server using the network interface, wherein the message directs the AAA server to send a discovery request message to the NAD, receive the discovery request message from the AAA server using the network interface, wherein the discovery request message includes a request for information about a plurality of subscriber sessions, and generate a discovery response message that includes information about at least a portion of the plurality of subscriber sessions, and send the discovery response message to the network access device using the network interface.
    • 示例性网络接入设备(NAD)包括用认证,授权和计费(AAA)服务器以及订户管理服务单元(SMSU)发送和接收分组的网络接口。 SMSU被配置为响应于确定AAA服务器不能由NAD访问,使用网络接口将消息从NAD发送到AAA服务器,其中消息指示AAA服务器发送发现请求消息到 NAD,使用网络接口从AAA服务器接收发现请求消息,其中发现请求消息包括关于多个订户会话的信息的请求,并且生成包括关于多个订户会话的至少一部分的信息的发现响应消息 的用户会话,并使用网络接口将发现响应消息发送到网络接入设备。
    • 9. 发明授权
    • Tunneling DHCP options in authentication messages
    • 在认证消息中隧道化DHCP选项
    • US09021100B1
    • 2015-04-28
    • US13592031
    • 2012-08-22
    • Kathryn De GraafPaul RaisonJohn LiddyJohn C. ScanoSanjay Wadhwa
    • Kathryn De GraafPaul RaisonJohn LiddyJohn C. ScanoSanjay Wadhwa
    • G06F15/173H04L29/12H04L29/06
    • H04L61/2015H04L63/0272H04L63/08H04L63/168H04L2212/00
    • An example network device includes network interfaces and a control unit that receives a network configuration request from a client device and sends a network configuration response to the client device. The control unit comprises a network configuration protocol module that generates an authentication request in accordance with a network authentication protocol such that the authentication request includes a request for a second set of network configuration parameters based on a request for a first set of network configuration parameters in the network configuration request, and generates the network configuration response in accordance with the network configuration protocol, wherein the network configuration response is based on an authentication response generated by a second network device in accordance with the network authentication protocol, wherein the authentication response comprises a third set of network configuration parameters based on the request for the second set of network configuration parameters.
    • 示例性网络设备包括网络接口和从客户端设备接收网络配置请求并向客户端设备发送网络配置响应的控制单元。 所述控制单元包括网络配置协议模块,所述网络配置协议模块根据网络认证协议生成认证请求,使得认证请求基于对第一组网络配置参数的请求而包括对第二组网络配置参数的请求 网络配置请求,并根据网络配置协议生成网络配置响应,其中网络配置响应基于根据网络认证协议由第二网络设备生成的认证响应,其中认证响应包括: 第三组网络配置参数基于第二组网络配置参数的请求。
    • 10. 发明授权
    • Tunneling DHCP options in authentication messages
    • 在认证消息中隧道化DHCP选项
    • US08260902B1
    • 2012-09-04
    • US12694081
    • 2010-01-26
    • Kathryn DeGraafPaul RaisonJohn LiddyJohn C. ScanoSanjay Wadhwa
    • Kathryn DeGraafPaul RaisonJohn LiddyJohn C. ScanoSanjay Wadhwa
    • G06F15/173
    • H04L61/2015H04L63/0272H04L63/08H04L63/168H04L2212/00
    • An example network device includes network interfaces and a control unit that receives a network configuration request from a client device and sends a network configuration response to the client device. The control unit comprises a network configuration protocol module that generates an authentication request in accordance with a network authentication protocol such that the authentication request includes a request for a second set of network configuration parameters based on a request for a first set of network configuration parameters in the network configuration request, and generates the network configuration response in accordance with the network configuration protocol, wherein the network configuration response is based on an authentication response generated by a second network device in accordance with the network authentication protocol, wherein the authentication response comprises a third set of network configuration parameters based on the request for the second set of network configuration parameters.
    • 示例性网络设备包括网络接口和从客户端设备接收网络配置请求并向客户端设备发送网络配置响应的控制单元。 所述控制单元包括网络配置协议模块,所述网络配置协议模块根据网络认证协议生成认证请求,使得认证请求基于对第一组网络配置参数的请求而包括对第二组网络配置参数的请求 网络配置请求,并根据网络配置协议生成网络配置响应,其中网络配置响应基于根据网络认证协议由第二网络设备生成的认证响应,其中认证响应包括: 第三组网络配置参数基于第二组网络配置参数的请求。