会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • APPLICATION INTEGRATED GATEWAY
    • 应用集成网关
    • WO2008002599A2
    • 2008-01-03
    • PCT/US2007/014894
    • 2007-06-26
    • CISCO TECHNOLOGY, INC.GRAYSON, MarkIYER, Jayaraman
    • GRAYSON, MarkIYER, Jayaraman
    • G06F15/173
    • H04L63/164H04L67/1002H04L67/101H04L67/1034H04L67/1038H04L69/40
    • In one embodiment, a network application may offload stateful operations to a user-plane application. In one embodiment, the network application receives state information for a user device. The network application then sends the state information to a user-plane application, which can maintain the state information. The network application may then offload a stateful operation to the user-plane application. For example, the network application may have the user-plane application perform stateful operations. Also, the network application may use the state information maintained at the user-plane application for error recovery after the network application fails. For example, the network application may recover the state information from the user-plane application after failure.
    • 在一个实施例中,网络应用可以将状态操作卸载到用户平面应用。 在一个实施例中,网络应用接收用户设备的状态信息。 然后,网络应用程序将状态信息发送到可以维护状态信息的用户平面应用程序。 然后,网络应用可以将状态操作卸载到用户平面应用。 例如,网络应用程序可能具有用户平面应用程序执行有状态的操作。 此外,网络应用程序可能会在网络应用程序发生故障后使用在用户平面应用程序中维护的状态信息进行错误恢复。 例如,网络应用程序可能在故障后从用户平面应用程序恢复状态信息。
    • 6. 发明申请
    • BLACKLISTING OF UNLICENSED MOBILE ACCESS (UMA) USERS VIA AAA POLICY DATABASE
    • 未经许可的移动访问(UMA)用户通过AAA策略数据库进行黑名单
    • WO2008112482A2
    • 2008-09-18
    • PCT/US2008/056000
    • 2008-03-06
    • CISCO TECHNOLOGY, INC.SHATZKAMER, KevinOSWAL, Anand, K.YOON, CaseyGRAYSON, Mark
    • SHATZKAMER, KevinOSWAL, Anand, K.YOON, CaseyGRAYSON, Mark
    • H04W8/06H04L63/101H04W12/08H04W12/12H04W88/14
    • In one embodiment, while being connected to the network, a security issue may be detected and associated with the device. The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the network. Identification information for the device is added to the blacklist at the authentication server. If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR. Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR.
    • 在一个实施例中,当连接到网络时,可以检测安全问题并与设备相关联。 为了安全问题,设备可能被放置在黑名单上。 黑名单是用于在尝试连接时拒绝该设备的服务的列表。 因此,设备与网络断开连接。 设备的识别信息被添加到认证服务器的黑名单。 如果设备尝试重新连接到网络,则在认证服务器处接收到请求。 然后,如果识别信息在黑名单上,认证服务器可以检查黑名单并拒绝接入网络的请求。 确定此拒绝,而不向HLR发送请求。 因此,HLR受到保护,因为来自可能被认为是安全问题的设备的请求不被发送到HLR。