ENTERPRISE-BASED NETWORK SELECTION
    117.
    发明公开

    公开(公告)号:EP3381228A1

    公开(公告)日:2018-10-03

    申请号:EP16887157.2

    申请日:2016-01-29

    IPC分类号: H04W48/20 H04W48/18

    CPC分类号: H04W48/18

    摘要: In some examples, a user equipment may perform a method that includes identifying that a first wireless network operated by an enterprise is accessible to the user equipment as well as identifying that a second wireless network different from the first wireless network and also operated by the enterprise is accessible to the user equipment. The method performed by the user equipment may further include selecting the first wireless network to connect to instead of the second wireless network based on an enterprise employee characteristic associated with the user equipment.

    ZEROCONF PROFILE TRANSFERRING TO ENABLE FAST ROAMING

    公开(公告)号:EP3039894B1

    公开(公告)日:2018-10-03

    申请号:EP13892289.3

    申请日:2013-08-30

    摘要: Example embodiments relate to zeroconf profile transferring to enable fast roaming. In example embodiments, user identification is received from a user computing device that is connected to a wireless device, where the user identification is sent to an authentication server to determine a zeroconf profile name. In response to receiving a user authorization from the authentication server, the user computing device is provided with access to a network. Further, a zeroconf profile is used to provide the user computing device with access to services on the network, where the zeroconf profile is identified using the profile name. The zeroconf profile name is then sent to a neighboring wireless device that uses the zeroconf profile name to identify the zeroconf profile for providing the user computing device with access to the services.

    HANDLING NETWORK THREATS
    119.
    发明公开

    公开(公告)号:EP3378208A1

    公开(公告)日:2018-09-26

    申请号:EP15908924.2

    申请日:2015-11-17

    IPC分类号: H04L29/06 H04L12/22

    摘要: Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.