摘要:
Method of data processing for securing local resources in a mobile device (100), the method comprising: a) when network connectivity is available: - coupling the mobile device (100) with a first identity module (7) associated to a first International Mobile Subscriber Identity (IMSI), - receiving in the first identity module (7) a network challenge from a communication network, ciphering the network challenge using a secret key, and sending a corresponding response to the network for subsequent successful authentication,
b) after a successful authentication to the communication network: - associating at least a part of the local resources to the first IMSI, and - storing, in a database (16) of the mobile device (100), authentication data related to the challenge/response duplet, - granting access to local resources associated to the first IMSI,
c) when network connectivity is not available: - coupling the mobile device (100) with a second identity module associated to a second IMSI, - sending a challenge to the second identity module, said challenge being determined from the authentication data stored in the database (16), - receiving a response from the second identity module, - comparing the response received with the stored authentication data, and granting access to local resources associated to the second IMSI if the response received from the second identity module matches a response associated to the sent challenge in the database (16).
摘要:
A method of and a network entity for controlling traffic in a network, comprising: identifying the presence of undesirable traffic in the network; determining the route taken by the undesirable traffic through the network from the source of an attack to the target of the attack according to a topology of the network; identifying any operable attack mitigation entities present in the route taken by the undesirable traffic; selecting, according to a predetermined criteria, at least one optimal operable mitigation entity from among the identified mitigation entities for disrupting the flow of the malicious traffic to the target; and requesting the at least one optimal mitigation entity to act to disrupt the flow of the malicious traffic to the target.
摘要:
Method of operating a communication device offering a plurality of features (10) by means of a plurality of virtual machines (8) which run on a virtualized representation of a plurality of hardware components (6). The method comprises: obtaining a mapping (12,13,14,15) between at least some features of said plurality of features and corresponding sets of virtual machines of said plurality of virtual machines and hardware components of said plurality of hardware components which are required to enable said features; and upon deciding to activate or deactivate at least one group of features of said plurality of features, switching on or off virtual machines of said plurality of virtual machines and hardware components of said plurality of hardware components depending on said mapping.
摘要:
Ce serveur d'application (SA) comportant : - des moyens (10) pour définir au moins une phase (Pi) d'une conférence téléphonique et la liste les terminaux (Tij, Tik) devant rejoindre la conférence à cette phase (Pi) ; et - des moyens (11) de séquencement aptes à déclencher, préalablement au démarrage de chacune desdites phases (Pi), l'envoi d'une commande (JOIN) à chacun des terminaux (Tij) devant rejoindre la conférence téléphonique au début de la phase (Pi), l'exécution de ladite commande (JOIN) par ledit terminal (Tij) générant un appel téléphonique (APP) du terminal (Tij) vers un pont de conférence (PC) apte à connecter ledit terminal (Tij) à la conférence sur réception d'un appel téléphonique (APP) en provenance de ce terminal (Tij).
摘要:
The invention relates to a mobile station connectable to a source IP access network and a target IP access network, the source IP access network and the target IP access network being connected to a mobile core network via a generic access network controller (GANC), the method comprising: register request means for requesting registration with a first GAN controller governing a bridge between the source IP access network and the mobile core network, the register request means being operable to request registration with a second GAN controller governing a bridge between the target IP access network and the mobile core network while the mobile station is registered with the first GAN controller, connection means for disconnecting from the source IP access network and connecting to the target IP access network; and deregister means for de-registering from the first GAN controller.