摘要:
An embodiment of the invention allows a network access server to control network access for individual applications that run on a device. The device may be included in a machine-to-machine environment. The embodiment may provide a secure channel between the network access server and the device access layer and another secure channel between the device access layer and the device application layer. Thus, before applications are allowed to access the network those applications may be required to authenticate themselves via a secure channel. Other embodiments are described herein.
摘要:
An apparatus may include a processor circuit and a machine type communication (MTC) device setup module operable on the processor circuit to determine when the apparatus is provisioned with a subscription to a local network, and to provide a device setup interface to automatically connect the apparatus to a machine type communication (MTC) subscriber independently of an operator of the local network. Other embodiments are disclosed and claimed.
摘要:
A method, system, and device for determining client-based user behavioral analytics includes monitoring for a predetermined behavioral event on a computing device. The predetermined behavioral event may be embodied as any event initiated by the user on the computing device such as the purchase of a product, selection of a web link, navigation to a website, etc. In response to an occurrence of the predetermined behavioral event, an affinity metric and an avidity metric are determined based on a frequency of the occurrences of the predetermined behavioral event. A behavioral index for the user is determined based on the affinity metric and the avidity metric. Additionally, in response to receiving a request for the behavioral index, the computing device may transmit the behavioral index to a content provider server or other remote computer and receive content from the content provider, which has been selected based on the user's behavioral index.
摘要:
An embodiment of the invention allows a network access server to control network access for individual applications that run on a device. The device may be included in a machine-to-machine environment. The embodiment may provide a secure channel between the network access server and the device access layer and another secure channel between the device access layer and the device application layer. Thus, before applications are allowed to access the network those applications may be required to authenticate themselves via a secure channel. Other embodiments are described herein.
摘要:
Integrity management architecture is extended with trusted hash provisioning. The trusted hash provisioning ensures the integrity of a computing device. Thus, a multipurpose device can be as secure as a dedicated single-purpose device. The trusted hash provisioning includes determining a hash mask, and computing a trusted hash computation based on signatures of components identified as included within the scope of the hash. The computed trusted hash computation is used to determine integrity of the computing device.
摘要:
A method, system, and device for determining client-based user behavioral analytics includes monitoring for a predetermined behavioral event on a computing device. The predetermined behavioral event may be embodied as any event initiated by the user on the computing device such as the purchase of a product, selection of a web link, navigation to a website, etc. In response to an occurrence of the predetermined behavioral event, an affinity metric and an avidity metric are determined based on a frequency of the occurrences of the predetermined behavioral event. A behavioral index for the user is determined based on the affinity metric and the avidity metric. Additionally, in response to receiving a request for the behavioral index, the computing device may transmit the behavioral index to a content provider server or other remote computer and receive content from the content provider, which has been selected based on the user's behavioral index.
摘要:
A system and method for aggregating subscriber information at a delivery edge is disclosed. The method comprises interfacing a user profile aggregation device (UPAD) at a subscriber location with at least one subscriber database in each of a wired network core and a wireless network core. The wired network core and the wireless network core are operated by a Multi-System network Operator. Profile information can be aggregated at the UPAD about the subscriber from at least one database in the wired network core and the wireless network core. The subscriber's aggregated profile information can be communicated to the MSO.
摘要:
Technologies for bridging between coarse-grained and fine-grained load balancing include a computing node of a cluster computing device and a network controller. The computing node may add a flow entry to a local flow table based on flow information received from the network controller. The computing node may transmit a multicast network packet including the flow information and next hop information to other computing nodes of the cluster device. The computing node may also add a different flow entry to the local flow table and a next hop entry to a local next hop table based on a multicast network packet received from another computing node of the cluster device. The computing node may locally process a network packet received from a remote computing device or forward the received network packet to another computing node of the cluster device based on the flow entries added to the local flow table.
摘要:
A system and method for aggregating subscriber information at a delivery edge is disclosed. The method comprises interfacing a user profile aggregation device (UPAD) at a subscriber location with at least one subscriber database in each of a wired network core and a wireless network core. The wired network core and the wireless network core are operated by a Multi-System network Operator. Profile information can be aggregated at the UPAD about the subscriber from at least one database in the wired network core and the wireless network core. The subscriber's aggregated profile information can be communicated to the MSO.
摘要:
Embodiments may comprise logic such as hardware and/or code to provide a secure device area network. Many embodiments comprise a gateway node or enterprise enhanced node with a services distribution frame installed on a customer's premises. The gateway node or enterprise enhanced node may interconnect the secure wireless device area network at the customer's premises with a cellular network. In many embodiments, the cellular network core may provision authentication credentials and security keys, and manage access polies to facilitate access by Application Service Providers to devices on premises including smart devices via a security and policy enforcement function of a services distribution frame of the gateway node or enterprise enhanced node, Authorized members of the secure wireless device area network may connect to the Wide Area Network (WAN) through the gateway node and the cellular network core.