摘要:
A method, performed by a first mobility management entity (MME) device in a network, includes receiving, from a second MME device, standby database information associated with user equipment (UE) registered with the second MME device; detecting that the second MME device has failed or lost connectivity; designating that the UEs registered with the second MME device will be registered with the first MME device, in response to detecting that the second MME device has failed or lost connectivity; detecting a request to activate a particular UE registered with the second MME device; and paging the particular UE to register with the first MME device, using the standby database information and in response to detecting the request to activate the particular UE.
摘要:
A device detects an impermissible behavior by a user device. The device further identifies a rule associated with the impermissible behavior and executes a response to the impermissible behavior based on the rule. The response restricts access of the user device to a service provided by or via a network device. The device also transmits, to the user device, a message that specifies the response. The device also verifies a termination of a cause of the impermissible behavior and restores the access of the user device to the service.
摘要:
A monitoring device may determine an application to monitor, may determine a parameter to monitor, where the parameter is associated with at least one of a network or a device, may determine user devices from which to collect the parameter, and may transmit, to the user devices, information that identifies the application and information that identifies the parameter. The monitoring device may receive, from the user devices, information that identifies values of the parameter, may analyze the values of the parameter, may determine, based on the analysis, that the application is a cause of a problem associated with the network or the device. The monitoring device may perform an action based on determining that the application is a cause of the problem.
摘要:
A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network.
摘要:
A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy.
摘要:
Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack.
摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.
摘要:
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device.
摘要:
A system may receive, from a user device, a request to receive content via a first base station, where the content was previously being received, as multicast content, via a second base station; determine, in response to the request, whether the first base station can process multicast content; transmit a copy of the content, to the user device via the first base station, as multicast content, based on a determination that the first base station can process multicast content; and transmit the content, to the user device via the first base station, as unicast content, based on a determination that the first base station cannot process multicast content.
摘要:
A method performed by a device includes detecting a first condition to generate a report record associated with the device; generating the report record associated with the device, in response to detecting the first condition, where generating the report record includes recording environment conditions associated with the device, recording device conditions associated with the device, and recording signal conditions associated with the device; detecting a second condition to send the generated report record to a server device; and sending the generated report record to the server device, in response to detecting the second condition.