System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data
    21.
    发明申请
    System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data 有权
    接收到的互联网数据,视频数据和语音数据中问题检测的系统和方法

    公开(公告)号:US20110107386A1

    公开(公告)日:2011-05-05

    申请号:US12609172

    申请日:2009-10-30

    IPC分类号: H04N7/173 H04N17/00

    摘要: Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem.

    摘要翻译: 公开了与接收到的因特网数据,视频数据和语音数据有关的问题检测的方法和系统。 方法可以包括在机顶盒设备处监视因特网数据以检测与因特网数据相关的第一个问题。 该方法还可以包括在机顶盒设备处监视视频数据以检测与视频数据相关的第二个问题。 该方法可以包括在检测到第一问题时自动采取第一动作,并且在检测到第二个问题时自动采取第二动作。

    METHOD AND APPARATUS FOR PROVIDING NETWORK BASED END-DEVICE PROTECTION
    22.
    发明申请
    METHOD AND APPARATUS FOR PROVIDING NETWORK BASED END-DEVICE PROTECTION 审中-公开
    用于提供基于网络的终端设备保护的方法和装置

    公开(公告)号:US20080101223A1

    公开(公告)日:2008-05-01

    申请号:US11554464

    申请日:2006-10-30

    IPC分类号: H04L12/26

    CPC分类号: H04L63/145

    摘要: A method and apparatus for providing network based end-device protection on networks are disclosed. For example, the present method receives one or more packets, wherein the one or more packets are destined to a protected end-device (or the one or more packets are received from the protected end-device). The method then determines a type of operating system that is used by the protected end-device and then processes the one or more packets for the protected end-device in a virtual machine emulating the operating system, where the virtual machine is deployed in a communication network. Finally, the method determines whether the one or more packets processed in the virtual machine comprises at least one malicious packet.

    摘要翻译: 公开了一种在网络上提供基于网络的终端设备保护的方法和装置。 例如,本方法接收一个或多个分组,其中一个或多个分组指向受保护的终端设备(或者从受保护的终端设备接收到一个或多个分组)。 该方法然后确定受保护的终端设备使用的操作系统的类型,然后在仿真操作系统的虚拟机中处理受保护的终端设备的一个或多个分组,其中虚拟机部署在通信中 网络。 最后,该方法确定在虚拟机中处理的一个或多个分组是否包括至少一个恶意分组。

    Methods and apparatus to configure virtual private mobile networks
    23.
    发明授权
    Methods and apparatus to configure virtual private mobile networks 有权
    配置虚拟专用移动网络的方法和设备

    公开(公告)号:US08509169B2

    公开(公告)日:2013-08-13

    申请号:US12966681

    申请日:2010-12-13

    IPC分类号: H04W84/02

    CPC分类号: H04W84/02 H04W24/02 H04W88/18

    摘要: Methods and apparatus to configure virtual private mobile networks are disclosed. A disclosed example method includes receiving a request at a wireless network provider from a client, the request instructing the wireless network provider to create the virtual private mobile network for the client, identifying available network elements within a wireless network of the wireless network provider based on the request from the client, configuring a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network, and enabling user equipment associated with the client to wirelessly communicatively couple to the virtual private mobile network.

    摘要翻译: 公开了配置虚拟专用移动网络的方法和装置。 所公开的示例性方法包括从客户端在无线网络提供商处接收请求,该请求指示无线网络提供商为客户端创建虚拟专用移动网络,基于无线网络提供商的无线网络识别可用网络元件 来自客户端的请求,配置用于虚拟专用移动网络的所识别的网络元件的控制平面的一部分和数据平面的一部分,以及使与客户端相关联的用户设备无线通信地耦合到虚拟专用移动网络 。

    METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS
    26.
    发明申请
    METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS 有权
    构建虚拟私有移动网络的方法和设备

    公开(公告)号:US20120147824A1

    公开(公告)日:2012-06-14

    申请号:US12966681

    申请日:2010-12-13

    IPC分类号: H04W84/02 H04W72/04

    CPC分类号: H04W84/02 H04W24/02 H04W88/18

    摘要: Methods and apparatus to configure virtual private mobile networks are disclosed. A disclosed example method includes receiving a request at a wireless network provider from a client, the request instructing the wireless network provider to create the virtual private mobile network for the client, identifying available network elements within a wireless network of the wireless network provider based on the request from the client, configuring a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network, and enabling user equipment associated with the client to wirelessly communicatively couple to the virtual private mobile network.

    摘要翻译: 公开了配置虚拟专用移动网络的方法和装置。 所公开的示例性方法包括从客户端在无线网络提供商处接收请求,该请求指示无线网络提供商为客户端创建虚拟专用移动网络,基于无线网络提供商的无线网络识别可用网络元件 来自客户端的请求,配置用于虚拟专用移动网络的所识别的网络元件的控制平面的一部分和数据平面的一部分,以及使与客户端相关联的用户设备无线通信地耦合到虚拟专用移动网络 。

    Method and System for Content Distribution Network Security
    27.
    发明申请
    Method and System for Content Distribution Network Security 有权
    内容分发网络安全的方法和系统

    公开(公告)号:US20110138467A1

    公开(公告)日:2011-06-09

    申请号:US12632966

    申请日:2009-12-08

    IPC分类号: G06F21/00

    摘要: A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.

    摘要翻译: 内容传送系统包括上传模块,内容传递模块和监视模块。 上传模块被配置为从内容提供商接收内容,检测包含恶意软件或专有信息的内容,并将该内容的信息提供给监控模块。 所述内容传递模块被配置为检测包含恶意软件或未经授权的更改的内容,检测对所述内容传递模块的操作改变,向所述监控模块提供关于所述内容的信息和所述操作改变,从所述客户端系统接收对所述内容的请求, 并向客户端系统提供内容。 监视模块被配置为监视网络以获得潜在的恶意流量,从内容传递模块和上传模块接收信息,将信息和潜在恶意流量相关联以识别安全事件,并触发对安全事件的响应。

    Devices, systems, and methods for detecting proximity-based mobile propagation
    29.
    发明授权
    Devices, systems, and methods for detecting proximity-based mobile propagation 有权
    用于检测基于邻近度的移动传播的设备,系统和方法

    公开(公告)号:US08763126B2

    公开(公告)日:2014-06-24

    申请号:US12963617

    申请日:2010-12-08

    IPC分类号: G06F21/00

    摘要: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.

    摘要翻译: 公开了设备,系统和方法。 代理驻留在移动通信设备中。 代理检测基于邻近的移动恶意软件传播。 代理在候选连接列表中注入一个或多个触发网络连接。 这些连接显示为合法的网络和设备,而是触发与服务提供商网络上的代理服务器的连接。 通过尝试通过触发网络连接进行连接,恶意软件显示本身。本地区恶意软件爆发后,系统将在短时间内收集恶意软件签名,但这种攻击通常会绕过网络中的网络安全检查。