摘要:
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
摘要:
In various embodiments a traffic class manager is a resource within a virtualized computer systems trusted entity (e.g. a hypervisor, trusted partition, etc.) that maps requirements from a platform management and associated network capabilities onto an adapter (e.g. SR-IOV adapter, etc.) in order to appropriately allocate adapter and network resources to virtualized computer partitions. In various embodiments the traffic class manager defines network traffic classes that meet the objectives of a platform administrator based on the capabilities of the adapter and the network attached to the adapter ports. Once the traffic classes are defined, in various embodiments, the traffic class manager enforces the assignment of a traffic class to a virtual interface queue pair within a partition.
摘要:
In a wireless local area network (WLAN) and a channel selection method of a WLAN station, a station newly entering the WLAN captures packets from WLAN service channels, which packets are provided by at least one access point (AP) for a predetermined measuring time. The WLAN calculates, from the captured packets, busy factors indicative of the load on each WLAN service channel so as to confer a priority between WLAN service channels. The WLAN selects channels according to the conferred priority.
摘要:
A robust and reliable mechanism is disclosed for detecting whether a system has (or may have) been booted into a compromised or otherwise unprotected environment, so that a persisted clean file cache can be used across boots when appropriate. As such security scanning of files. A clean file cache can be maintained and used by a security application to avoid unnecessarily re-scanning a file that has not been modified since last being scanned and determined clean. Unnecessary scans are therefore avoided.
摘要:
A method (300) for a wireless telecommunication system (200) with user equipment, UE (110), and a first node (120) to which a UE may send a request for access to a service, and a control function (160) with information about the access rights to specific services for UEs in the system. The system (200) comprises an interface (150) between said first node (120) and the control function (160), and the method (300) comprises the step (3) of letting said first node receive information about a UE's access rights from said control function, and letting said first node handle access requests to a service from a UE using the access rights information from said control function. The method additionally comprises the step (3) of letting the access rights information from said control function to said first node comprise a code (X, Y, Z) regarding services to which the UE is denied access.
摘要:
In a network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information, the method includes the following steps: subjecting a plurality of packets of a multimedia session to signaling processing so as to obtain multimedia session information contained in the multimedia session, subjecting the multimedia session to a key authentication negotiation and according to the multimedia session information, making a determination to activate one of the software cryptographic module and the hardware cryptographic module. If the hardware cryptographic module is activated, the hardware cryptographic module performs network security processing of the packets of the multimedia session. If the software cryptographic module is activated, the software cryptographic module performs the network security processing of the packets of the multimedia session.
摘要:
In one embodiment, a method is provided that may include one or more operations. One of these operations may include partitioning, in response at least in part to a request from a remote authority, at least a portion of storage into partitions. The partitions may be in accordance, at least in part, with partitioning information from the remote authority. The partitioning information may associate sessions with the partitions. Many modifications, variations, and alternatives are possible without departing from this embodiment.
摘要:
A late binding code manager prevents the unauthorized loading of late binding code into a process. The late binding code manager detects an attempt to load late binding code into a process's address space. Subsequently, the late binding code manager determines whether a detected attempt to load late binding code into a process's address space is permitted. Responsive to the results of a determination as to whether an attempt to load late binding code into a process's address space is permitted, the late binding code manager executes at least one additional step affecting the loading of the late binding code into the process's address space. Such a step can comprise permitting, blocking or modifying the attempt to load the late binding code.
摘要:
The VoIP gateway in accordance with the present invention serves to send a connection request to either the IP network or the PSTN on the basis of the information stored in the VOIP gateway and the destination telephone number contained in the connection request as sent from the telephone terminal. Also, even if a connection request is decided to be sent to the IP network, the VOIP gateway sends the connection request to the PSTN when the IP network state judgment unit judges that the communication through the IP network is impossible. Furthermore, if a destination telephone number includes predetermined identification information, the VOIP gateway can forcibly send the connection request to the PSTN.
摘要:
The present invention relates to a secure transmission system and secure transmission method that securely transmit data stored in a computer to different computers via a Local Area Network or the Internet. The secure transmission system includes a virtual disk, configured to allow only an authorized application program module to gain an access and read, write and edit information data; and a secure communication application module including a user information generation means for generating intrinsic user information at the time of setting up the virtual disk, a user information storage means for storing the generated user information, an outgoing file management means for searching the virtual disk for information data to be sent and compressing the found information data, generating the header information of the information data in which user information about a sender and/or a recipient is contained, and adding the generated header information to the user information, an incoming file management means for reading the header information of received information data, decompressing compressed information data, and storing the decompressed information data on the virtual disk, and a file security means for encrypting and decrypting information data to be sent or received information data.