摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.
摘要:
A routing system coupled to a label switching network receives a pool of network addresses allocated to a mobility region in the network, where the pool of network addresses includes a sequence of contiguous network addresses. The routing system stores the pool of network addresses, and allocates a range of mobility labels to the network address pool for use in communicating with mobile nodes in the mobility region.
摘要:
An exemplary system and method are directed at the selective delivery of communications messages. The selective delivery may comprise receiving a communications message from a network device; determining an identifier associated with the communications message; determining whether a subscriber is blocked from receiving the communications message based at least in part on the identifier; and selectively delivering the communications message to the subscriber based on the determination.
摘要:
A system and methods include generating an optical time domain reflectrometry signal; transmitting the optical time domain reflectrometry signal on a first fiber path in a first direction through at least one optical amplifier; receiving a reflection of the optical time domain reflectrometry signal on the first fiber path in a second direction opposite the first direction; transmitting the reflected optical time domain reflectrometry signal on a second fiber path in the second direction, where the second fiber path is not the first fiber path; and determining a location of a fault on the first fiber path based on the reflected optical time domain reflectrometry signal.
摘要:
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device.
摘要:
A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmits, using a first channel over a wireless network, the first set of packets, and transmits, using a second channel over the wireless network, the second set of packets. The receiving access point receives the first set of packets and the second set of packets, decrypts the first set of packets using the first encryption protocol, and decrypts the second set of packets using the second encryption protocol.