摘要:
A particular method includes receiving a request to access a secured wireless local network at a security device of the secured wireless local network from a wireless-enabled device that is not authorized to access the secured wireless local network when the request is received. The method includes receiving identification information from the wireless-enabled device at the security device. The method also includes automatically sending an access request message from the security device to at least one messaging address. The access request message provides a recipient of the access request message with at least a portion of the identification information and a selectable option to allow the wireless-enabled device access to the secured wireless local network without requiring user input of a network password associated with the secured wireless local network via the wireless-enabled device.
摘要:
An Internet Protocol (IP) usage pattern of a first computer system is monitored by a second computer system remotely located from the first computer system. Based on the monitoring, it is determined if the IP usage pattern is abnormal for the first computer system. If the IP usage pattern is abnormal, an alert signal is generated for the first computer system by the second computer system. The alert message indicates a potential presence of parasite software on the first computer system.
摘要:
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to compute a shared secret key based at least in part on a communication device (CD) private key and a cryptography algorithm, wherein the CD private key is stored in an identity module of the communication device and is unknown to an authentication center, and wherein the communication device is authenticated by the authentication center based at least in part on the shared secret key. Additional embodiments are disclosed.
摘要:
Methods and apparatus are disclosed to develop management rules for qualifying broadband services. An example method disclosed herein includes receiving a time period to analyze broadband network spectral compatibility, retrieving circuit operating metrics of a first and a second twisted copper pair circuit during the time period, and qualifying at least one of a first or a second plain old telephone system (POTS) twisted copper pair circuit for broadband services to determine the network spectral compatibility based on the operating metrics.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, a base station having a wireless transceiver operable in compliance with a Worldwide Interoperability for Microwave Access protocol, and a controller to manage the wireless transceiver. The controller can be operable to receive a request from a communication device to access the base station, and to direct the communication device to a second base station upon determining that granting wireless access to the communication device reduces an operating performance of the base station below an operating threshold of the base station. Additional embodiments are disclosed.
摘要:
An IP usage pattern of a first computer system is monitored by a second computer system that is remotely located from the first computer system. The second computer system is associated with an ISP. First parasite software may be identified based on an abnormal change in the IP usage pattern. The abnormal change in the IP usage pattern may be detected by comparing the IP usage pattern to a baseline model of IP usage for the first computer system. Anti-parasite software associated with the first parasite software may be forwarded from the ISP to the first computer system.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, a base station having a wireless transceiver operable in compliance with a Worldwide Interoperability for Microwave Access protocol, and a controller to manage the wireless transceiver. The controller can be operable to receive a request from a communication device to access the base station, and to direct the communication device to a second base station upon determining that granting wireless access to the communication device reduces an operating performance of the base station below an operating threshold of the base station. Additional embodiments are disclosed.
摘要:
An IP usage pattern of a first computer system is monitored by a second computer system that is remotely located from the first computer system. The second computer system is associated with an ISP. First parasite software may be identified based on an abnormal change in the IP usage pattern. The abnormal change in the IP usage pattern may be detected by comparing the IP usage pattern to a baseline model of IP usage for the first computer system. Anti-parasite software associated with the first parasite software may be forwarded from the ISP to the first computer system.
摘要:
A method and apparatus for managing services in a communication system is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a system having a collection element that receives a plurality of service component definitions associated with a corresponding plurality of services of a communication system, a service bundle generation element that generates a plurality of service bundles from the plurality of service component definitions, a policy element that determines a network configuration for each of the plurality of service bundles, a loop rate determination element that determines a data rate for a communication loop coupled to the communication system, and a service offering element that presents one or more service bundles selected from the plurality of service bundles according to the data rate. Additional embodiments are disclosed.
摘要:
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to compute a shared secret key based at least in part on a communication device (CD) private key and a cryptography algorithm, wherein the CD private key is stored in an identity module of the communication device and is unknown to an authentication center, and wherein the communication device is authenticated by the authentication center based at least in part on the shared secret key. Additional embodiments are disclosed.