Approach to secure localization in wireless networks
    1.
    发明授权
    Approach to secure localization in wireless networks 有权
    确保无线网络本地化的方法

    公开(公告)号:US08145236B2

    公开(公告)日:2012-03-27

    申请号:US12196029

    申请日:2008-08-21

    IPC分类号: H04W24/00

    摘要: Embodiments of the present invention disclose a secure localization infrastructure using transmitters that can transmit messages at multiple distinct power levels throughout a community of reference points. Transmitters send messages at different power levels in a manner that every location in the system corresponds to a unique set of messages. Received messages are reported back to the localization infrastructure, which then determines location by comparing the messages reported.

    摘要翻译: 本发明的实施例公开了一种使用发射机的安全定位基础设施,该发射机可以在整个参考点社区中以多个不同的功率电平发送消息 发射机以不同功率级别发送消息,使得系统中的每个位置都对应一组唯一的消息。 接收到的消息被报告回本地化基础设施,然后通过比较报告的消息来确定位置。

    APPROACH TO SECURE LOCALIZATION IN WIRELESS NETWORKS
    2.
    发明申请
    APPROACH TO SECURE LOCALIZATION IN WIRELESS NETWORKS 有权
    安全无线网络本地化的方法

    公开(公告)号:US20090186602A1

    公开(公告)日:2009-07-23

    申请号:US12196029

    申请日:2008-08-21

    IPC分类号: H04L12/58

    摘要: Embodiments of the present invention disclose a secure localization infrastructure using transmitters that can transmit messages at multiple distinct power levels throughout a community of reference points. Transmitters send messages at different power levels in a manner that every location in the system corresponds to a unique set of messages. Received messages are reported back to the localization infrastructure, which then determines location by comparing the messages reported.

    摘要翻译: 本发明的实施例公开了一种使用发射机的安全定位基础设施,该发射机可以在整个参考点社区中以多个不同的功率电平发送消息 发射机以不同功率级别发送消息,使得系统中的每个位置都对应一组唯一的消息。 接收到的消息被报告回本地化基础设施,然后通过比较报告的消息来确定位置。

    Method, Apparatus and Program for Detecting Spoofed Network Traffic
    4.
    发明申请
    Method, Apparatus and Program for Detecting Spoofed Network Traffic 有权
    用于检测欺骗性网络流量的方法,装置和程序

    公开(公告)号:US20130125235A1

    公开(公告)日:2013-05-16

    申请号:US13295553

    申请日:2011-11-14

    IPC分类号: G06F21/20

    CPC分类号: G06F21/00 H04L63/1466

    摘要: A method, an apparatus and a program for detecting spoofed Internet Protocol (IP) traffic directed to a network having a plurality of autonomous systems (AS) is provided. The method comprises receiving an incoming packet through an AS, the incoming packet containing a source IP address and a destination IP address, acquiring a corresponding source and destination IP address prefixes, converting the corresponding source and destination IP address prefixes into a source AS number and a destination AS number, determining if the incoming packet arrived from an unexpected source based upon the corresponding destination IP address prefix and the converted source and destination AS number using an unexpected pair tuple table generated from network routing information and generating an alert indicating that the incoming packet is not allowed to enter the network.

    摘要翻译: 提供了一种用于检测针对具有多个自治系统(AS)的网络的欺骗性因特网协议(IP)流量的方法,装置和程序。 该方法包括:通过AS接收输入的分组,该分组包含源IP地址和目的IP地址,获取相应的源和目的IP地址前缀,将相应的源和目的IP地址前缀转换为源AS号, 目的AS号码,根据网络路由信息生成表示基于相应的目的地IP地址前缀和转换后的源和目的地AS号码,确定传入分组是否从意外的源到达,并产生一个警报, 数据包不允许进入网络。

    Local area network resource manager
    5.
    发明授权
    Local area network resource manager 有权
    局域网资源管理员

    公开(公告)号:US07349378B2

    公开(公告)日:2008-03-25

    申请号:US10370719

    申请日:2003-02-24

    IPC分类号: H04Q7/24 H04L12/43 H04J3/16

    摘要: Aspects of the invention provide a method and system for managing or coordinating data transmission in a Local Area Network (LAN) such that Quality of Service (QoS) concerns are met. A LAN resource manager (LRM) is provided for managing the LAN resources by providing solutions for providing users with several levels of QoS. Once the LRM admits a user at a certain QoS level, the level is assured within the LAN for as long as the user is in the LAN. A user may submit a request to transmit data to the LRM. The LRM may determine if time allocation is possible and allocate the time slots for data transmission. The LRM may send time slot allocation information to an Access Server in a LAN, which may inform the user of the time slot allocation and prepare a queue according to the slot allocation information.

    摘要翻译: 本发明的方面提供了一种用于管理或协调局域网(LAN)中的数据传输的方法和系统,使得满足服务质量(QoS)关注。 提供LAN资源管理器(LRM),用于通过为用户提供多个QoS级别的解决方案来管理LAN资源。 一旦LRM以某个QoS级别承认用户,只要用户在LAN中,该级别就可以在LAN内得到保证。 用户可以向LRM提交发送数据的请求。 LRM可以确定时间分配是否可能并且分配用于数据传输的时隙。 LRM可以向LAN中的接入服务器发送时隙分配信息,这可以通知用户时隙分配,并根据时隙分配信息准备一个队列。

    METHOD AND APPARATUS FOR DETECTING SPOOFED NETWORK TRAFFIC
    6.
    发明申请
    METHOD AND APPARATUS FOR DETECTING SPOOFED NETWORK TRAFFIC 有权
    检测网络交通流量的方法和装置

    公开(公告)号:US20110271340A1

    公开(公告)日:2011-11-03

    申请号:US12769696

    申请日:2010-04-29

    IPC分类号: G06F21/00

    CPC分类号: H04L63/1416

    摘要: A method and apparatus for detecting spoofed IP network traffic is presented. A mapping table is created to indicate correlations between IP address prefixes and AS numbers, based on routing information collected from a plurality of data sources. At each interface of a target network, IP address prefixes from a training traffic flow are acquired and further converted into AS numbers based on the mapping table. An EAS (Expected Autonomous System) table is populated by the AS numbers collected for each interface. The EAS table is used to determine if an operation traffic flow is allowed to enter the network.

    摘要翻译: 提出了一种用于检测欺骗性IP网络流量的方法和装置。 基于从多个数据源收集的路由信息​​,创建映射表以指示IP地址前缀和AS号之间的相关性。 在目标网络的每个接口处,获取来自训练业务流的IP地址前缀,并根据映射表进一步转换成AS号。 EAS(预期自治系统)表由每个接口收集的AS号码填充。 EAS表用于确定操作流量是否允许进入网络。

    Method and system for feature interaction detection in a telecommunication network
    8.
    发明授权
    Method and system for feature interaction detection in a telecommunication network 失效
    电信网络中特征交互检测的方法和系统

    公开(公告)号:US06185519B2

    公开(公告)日:2001-02-06

    申请号:US09204019

    申请日:1998-12-01

    IPC分类号: G06N500

    CPC分类号: H04Q3/0041

    摘要: Methods and systems disclosed efficiently detect potential interactions between features in a telecommunications network. The methods and systems specify AIN (Advanced Intelligent Network) and switch-based features and detect their interactions when present within a feature package provided to a single subscriber. The methodology supports the assumption that each feature is created without the knowledge of other features, and that each feature is specified as a “black box,” i.e., nothing is known about its internal logic except its input/output behaviors. The invention models a call environment, models two or more features, and combines the call variable usage for each feature. Methods then compare the combined call variable usages to detect potential feature interactions. The invention assists a service mediator in the tasks of detecting potential interactions among AIN features provided by different third party service providers, and detecting potential interactions between a third party service provider's AIN features and switch-based features.

    摘要翻译: 公开的方法和系统有效地检测电信网络中的特征之间的潜在交互。 该方法和系统指定AIN(高级智能网络)和基于交换机的功能,并在提供给单个用户的功能包中存在时检测其交互。 该方法支持假设每个特征是在没有其他特征的知识的情况下创建的,并且每个特征被指定为“黑匣子”,即,除了其输入/输出行为之外,其内部逻辑除外。 本发明建模一个呼叫环境,建立两个或多个特征,并组合每个功能的呼叫变量使用。 然后,方法比较组合的调用变量用法以检测潜在的特征相互作用。 本发明有助于服务调解员检测由不同第三方服务提供商提供的AIN特征之间的潜在交互,并检测第三方服务提供商的AIN特征和基于交换机的功能之间的潜在交互。

    SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES
    10.
    发明申请
    SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES 有权
    用于从网络流量数据配置文件进行垃圾邮件主机检测的系统和方法

    公开(公告)号:US20140020066A1

    公开(公告)日:2014-01-16

    申请号:US13547174

    申请日:2012-07-12

    IPC分类号: H04L29/06

    摘要: A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.

    摘要翻译: 用于从网络流数据简档发送垃圾邮件主机检测的系统和方法包括构建一个或多个集群简档并检测垃圾邮件发送者主机。 构建集群配置文件包括观察来自一个或多个主机的网络流数据; 对于每个主机,将与主机相关联的网络流数据表示为多维向量; 将主机的向量聚类成多个集群简档; 使用黑名单和白名单中的至少一个来标注每个群集简档; 并计算每个聚类配置文件注释的置信度。 检测垃圾邮件发送者主机包括观察来自新主机的网络流数据; 将与新主机相关联的网络流数据表示为多维向量,以及将新主机的新多维向量放置到一个或多个集群简档的一个集群简档中。