摘要:
A communication system having a policy server coupled to a communications network for managing secure communication with and among end instruments (EI). The EI comprises a memory, and a processor coupled to the memory with processor-executable instructions, including instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy for the EI. Security policies can intercept calls to an operating system kernel and for each call, determining whether the call is allowed under the security policy(ies). Policies are stored in a policy library and transmitted to an EI over a wireless communication network.
摘要:
A communication system having a policy server coupled to a communications network for managing secure communication with and among end instruments (EI). The EI comprises a memory, and a processor coupled to the memory with processor-executable instructions, including instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy for the EI. Security policies can intercept calls to an operating system kernel and for each call, determining whether the call is allowed under the security policy(ies). Policies are stored in a policy library and transmitted to an EI over a wireless communication network.
摘要:
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system. Biomorphing algorithms allow for system uniqueness to be derived over time further enhancing security of SSEs.
摘要:
A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system. Biomorphing algorithms allow for system uniqueness to be derived over time further enhancing security of SSEs
摘要:
A method and apparatus for resisting malicious code in a computing device. A software component corresponding to an operating system kernel is analyzed prior to executing the software component to detect the presence of one or more specific instructions such as malicious code, a change in mode permissions or instructions to modify or turn off security monitoring software, and taking a graduated action in response to the detection of one or more specific instructions. The graduated action taken is specified by a security policy (or policies) stored on the computing device. The analyzing may include off-line scanning of a particular code or portion of code for certain instructions, op codes, or patterns, and includes scanning in real-time as the kernel or kernel module is loading while the code being scanned is not yet executing (i.e., it is not yet “on-line”). Analysis of other code proceeds according to policies.
摘要:
A system and method for locating a portable locator device in a communications network. The portable locator unit (PLU) (4) is activated either by an external signal (62) generated in response to remote activation source, such as a subscriber (6, 8) or PLU detector (106, 108), or by an internal activation signal triggered e.g. by the wearer. Once activated, the PLU (4) transmits a location signal (66). This location signal (66) is received by one or more network service nodes (20, 22, 24) which forward the information along with identifying service node information to a network location processor (26, 28). After having determined the location of the PLU (4) from the received information, the network location processor (26, 28) forwards this information to a designated source, such as the requesting subscriber or other authorized user (6, 8).
摘要:
A method and apparatus for multiplexing a plurality of communication signals where the communication signals may operate using different protocols is provided. A communication node (102) that is a part of a communications system or network (100) is provided. The access point includes a transceiver (202, 204) for transmitting and receiving a first signal and a second signal wherein the first signal (410) is using a first protocol and the second signal (412) using a second protocol. The access point also includes a scheduler (208) for scheduling a transmit time for the first signal and for the second signal within a first frame (402, 404) and a receiving time for the first signal and for the second signal within a second frame (406, 408). A multiplexer (210) is also provided where the multiplexer combines the first signal and second signal in the first and second frames according to the scheduled transmit time and receive time.
摘要:
This invention provides a system and method for splitting control and media content signals of a cellular network connection of a mobile station. A mobile station engages in a WAP browsing session with a cellular network connection over an air interface. As a user moves into coverage area of an access point, another browsing session is established between the mobile station and a non-cellular network connection. More specifically, the user's WAP browsing session with a cellular network connection is upgraded to a Web browsing session with a non-cellular network connection. The present invention permits a user to control a Web browser on a remote device by providing user input to the mobile station. In particular, a media content portion of the cellular network connection is split and rerouted to the remote device, and a control portion of the cellular network connection is split and rerouted either via the non-cellular network connection or via the cellular network connection.
摘要:
A method and apparatus for multiplexing a plurality of communication signals where the communication signals may operate using different protocols is provided. A communication node (102) that is a part of a communications system or network (100) is provided. The access point includes a transceiver (202, 204) for transmitting and receiving a first signal and a second signal wherein the first signal (410) is using a first protocol and the second signal (412) using a second protocol. The access point also includes a scheduler (208) for scheduling a transmit time for the first signal and for the second signal within a first frame (402, 404) and a receiving time for the first signal and for the second signal within a second frame (406, 408). A multiplexer (210) is also provided where the multiplexer combines the first signal and second signal in the first and second frames according to the scheduled transmit time and receive time.
摘要:
A method and apparatus for multi-media communication includes transmitting a first session invite request (300) having a plurality of first call transaction identifiers (302), wherein each of the first call transaction identifiers (302) has a first call transaction value (303). Thereupon, the method and apparatus engages in a first communication session using the first session invite request (300). Concurrently, a second session invite request (400), having a plurality of second call transaction identifiers (402) having a second call transaction value (403), is also transmitted. A determination is made if the second session invite request (400) is duplicative by comparing the first and second call transaction values (303, 403) of the first and second call transaction identifiers (302, 402). A second communication session is engaged if the second session invite request (400) is not duplicative such that the first communication session and the second communication session create a multi-media session.