摘要:
A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second security key is generated differ by less than a non-zero predetermined amount. The second security key may be generated from the second value rounded to a multiple of a rounding interval that is nearest to the second value. The rounding information may include a rounding direction indication. The rounding direction indication may indicate the direction in which the second value is rounded to the multiple of the rounding interval nearest to the second value.
摘要:
A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second security key is generated differ by less than a non-zero predetermined amount. The second security key may be generated from the second value rounded to a multiple of a rounding interval that is nearest to the second value. The rounding information may include a rounding direction indication. The rounding direction indication may indicate the direction in which the second value is rounded to the multiple of the rounding interval nearest to the second value.
摘要:
A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may receive a license key, where the license key is evidence of a purchased product license. The node may transmit a message included in the license key to a certificate authority. The node may receive a certificate from the certificate authority in response to authentication of the message. The node may be identified in the P2P network with a node identifier included in the certificate.
摘要:
A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may receive a license key, where the license key is evidence of a purchased product license. The node may transmit a message included in the license key to a certificate authority. The node may receive a certificate from the certificate authority in response to authentication of the message. The node may be identified in the P2P network with a node identifier included in the certificate.
摘要:
In one example embodiment, an apparatus includes a policy repository for storing a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. Another example embodiment includes an apparatus including a processor operable to evaluate a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. The processor is further operable to execute a decision for the subscriber based on the evaluation of the policy.
摘要:
Performing deep packet inspection (DPI) includes facilitating a communication session for an access terminal. The access terminal is associated with a home network. A DPI policy is installed at an edge router. The DPI policy includes one or more DPI facets, where a DPI facet comprises a packet classifier. Packets that match the packet classifier are detected and inspected in accordance with the DPI facets.
摘要:
A methodology includes servicing a voice call between mobile User Equipment and an Enterprise Session Initiation Protocol (SIP) Services Environment using, at least in part, Voice over Internet Protocol Multimedia Subsystem (VoIMS), detecting that the User Equipment is moving out of range of Radio Access Point (RAP) infrastructure servicing the User Equipment, and in response to detecting, initiating a procedure to hand out the voice call and anchor the voice call in a Mobile Switching Center (MSC) of a macro service provider.
摘要:
In one embodiment, a reservation proxy monitors for received connectivity check messages or beginning-of-media-flow indication messages. When either type of message is observed, the reservation proxy requests resource allocation for a media flow associated with the received message. The amount of resource allocation requested may be coordinated by exchanging messages with a call controller or policy server for one of the endpoints of the media flow, or the amount of resource allocation may be identified within the received message.
摘要:
A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more application layer elements. The method includes receiving accounting data from one or more lower layer elements, such that the accounting data is associated with the policy data. The method also includes consolidating the accounting data and the policy data received.
摘要:
Methods among nodes of a computer network for establishing a connection between the server and the client. A client node sends a session-invitation message to a server node. The session-invitation message is in a first protocol that establishes a channel between the client and the server according to parameters of the session-invitation message that specify characteristics of session in a second protocol. The server receives the session-invitation message, sends a provisional response back to the client, and holds in abeyance a success or failure response to the session-invitation, without establishing a channel at the level of the first protocol if no such channel is previously established, and without disrupting a channel at the level of the first protocol if such channel has been previously established.