Abstract:
A network device may include a memory storing instructions and processor configured to execute the instructions to receive, from a first service provider, a file transfer request that includes at least a network location corresponding to a file to be transferred; determine whether the network location is internal or external to a second service provider network to which the network device belongs; modify the network location when it is determined that the network location included in the file transfer request is external to the second service provider network; retrieve the file to be transferred using the modified network location; and forward the retrieved file to a terminating user equipment (UE) device.
Abstract:
A method, a device, and a non-transitory storage medium having instructions to establish a web connection with a user device and provide access to a carrier-grade network in support of a Web Real Time Communication (WebRTC) session; obtain service data that includes data pertaining to a user of the user device; assign a level of trustworthiness to the service data; generate a message, wherein the message includes a request to initiate the WebRTC session; package the service data in the message based on the level of trustworthiness; and transmit the message to another device.
Abstract:
In some implementations, a device may receive a session initiation protocol (SIP) message. The device may determine that the SIP message does not include a parameter indicating that a first portion of the SIP message is to be processed as a telephone number. The device may perform one or more actions including one or more of: determining whether a second portion of the SIP message includes information identifying a service; determining whether the first portion of the SIP message includes a code; determining whether the first portion of the SIP message is formatted according to a format associated with a telephone number; or determining whether the first portion of the SIP message includes characters that are different than hexadecimal characters. The device may selectively cause the SIP message to be routed using the first portion of the SIP message or routed using the second portion of the SIP message.
Abstract:
A network device may include a memory storing instructions and processor configured to execute the instructions to receive a file transfer request that includes at least a network location corresponding to a file to be transferred; determine whether the network location is internal or external to a network to which the network device belongs; modify the network location when it is determined that the network location included in the file transfer request is external to the network; and retrieve the file to be transferred using the modified network location.
Abstract:
A network device may include a memory storing instructions and processor configured to execute the instructions to receive a file transfer request that includes at least a network location corresponding to a file to be transferred; determine whether the network location is internal or external to a network to which the network device belongs; modify the network location when it is determined that the network location included in the file transfer request is external to the network; and retrieve the file to be transferred using the modified network location.
Abstract:
A method, a device, and a non-transitory storage medium having instructions to establish a web connection with a user device and provide access to a carrier-grade network in support of a Web Real Time Communication (WebRTC) session; obtain service data that includes data pertaining to a user of the user device; assign a level of trustworthiness to the service data; generate a message, wherein the message includes a request to initiate the WebRTC session; package the service data in the message based on the level of trustworthiness; and transmit the message to another device.
Abstract:
A network traffic monitoring system detects an identity associated with a telephone call that enters a network and queries a first identity source list that includes entries representative of illegitimate identities and a second identity source list that includes entries representative of legitimate identities to determine whether the detected identity associated with the telephone call matches an entry included in the first identity source list or an entry included in the second identity source list. If the detected identity matches the entry included in the first identity source list, the network traffic monitoring system automatically determines that the detected identity is fake. If the detected identity matches the entry included in the second identity source list, the network traffic monitoring system analyzes one or more attributes of the telephone call other than the detected identity to determine whether the detected identity is fake.