摘要:
A device may include a processor. The processor may be configured to: assign, within a first wireless network, an access point name (APN) to a first gateway for a shared network. The first wireless network includes the first gateway. A second wireless network includes a second gateway for the shared network, and the second gateway is assigned the APN within the second network.
摘要:
A device may include a processor. The processor may be configured to: assign, within a first wireless network, an access point name (APN) to a first gateway for a shared network. The first wireless network includes the first gateway. A second wireless network includes a second gateway for the shared network, and the second gateway is assigned the APN within the second network.
摘要:
A reporting server receives reports on content items being accessed by a plurality of UE devices through a first multicast/broadcast single frequency network (MBSFN). The reporting server determines, for each content item being accessed, which of the UE devices is accessing the content item. The UE devices are then grouped by the accessed content items such that at least one content item is accessed by a first group of UE devices and not accessed by a second group of UE devices. The reporting server then sends data representing the first and second groups to a broadcast video provisioning system (BVPS) with a recommendation to split the MBSFN into second and third MBSFNs. In another implementation, the reporting server receives reports from fourth and fifth MBSFNs and recommends joining the fourth and fifth MBSFNs to form a sixth MBSFN if broadcast bandwidth requirements are met.
摘要:
A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security information. The security information may include device behavior information, traffic policy information, or device policy information. The security device may determine, based on the comparing, that a security threat exists with regard to the traffic; and take, based on determining that the security threat exists, remedial action with respect to the traffic. Taking the remedial action may include preventing the traffic from being forwarded to an intended destination associated with the traffic, providing an alert, regarding the security threat, to the particular user device, or providing an alert, regarding to the security threat, to another device.
摘要:
A server may be configured to receive behavior information associated with a user device. The behavior information may indicate a set of geographical locations at which the user device has been present. The server may generate a mode based on the behavior information. The mode may indicate a set of conditions based on which the mode is to be activated, and a set of information to be presented when the mode is activated. The server may output the mode to the user device. The user device may determine, after receiving the mode, that the set of conditions has been satisfied. The determining may be based on a geographical location of the user device. The user device may activate the mode, based on determining that the set of conditions has been satisfied; and may present at least a portion of the set of information, based on activating the mode.
摘要:
A mobile device may receive user input for requesting personal information for a subject in proximity of a mobile device and based on the user input, selecting one of available functions. The functions may include a first function for obtaining personal information using a first identifier. The functions may also include a second function for obtaining the personal information using the first identifier. The mobile device may output the personal information as an image to a display or as speech to speaker.
摘要:
A server may be configured to receive behavior information associated with a user device. The behavior information may indicate a set of geographical locations at which the user device has been present. The server may generate a mode based on the behavior information. The mode may indicate a set of conditions based on which the mode is to be activated, and a set of information to be presented when the mode is activated. The server may output the mode to the user device. The user device may determine, after receiving the mode, that the set of conditions has been satisfied. The determining may be based on a geographical location of the user device. The user device may activate the mode, based on determining that the set of conditions has been satisfied; and may present at least a portion of the set of information, based on activating the mode.
摘要:
A system may receive a content request associated with a user device. The content request may include information that identifies a subscriber associated with the user device and information that identifies a content provider associated with the content request. The system may determine a unique identification header (UIDH), associated with the subscriber, based on the content request. The system may determine randomized information associated with encrypting the UIDH. The system may encrypt the UIDH to create a transactional identifier. The UIDH may be encrypted based on the randomized information and a shared key. The system may insert the transactional identifier and the randomized information in the content request to create a modified content request. The system may provide the modified content request including the transactional identifier and the randomized information.
摘要:
A device includes one or more communication interfaces that communicate via at least one link or a network; a device memory; a device processing unit; and a Trusted Execution Environment (TEE) that is secure from the device processing unit and the device memory. The TEE obtains a public encryption key and a private encryption key pair, stores the private encryption key in a secure memory in the Trusted Execution Environment (TEE), and executes a first trusted application, within the TEE, to perform a PKI function using the private encryption key.
摘要:
A call session control function (“CSCF”), of an Internet Protocol Multimedia Subsystem (“IMS”) core network, may receive a set of authentication credentials that do not include IMS authentication credentials; and may use the set of authentication credentials, which do not include IMS authentication credentials, to authenticate a user device for the IMS core network.