摘要:
A system includes a multi-stack subscriber, a gateway, and a web portal. The web portal determines whether the subscriber is authenticated to access the Internet using a first Internet Protocol by receiving logon information from the subscriber. The subscriber requests to access the Internet using a second Internet Protocol. The gateway and/or the web portal determine whether the subscriber is authenticated to access the Internet using the second Internet Protocol without sending a second logon to the subscriber.
摘要:
A system includes a multi-stack subscriber, a gateway, and a web portal. The web portal determines whether the subscriber is authenticated to access the Internet using a first Internet Protocol by receiving logon information from the subscriber. The subscriber requests to access the Internet using a second Internet Protocol. The gateway and/or the web portal determine whether the subscriber is authenticated to access the Internet using the second Internet Protocol without sending a second logon to the subscriber.
摘要:
An apparatus includes a processor, an interface, and a memory. The interface is operable to receive a request from a subscriber to access network services, wherein the request includes a subscriber address from the set comprising: an IP address and a media access control (MAC) address. The processor is operable to generate a query requesting an address associated with the subscriber address. The interface is further operable to communicate the query to the subscriber address, and receive a response to the query, wherein the response includes an address associated with the subscriber address, wherein the associated address is from the set comprising: an IP address and a MAC address. The memory is operable to store the subscriber address and the received associated address.
摘要:
An apparatus includes a processor, an interface, and a memory. The interface is operable to receive a request from a subscriber to access network services, wherein the request includes a subscriber address from the set comprising: an IP address and a media access control (MAC) address. The processor is operable to generate a query requesting an address associated with the subscriber address. The interface is further operable to communicate the query to the subscriber address, and receive a response to the query, wherein the response includes an address associated with the subscriber address, wherein the associated address is from the set comprising: an IP address and a MAC address. The memory is operable to store the subscriber address and the received associated address.
摘要:
A method is provided in one example and includes receiving video data captured by a camera at a location; comparing a portion of the video data to security information characteristics stored in a policy; and identifying a violation of the policy when the portion of the video data does not match at least one of the security information characteristics stored in the policy. In more particular instances, the method can include triggering an alert when the violation of the policy is identified.
摘要:
Embodiments of this invention can establish a communications path through a network device in a network for a stream of data served by a server. A host can request to receive the stream of data by sending a request through the network to the server. In response, the server creates a data distribution message and sends it onto the network towards the host. Each network device equipped with the invention receives the data distribution message via unicast communications, acknowledges the data distribution message, and creates a path table for the stream of data, and forwards the data distribution message to the next network device on route to the host. A network device that receives an acknowledgment of the data distribution message establishes at least one path through the network device in the path table for payload distribution messages that carry a stream of data. The stream of data can thus be propagated through a network with only one copy of portions (e.g., packets) of the stream traveling per path in the network, irrespective of the number of recipients served by a network device that receives the stream. Since the portions of data are propagated using standard routing protocols, they may pass or tunnel through network devices not equipped with the invention.
摘要:
A method and system for preventing the detection of an operating system by an intruder, the operating system installed on a host in a network, is provided. The intruder transmits a network probe for operating system detection. The network probe is identified and a response is generated to the network probe, generated by the operating system, is modified. The modified response provides the intruder with false information related to the operating system, thereby misleading the intruder about the type of operating system.
摘要:
A method of communicating an encrypted data broadcast to a plurality of virtual private network receivers is disclosed. A first communication channel is established between a first one of the receivers and a network node. A private data stream is communicated to the first receiver on the first channel. A request is received from the first receiver to join a broadcast data stream that is directed to a plurality of receivers by a broadcast server. A second encrypted communication channel is established between the first receiver and the network node for purposes of carrying the broadcast data stream. Decryption information, which the first receiver can use to decrypt information that is sent on the second channel, is sent to the first receiver through the first channel. The broadcast data stream is then communicated to the first receiver on the second channel. As a result, a particular receiver can receive an encrypted broadcast that is encrypted as part of a single session for a large plurality of other receivers, without impacting separate, private encrypted communications conducted by the particular receiver.
摘要:
Mechanisms and techniques provide a system that operates in a data communications device such as a switch or a router to provide a technique for inserting data into packets associated with a communications session between a first and second computerized devices. The technique comprises receiving a first packet containing data being propagated from the first computerized device to the second computerized device in the communications session and inserting a first amount of extra data into the first packet to alter the size of the first packet and forwarding the first packet including the first amount of extra data to the second computerized device. By monitoring and adjusting sequence and acknowledgement information from with in the data communications device, data can be inserted into packets without disrupting connection state information maintained by and expected by each computerized device.
摘要:
In an example embodiment, a method is provided to receive a request message. A client that transmitted the request message then is identified. Here, the client is associated with a client identifier. The client identifier is inserted into a response message, and this response message includes a redirect to a portal. The response message then is transmitted.