摘要:
Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
摘要:
Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
摘要:
A solution that improves a user's experience while surfing the Internet. An intermediate device resides logically between a browsing device and content available via the Internet. As responses to content requests from browsing devices are received from a content server, browser links are identified and modified, disabled or covered for example. The intermediate device also creates a browser link to a compound browser object(s) that is created and stored at the intermediate device. This created browser link invokes code at the intermediate device to upload the compound browser object(s). The intermediate device obtains these compound browser objects by obtaining content associated with the identified browser links either from a content server, a local cache or knowledge of its existence eat the browser device.
摘要:
A system and method for detecting network attacks within encrypted network traffic received by a protected network includes a decryption module and an adaptor module. This system and method can be inserted and used with multiple types of operating systems.
摘要:
Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
摘要:
Systems and methods for identification of network attacks are disclosed. An example system includes an adaptor module to route a received encrypted packet to a decryption module, receive a decrypted packet corresponding to the encrypted packet from the decryption module, and transmit the decrypted packet and the encrypted packet to a sensor module. The decryption module is to receive an encrypted packet, decrypt the encrypted packet to form the decrypted packet, and transmit the decrypted packet to the adaptor module. The sensor module is to inspect the decrypted packet and the encrypted packet received from the adaptor module to determine when an attack is detected.
摘要:
A system and method for protection of Web based applications are described. An agent is included in a web server such that traffic is routed through the agent. A security module is also in communication with the agent. The agent receives information about the application profile, and patterns of acceptable traffic behavior, from the security module. The agent acts as a gatekeeper, holding up suspicious traffic that does not match the pattern of acceptable traffic behavior until the suspicious traffic has been analyzed by the security module. Using the agent, malicious traffic can dropped before it can reach the application, or the user can be logged out, or both.
摘要:
Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
摘要:
A system and method for detecting network attacks within encrypted network traffic received by a protected network includes a decryption module and an adaptor module. This system and method can be inserted and used with multiple types of operating systems.
摘要:
Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.