METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM
    1.
    发明申请
    METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM 审中-公开
    在无线通信系统中处理恶意攻击的方法和系统

    公开(公告)号:WO2015120040A1

    公开(公告)日:2015-08-13

    申请号:PCT/US2015/014445

    申请日:2015-02-04

    Abstract: Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.

    Abstract translation: 本公开的某些方面涉及用于处理恶意攻击的方法和装置。 在一个方面,所述方法和装置被配置为至少部分地基于由无线设备接收的分组将恶意源接收的分组识别,所述分组将无线设备的状态从休眠状态改变为连接状态,选择性地断开 无线设备从分组数据网络(PDN)通过释放用于将无线设备连接到PDN的第一互联网协议(IP)地址,当从恶意源接收到的数量的分组在监视周期内达到阈值数时, 并且使用与第一IP地址不同的第二IP地址将无线设备重新连接到PDN。 在另一方面,在PDN断开连接之后,维护与IP多媒体子系统(IMS)PDN的连接。

    MOBILE HOTSPOT WITH IMS CALL PRIORITIZATION
    2.
    发明申请
    MOBILE HOTSPOT WITH IMS CALL PRIORITIZATION 审中-公开
    具有IMS呼叫优先权的移动终端

    公开(公告)号:WO2015126637A1

    公开(公告)日:2015-08-27

    申请号:PCT/US2015/014866

    申请日:2015-02-06

    CPC classification number: H04W88/04 H04W76/36 H04W88/10

    Abstract: The application relates to a wireless relay device which acts as a mobile hotspot, in particular to enable non-4G-LTE-capable IMS clients to establish IMS connections to the 4G-LTE network. Such a device is also referred to as MiFi router, SoftAP or software hotspot. In order to ensure QoS for all IMS clients on the LTE network, there may be one or more policies in place limiting the number of concurrent connections between IMS clients and the network via a particular relay device. Such policies might operate on a first-come-first- serve basis. However, in certain situation, such policies might be unsatisfactory because different connections might be associated with different priorities. Therefore the application proposes to determine the priority associated with the device seeking connection establishment (522) and handle the connection accordingly, i.e. either to terminate a connection of lower priority (523) or to reject the connection if the priority is lower than the priorities of the other connections (526).

    Abstract translation: 该应用涉及用作移动热点的无线中继设备,特别是使得能够支持非4G-LTE的IMS客户端能够建立到4G-LTE网络的IMS连接。 这样的设备也被称为MiFi路由器,SoftAP或软件热点。 为了确保LTE网络上的所有IMS客户端的QoS,可能存在一个或多个策略来限制经由特定中继设备的IMS客户端和网络之间的并发连接的数量。 这些政策可以先到先得。 然而,在某些情况下,由于不同的连接可能与不同的优先级相关联,所以这些策略可能不能令人满意。 因此,应用程序提出确定与寻找连接建立(522)的设备相关联的优先级并相应地处理连接,即要么终止较低优先级的连接(523),要么拒绝该连接,如果优先级低于 其他连接(526)。

    METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM
    4.
    发明公开
    METHODS AND SYSTEMS FOR HANDLING MALICIOUS ATTACKS IN A WIRELESS COMMUNICATION SYSTEM 有权
    方法和系统恶性ATTACKS成交在无线通信系统

    公开(公告)号:EP3105952A1

    公开(公告)日:2016-12-21

    申请号:EP15705450.3

    申请日:2015-02-04

    Abstract: Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.

    Abstract translation: 本发明的某些方面涉及用于处理恶意攻击的方法和装置。 在一个方面,该方法和装置被配置成识别来自至少部分地基于对由无线设备接收的并从休眠状态改变无线装置的状态到连接状态的分组的恶意源接收的包,选择性地断开 从分组数据网络(PDN)通过释放用于将无线设备连接至PDN当数字从恶意源接收识别的数据包的监视周期内达到阈值数量的第一网际协议(IP)地址的无线设备, 并重新连接使用第二IP地址给PDN无线设备所做的是从第一个IP地址不同。 在另一个方面中,所述PDN断开后到IP多媒体子系统(IMS)PDN的连接被维持。

Patent Agency Ranking