WO2010145309A1 - 接入因特网控制装置及其方法、网关 - Google Patents
接入因特网控制装置及其方法、网关 Download PDFInfo
- Publication number
- WO2010145309A1 WO2010145309A1 PCT/CN2010/072014 CN2010072014W WO2010145309A1 WO 2010145309 A1 WO2010145309 A1 WO 2010145309A1 CN 2010072014 W CN2010072014 W CN 2010072014W WO 2010145309 A1 WO2010145309 A1 WO 2010145309A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- proxy
- parsing
- special
- policy
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- terminals there are many terminals ( ) that can be connected to the public office or the family.
- the mother, the child, and the grandmother all have their own sheep. The more in the family, the more special.
- Figure 1 shows the indication of the multi-terminal 10 agent 20 connection.
- 20 can be, with a proxy function, and a router, etc., the terminal 10 needs to pass each 40 before the special 30 to resolve the special 30 address.
- the existing agent 20 there is no control function of the terminal 10 to receive the special 30, and the same function of the terminal 10 and the special 30 is controlled, and it is possible that the office does not work in the company, or the child is confused. .
- the purpose of this invention is to provide a special control device and a connection method thereof, and to solve the problem of the existing agent control terminal.
- This provides a special control device, including agent, policy management,
- Proxy in the parsing terminal The policy management determines whether the included user information of the proxy analysis controls the policy matching.
- the terminal is inside, .
- the proxy includes sub-parsers, which are parsed or parsed to each, and a parsing result terminal for parsing the parsing each.
- the agent includes a text parser for parsing to obtain the user information contained therein.
- the user information includes the terminal and the same
- the terminal is only the address of the address, the control address of the Hugh, or the terminal is in the middle.
- the policy management is provided with a control policy, which includes the terminal and the terminal that allows the terminal to communicate.
- the policy management agent controls the policy matching policy to manage the terminal and allow the terminal to communicate with the same.
- the present invention provides a special control device for plugging in, and the special control device includes a proxy and a policy management.
- the agent in the parsing terminal, and the policy management, whether the included user of the proxy parsing controls the policy matching. Terminal inside, .
- the proxy includes sub-parsers, parsing or parsing each, and parsing result terminals for parsing each parsing.
- the proxy includes a text parser for parsing to retrieve the user information contained.
- the user information includes only the Internet address, the Hugh Control Address, or the terminal in the same terminal of the terminal.
- Policy management has a control strategy that includes both the terminal and the terminal.
- the policy management agent resolves whether the included user information accounts for the control policy matching policy management terminal and allows the terminal to communicate with the same.
- the present invention provides a special control method, including
- the proxy match result determines whether the terminal is allowed to be connected.
- the terminal is inside and parsed into each.
- the agent does not allow the terminal to connect to the special, then the agent directly resolves the agent to allow the terminal to connect to the special, then the agent will analyze each, and each parsing and parsing The agent will parse the result terminal. with.
- the agent has a control policy, and the control policy includes the terminal and the terminal that allows the terminal to communicate.
- the special control device and the connection method thereof, and the user-friendly information and the same policy control in the special (analysis) of the proxy terminal can conveniently and effectively control the terminal connection.
- Figure 1 shows the multi-terminal proxy connection.
- FIG. 2 shows the flow of the control method of the power supply shown in Fig. 3
- the terminal control device 201 is in the agent 20, and is controlled by the terminal 10 in the terminal 30.
- the proxy 20 can be, has a proxy function, and a router, etc., and the terminal 10 can be or be otherwise available.
- the control device 201 includes the agent 2010 and policy management. 2011 where,
- control strategy refers to the terminal 10 and the terminal 10 connected to the same control terminal 10 .
- the terminal 10 may be an e e ooco (P) address, an eda access Co o (A) address, or the terminal 10 is in the middle.
- the analysis of the terminal 10 to the special 30 is performed in the 40th.
- Agent 2010 includes sub-2012 and text parsing 2013, where
- the text parsing 2013, in the parsing, to include the user information, the user information including the terminal 10 and the same terminal 10 are only the Internet address 0, the Hibernate control address, or the terminal 10 is in the middle.
- the policy management 2011 is provided with a control policy 2014
- the control policy 2014 is provided with a control policy
- the rest control policy 2014 terminal 10 and the terminal 10 are allowed to communicate
- the policy management 2011 terminal 10 and the same terminal 10 allowing the terminal 10 to receive the special 30
- the included user information is 5 no control policy matching
- the terminal 10 is connected to the special control. The following is a description of the functional steps of the 2011 policy management.
- control Policy of the terminal 10 with the P address 192.168.1.3 in the P address is not allowed to receive the special 30 from 22:00 to 8:00 every day.
- This terminal 10 is at the same time as 23:00, special 30 www.wowch a.co, with good boundaries.
- control method of the control method is controlled under the control mode
- the terminal 10 parses and parses the www.wowch a.co each with 40 parsing and parsing proxy 2010.
- Terminal 10 is not available because it is not available.
- Terminal 10 in the control policy 2014 with the P address 192.168.1.2 The control policy P address is allowed to accept 30 at any time of the day. Therefore, if the terminal 10 is at the same time as 23:00, the special 30 is in the www.bad.co.
- the upper purpose of the terminal 10 the mode of the control method of the present
- the terminal 10 parses and parses the www.bad .co each with 40 parsing and parsing proxy 2010.
- each of the 40 will be the resolution of the P address terminal 10
- the P address of the terminal 10 is connected to the special 30
- the terminal control device 201 is in the agent 20, and is controlled by the terminal 10 in the terminal 30.
- the proxy 20 can be, has a proxy function, and a router, etc., and the terminal 10 can be or otherwise.
- the terminal control device 201 includes an agent 2010 and a policy management 2011 agent 2010, and the resolution terminal 10 is directed to the special terminal 30. Policy Management 2011, whether the included user information parsed by the proxy 2010 controls the policy matching
- control strategy refers to the terminal 10 and the terminal 10 connected to the same control terminal 10 .
- the terminal 10 may be an e e ooco (P) address, an eda access coo (AC) address, or the terminal 10 is in the middle.
- the analysis of the terminal 10 to the special 30 is performed in the 40th.
- Agent 2010 includes sub-2012 and text parsing 2013, where
- the text parsing 2013, in the parsing, to include the user information, the user information including the terminal 10 and the same terminal 10 are only the address of the address, the control address of the rest, or the terminal 10 is in the middle.
- the policy management 2011 is provided with a control policy 2014
- the control policy 2014 is provided with a control policy
- the rest control policy 2014 terminal 10 and the terminal 10 are allowed to communicate
- the policy management 2011 terminal 10 and the same terminal 10 allowing the terminal 10 to receive the special 30 Whether the included user information is controlled to match the policy, and the terminal 10 receives special control.
- step S301 the terminal 10 is directed to the special 30, and the terminal 10 is in the middle, and the terminal 10 is analyzed in the terminal 10, and the terminal 10 is determined to be 40 each.
- the proxy 20 parses the included user information.
- the user information includes the terminal 10 and the same.
- the terminal 10 can be an ee ooco (P) address, an eda access (o) address, or a terminal 10. Waiting in the middle.
- Step 5303 The proxy 20 contains the user information to control the policy.
- the agent 20 is provided with a control policy 2014, and the control policy 2014 includes the terminal 10 and the terminal 10 is allowed to receive the same.
- the user of the terminal 10 and the terminal 10 that allows the terminal 10 to connect to the terminal 30 control whether the control policy matches, and the terminal 10 controls the terminal.
- Step 5304 The proxy 20 matches the result to determine whether the terminal 20 is allowed to connect.
- Step S401 The terminal 10 sends a special 30 to the special 30, and the terminal 10 is in the terminal 10, and the terminal 10 analyzes the special 30, and the 40 is the special 40.
- Step 5402 The proxy 20 terminal 10 is directed to the special 30.
- Step 5403 Agent 20 resolves.
- the proxy 20 parsing is the included user
- the user information includes only the Internet address of the terminal 10 and the same terminal 10, the Hugh control address, or the terminal 10.
- Step 5404 The user information included in the proxy 20 controls the policy matching. If the matching is the step S405, the proxy 20 does not directly match, then step S406
- the agent 20 is provided with a control policy 2014, and the control policy 2014 includes the terminal 10 and the terminal 10 is allowed to receive the same, the agent 20
- the user information contained in the terminal 10 and the terminal 10 that allows the terminal 10 to connect to the terminal 30 is controlled by the control policy, and the terminal 10 is controlled by the terminal.
- Step 5407 Each 40 parsing Agent 20 will parse the result Terminal 1
- the terminal control device 201 and its connection method in the present invention can conveniently and effectively control the terminal 10 to receive more than 30 powers.
- the terminal control device 201 and its connection method in the present invention can conveniently and effectively control the terminal 10 to receive more than 30 powers.
- the same is included in this description and the accompanying content, etc., or in the wood field directly or in the same phase, the same is included in this
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10788705.1A EP2466792A4 (en) | 2009-09-25 | 2010-04-21 | APPARATUS FOR CONTROLLING INTERNET ACCESS, METHOD AND GATEWAY THEREFOR |
AU2010262572A AU2010262572B2 (en) | 2009-09-25 | 2010-04-21 | Internet access control apparatus, method and gateway thereof |
US13/496,622 US20120173727A1 (en) | 2009-09-25 | 2010-04-21 | Internet Access Control Apparatus, Method and Gateway Thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910190609A CN101674268A (zh) | 2009-09-25 | 2009-09-25 | 接入因特网控制装置及其方法、网关 |
CN200910190609.9 | 2009-09-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010145309A1 true WO2010145309A1 (zh) | 2010-12-23 |
Family
ID=42021261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/072014 WO2010145309A1 (zh) | 2009-09-25 | 2010-04-21 | 接入因特网控制装置及其方法、网关 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20120173727A1 (zh) |
EP (1) | EP2466792A4 (zh) |
CN (1) | CN101674268A (zh) |
AU (1) | AU2010262572B2 (zh) |
WO (1) | WO2010145309A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113381906A (zh) * | 2021-05-19 | 2021-09-10 | 郑州信大捷安信息技术股份有限公司 | 基于政企系统业务的限制性外网访问测试方法 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674268A (zh) * | 2009-09-25 | 2010-03-17 | 中兴通讯股份有限公司 | 接入因特网控制装置及其方法、网关 |
CN103222238B (zh) * | 2010-10-05 | 2016-03-09 | 三星电子株式会社 | 提供基于广告观看的外部网络服务的方法和装置 |
CN102685165B (zh) * | 2011-03-16 | 2015-01-28 | 中兴通讯股份有限公司 | 基于代理网关对访问请求进行控制的方法及装置 |
CN102916826A (zh) * | 2011-08-01 | 2013-02-06 | 中兴通讯股份有限公司 | 网络接入的控制方法及装置 |
US9723023B2 (en) * | 2012-03-21 | 2017-08-01 | Raytheon Bbn Technologies Corp. | Destination address rewriting to block peer-to-peer communications |
CN103647856B (zh) * | 2013-12-23 | 2017-09-08 | 成都西加云杉科技有限公司 | App获取本地终端的mac地址的方法及系统 |
CN103905581A (zh) * | 2014-02-26 | 2014-07-02 | 曾宪钊 | 基于行为差异性的dns高速解析方案和配套的抗流量类攻击安全方案 |
CN104539508A (zh) * | 2014-11-28 | 2015-04-22 | 小米科技有限责任公司 | 访问控制方法和装置 |
CN105847457A (zh) * | 2015-01-14 | 2016-08-10 | 中兴通讯股份有限公司 | 接入控制方法、装置及宽带远端接入服务器bras |
CN111031545A (zh) * | 2019-12-24 | 2020-04-17 | Oppo广东移动通信有限公司 | 无线网络接入控制方法及装置、中继设备和电子设备 |
CN112351039B (zh) * | 2020-11-10 | 2022-11-15 | 北京天融信网络安全技术有限公司 | 一种信息处理方法及电子设备 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1453954A (zh) * | 2002-04-22 | 2003-11-05 | 华为技术有限公司 | 一种管理网络用户访问权限的系统和方法 |
CN1477818A (zh) * | 2002-06-26 | 2004-02-25 | �ձ�������ʽ���� | 网络连接管理系统以及用于它的网络连接管理方法 |
CN1815971A (zh) * | 2005-02-03 | 2006-08-09 | 杭州华为三康技术有限公司 | 基于集中管理分布控制的绿色上网系统及方法 |
CN101174992A (zh) * | 2007-11-30 | 2008-05-07 | 中兴通讯股份有限公司 | 一种用户上网时间控制方法 |
US20080155647A1 (en) * | 2006-11-28 | 2008-06-26 | Toui Miyawaki | Access control system |
CN101465856A (zh) * | 2008-12-31 | 2009-06-24 | 杭州华三通信技术有限公司 | 一种对用户进行访问控制的方法和系统 |
CN101674268A (zh) * | 2009-09-25 | 2010-03-17 | 中兴通讯股份有限公司 | 接入因特网控制装置及其方法、网关 |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088451A (en) * | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US5991810A (en) * | 1997-08-01 | 1999-11-23 | Novell, Inc. | User name authentication for gateway clients accessing a proxy cache server |
US6233618B1 (en) * | 1998-03-31 | 2001-05-15 | Content Advisor, Inc. | Access control of networked data |
US6865609B1 (en) * | 1999-08-17 | 2005-03-08 | Sharewave, Inc. | Multimedia extensions for wireless local area network |
US6643694B1 (en) * | 2000-02-09 | 2003-11-04 | Michael A. Chernin | System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface |
US6934754B2 (en) * | 2000-04-03 | 2005-08-23 | Ibahn General Holdings, Inc. | Methods and apparatus for processing network data transmissions |
US20020133586A1 (en) * | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network |
US7249374B1 (en) * | 2001-01-22 | 2007-07-24 | Cisco Technology, Inc. | Method and apparatus for selectively enforcing network security policies using group identifiers |
US7661129B2 (en) * | 2002-02-26 | 2010-02-09 | Citrix Systems, Inc. | Secure traversal of network components |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
US7143435B1 (en) * | 2002-07-31 | 2006-11-28 | Cisco Technology, Inc. | Method and apparatus for registering auto-configured network addresses based on connection authentication |
AU2003279950A1 (en) * | 2002-10-10 | 2004-05-04 | Rocksteady Networks, Inc. | System and method for providing access control |
US7603710B2 (en) * | 2003-04-03 | 2009-10-13 | Network Security Technologies, Inc. | Method and system for detecting characteristics of a wireless network |
US7900240B2 (en) * | 2003-05-28 | 2011-03-01 | Citrix Systems, Inc. | Multilayer access control security system |
US7447797B2 (en) * | 2003-10-29 | 2008-11-04 | International Business Machines Corporation | Method and system for processing a service request associated with a particular priority level of service in a network data processing system using parallel proxies |
US20050144297A1 (en) * | 2003-12-30 | 2005-06-30 | Kidsnet, Inc. | Method and apparatus for providing content access controls to access the internet |
DE102004045147A1 (de) * | 2004-09-17 | 2006-03-23 | Fujitsu Ltd., Kawasaki | Einstellungsinformations-Verteilungsvorrichtung, Verfahren, Programm und Medium, Authentifizierungseinstellungs-Transfervorrichtung, Verfahren, Programm und Medium und Einstellungsinformations-Empfangsprogramm |
US7409482B2 (en) * | 2004-10-26 | 2008-08-05 | Lenovo (Singapore) Pte, Ltd. | Computer and method for on-demand network access control |
US9438683B2 (en) * | 2005-04-04 | 2016-09-06 | Aol Inc. | Router-host logging |
US7937476B2 (en) * | 2005-04-08 | 2011-05-03 | Microsoft Corporation | Methods and systems for auto-sensing internet accelerators and proxies for download content |
US20060235973A1 (en) * | 2005-04-14 | 2006-10-19 | Alcatel | Network services infrastructure systems and methods |
US8001610B1 (en) * | 2005-09-28 | 2011-08-16 | Juniper Networks, Inc. | Network defense system utilizing endpoint health indicators and user identity |
US7437755B2 (en) * | 2005-10-26 | 2008-10-14 | Cisco Technology, Inc. | Unified network and physical premises access control server |
US9253151B2 (en) * | 2006-05-25 | 2016-02-02 | International Business Machines Corporation | Managing authentication requests when accessing networks |
US8132233B2 (en) * | 2007-02-05 | 2012-03-06 | Hewlett-Packard Development Company, L.P. | Dynamic network access control method and apparatus |
WO2008099402A2 (en) * | 2007-02-16 | 2008-08-21 | Forescout Technologies | A method and system for dynamic security using authentication server |
JP4907603B2 (ja) * | 2007-06-27 | 2012-04-04 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | アクセス制御システムおよびアクセス制御方法 |
US9178884B2 (en) * | 2007-09-07 | 2015-11-03 | Intel Corporation | Enabling access to remote entities in access controlled networks |
US8438619B2 (en) * | 2007-09-21 | 2013-05-07 | Netmotion Wireless Holdings, Inc. | Network access control |
US20090193503A1 (en) * | 2008-01-28 | 2009-07-30 | Gbs Laboratories Llc | Network access control |
US7836142B2 (en) * | 2008-02-22 | 2010-11-16 | Time Warner Cable, Inc. | System and method for updating a dynamic domain name server |
US8281363B1 (en) * | 2008-03-31 | 2012-10-02 | Symantec Corporation | Methods and systems for enforcing network access control in a virtual environment |
US8090852B2 (en) * | 2008-06-04 | 2012-01-03 | Sophos Plc | Managing use of proxies to access restricted network locations |
US8583781B2 (en) * | 2009-01-28 | 2013-11-12 | Headwater Partners I Llc | Simplified service network architecture |
US8353044B1 (en) * | 2008-06-27 | 2013-01-08 | Symantec Corporation | Methods and systems for computing device remediation |
US8352580B2 (en) * | 2008-11-21 | 2013-01-08 | Samsung Electronics Co., Ltd. | Server and method for providing mobile web service |
US20100154024A1 (en) * | 2008-12-12 | 2010-06-17 | At&T Intellectual Property I, L.P. | Methods, appliances, and computer program products for controlling access to a communication network based on policy information |
-
2009
- 2009-09-25 CN CN200910190609A patent/CN101674268A/zh active Pending
-
2010
- 2010-04-21 EP EP10788705.1A patent/EP2466792A4/en not_active Withdrawn
- 2010-04-21 AU AU2010262572A patent/AU2010262572B2/en active Active
- 2010-04-21 US US13/496,622 patent/US20120173727A1/en not_active Abandoned
- 2010-04-21 WO PCT/CN2010/072014 patent/WO2010145309A1/zh active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1453954A (zh) * | 2002-04-22 | 2003-11-05 | 华为技术有限公司 | 一种管理网络用户访问权限的系统和方法 |
CN1477818A (zh) * | 2002-06-26 | 2004-02-25 | �ձ�������ʽ���� | 网络连接管理系统以及用于它的网络连接管理方法 |
CN1815971A (zh) * | 2005-02-03 | 2006-08-09 | 杭州华为三康技术有限公司 | 基于集中管理分布控制的绿色上网系统及方法 |
US20080155647A1 (en) * | 2006-11-28 | 2008-06-26 | Toui Miyawaki | Access control system |
CN101174992A (zh) * | 2007-11-30 | 2008-05-07 | 中兴通讯股份有限公司 | 一种用户上网时间控制方法 |
CN101465856A (zh) * | 2008-12-31 | 2009-06-24 | 杭州华三通信技术有限公司 | 一种对用户进行访问控制的方法和系统 |
CN101674268A (zh) * | 2009-09-25 | 2010-03-17 | 中兴通讯股份有限公司 | 接入因特网控制装置及其方法、网关 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2466792A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113381906A (zh) * | 2021-05-19 | 2021-09-10 | 郑州信大捷安信息技术股份有限公司 | 基于政企系统业务的限制性外网访问测试方法 |
CN113381906B (zh) * | 2021-05-19 | 2022-03-25 | 郑州信大捷安信息技术股份有限公司 | 基于政企系统业务的限制性外网访问测试方法 |
Also Published As
Publication number | Publication date |
---|---|
AU2010262572A1 (en) | 2012-04-05 |
EP2466792A1 (en) | 2012-06-20 |
AU2010262572B2 (en) | 2014-05-01 |
EP2466792A4 (en) | 2014-01-22 |
US20120173727A1 (en) | 2012-07-05 |
CN101674268A (zh) | 2010-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010145309A1 (zh) | 接入因特网控制装置及其方法、网关 | |
US7369996B2 (en) | System and method for voice based network management | |
US6384853B1 (en) | Apparatus and method for preventing screen savers from shutting down ToL clients | |
WO2010148858A1 (zh) | 一种软件界面语言的选择方法及装置 | |
WO2010148950A1 (zh) | 移动终端间电池共享的系统、方法及移动终端 | |
WO2011076011A1 (zh) | 一种m2m平台定义消息的方法、系统和m2m平台 | |
WO2010145579A1 (zh) | 基于IPv6的局域网内的地址确定方法与装置 | |
WO2011160587A1 (zh) | 一种双栈终端连接网络的方法及系统 | |
US9648159B2 (en) | Single-PDP dual stack serial dialing method and system | |
WO2010145432A1 (zh) | 一种voip媒体网关获取语音资源的方法、系统及装置 | |
WO2010145312A1 (zh) | 用户信息的处理方法、服务器及终端 | |
CN102685113A (zh) | 基于UPnP的IMS终端自配置方法 | |
WO2012106968A1 (zh) | Java应用程序向本地传递信息的方法及设备 | |
Cisco | Using the Redirector | |
Cisco | Using the Redirector | |
US20070211700A1 (en) | Network device and method for retrieving VoIP configuration parameters | |
Cisco | Voice Menu Options | |
Cisco | RADIUS Attribute 8 (Framed-IP-Address) in Access Requests | |
Cisco | Release Notes for Cisco IP/VC 3520 Gateway (1.0) | |
Cisco | Using Cisco IOS Software | |
Cisco | Release Notes for Cisco CallManager Release 3.0(2d) | |
Cisco | SNMP Commands | |
WO2007085190A1 (fr) | Procédé et système pour la mise en oeuvre d'un service d'auto-assistance dans un terminal de domaine circuit | |
Cisco | Troubleshooting | |
Cisco | Configuring TCL IVR Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10788705 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010262572 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010788705 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13496622 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2010262572 Country of ref document: AU Date of ref document: 20100421 Kind code of ref document: A |