System and method of analyzing network protocols
First Claim
1. A system for restricting access of an operator to a communications network, the system comprising:
- a device configured to allow access to at least one link in the communications network;
a computer configured to communicate with the device, the computer having at least one test application; and
a selector configured to identify the at least one test application and at least one link allowed for access by the operator.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for analyzing a public switched communications network from a remote place via the public Internet. The system comprises an access device which collects data from one or more links in a public switched communications network. The system further includes a server computer which receives the collected data from the access device via a dedicated network or the Internet. The server computer executes one or more applications to perform protocol analysis based on the received data. A client computer executing a Web browser may be used to communicate with the server computer via the Internet and access the outcome of the protocol analysis.
-
Citations
36 Claims
-
1. A system for restricting access of an operator to a communications network, the system comprising:
-
a device configured to allow access to at least one link in the communications network;
a computer configured to communicate with the device, the computer having at least one test application; and
a selector configured to identify the at least one test application and at least one link allowed for access by the operator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of restricting access of an operator to a communications network, the method comprising:
-
sending identification information of the operator to a computer to execute at least one test application;
verifying the identification information of the operator; and
determining at least one link and at least one test application allowed for access by the operator in response to the identification information. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 29, 30, 31, 32, 33)
-
-
28. A method of restricting access of an operator to a communications link, the method comprising:
-
receiving via a first communications network information about the identity of the operator;
verifying the information about the identity of the operator; and
determining at least one link in a second communications network and at least one test application allowed for access by the operator in response to verifying the information.
-
-
34. A system for restricting access of an operator to a communications network, the system comprising:
-
means for receiving information about the identity of the operator;
means for verifying the information about the operator; and
means for determining at least one link in the communications network and at least one test application allowed for access by the operator. - View Dependent Claims (35, 36)
-
Specification