Traffic steering system
First Claim
Patent Images
1. A method comprising:
- receiving a session request to establish a network connection with a first network;
sending, by a traffic steering system over a second network, a session response to establish the network connection with the first network;
obtaining, by the traffic steering system, user profile information associated with a user sending the session request;
detecting at least one network security threat, attack, or violation; and
routing the network connection to a requested user destination via the traffic steering system based on the user profile information and the at least one detected security threat, attack, or violation, wherein the user profile information includes user-specific preferences.
1 Assignment
0 Petitions
Accused Products
Abstract
A method including receiving a session request to establish a network connection with a network; sending a session response to establish the network connection with the network; obtaining, by a traffic steering system, user profile information associated with a user sending the session request; and routing the network connection to a requested user destination via the traffic steering system based on the user profile information, wherein the user profile information includes user-specific preferences.
45 Citations
20 Claims
-
1. A method comprising:
-
receiving a session request to establish a network connection with a first network; sending, by a traffic steering system over a second network, a session response to establish the network connection with the first network; obtaining, by the traffic steering system, user profile information associated with a user sending the session request; detecting at least one network security threat, attack, or violation; and routing the network connection to a requested user destination via the traffic steering system based on the user profile information and the at least one detected security threat, attack, or violation, wherein the user profile information includes user-specific preferences. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device comprising logic configured to:
-
receive a request to establish a network connection with a first network; send a response over a second network to establish the network connection with the first network; obtain user profile information associated with a user sending the request; detect at least one network security threat, attack, or violation; and route the network connection to a requested user destination via the device based on the user profile information and the at least one detected security threat, attack, or violation, wherein the user profile information includes user-specific preferences. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium containing instructions executable by at least one processing system, the computer-readable medium storing instructions to:
-
receive a request to establish a network connection with a first network; send a response over a second network to establish the network connection with the first network; obtain user profile information associated with a user sending the request; detect at least one network security threat, attack, or violation; and route the network connection to a requested user destination based on the user profile information and the at least one detected security threat, attack, or violation, wherein the user profile information includes user-specific preferences. - View Dependent Claims (18, 19, 20)
-
Specification