Core network support for application requested network service level objectives

    公开(公告)号:US12009998B1

    公开(公告)日:2024-06-11

    申请号:US18202080

    申请日:2023-05-25

    CPC classification number: H04L41/5019 H04L12/4633

    Abstract: Techniques for informing a network of an application's service-level agreement (SLA) objective(s) so the network can ensure the SLA is met end-to-end, thereby allowing core network support of deterministic SLA and application-based routing without using network-based application recognition (NBAR) and/or compromising user privacy. The techniques may include receiving a first connection request to establish a network-domain connection between different network domains that meets or exceeds a service level objective. Based on the first connection request, the network-domain connection may be established between the different network domains to meet or exceed the service-level objective. In some examples, a second connection request may be received to establish a tunnel between a source application and a destination application, which are disposed in the different network domains. Based on the second connection request, the techniques may include establishing the tunnel between the source application and the destination application utilizing the network-domain connection.

    ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS

    公开(公告)号:US20230185918A1

    公开(公告)日:2023-06-15

    申请号:US17547084

    申请日:2021-12-09

    CPC classification number: G06F21/57 G06F2221/033

    Abstract: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.

    Real-time attestation of cryptoprocessors lacking timers and counters

    公开(公告)号:US11558198B2

    公开(公告)日:2023-01-17

    申请号:US16841997

    申请日:2020-04-07

    Abstract: The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.

    INTER-NETWORK SHORT MESSAGE SERVICE AMONG PRIVATE AND PUBLIC 5G NETWORKS

    公开(公告)号:US20220360953A1

    公开(公告)日:2022-11-10

    申请号:US17316205

    申请日:2021-05-10

    Abstract: Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.

    Trustworthiness evaluation of network devices

    公开(公告)号:US11283812B2

    公开(公告)日:2022-03-22

    申请号:US16715271

    申请日:2019-12-16

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    REAL-TIME ATTESTATION OF CRYPTOPROCESSORS LACKING TIMERS AND COUNTERS

    公开(公告)号:US20210314161A1

    公开(公告)日:2021-10-07

    申请号:US16841997

    申请日:2020-04-07

    Abstract: The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.

    CAN TO IP INTERNETWORKING
    9.
    发明申请

    公开(公告)号:US20180343326A1

    公开(公告)日:2018-11-29

    申请号:US15606251

    申请日:2017-05-26

    Abstract: In one embodiment, a device between a Controller Area Network (CAN)-based network and an Internet Protocol (IP)-based network receives a CAN message from a node in the CAN-based network. The CAN message comprises a CAN message identifier and a data field. The device determines an IP header based on the CAN message identifier and the CAN message. The device converts the data field of the CAN message into an IP message that includes the determined IP header. The device sends the IP message via the IP network to one or more eligible destinations for the IP message.

    INTER-NETWORK SHORT MESSAGE SERVICE AMONG PRIVATE AND PUBLIC 5G NETWORKS

    公开(公告)号:US20250097676A1

    公开(公告)日:2025-03-20

    申请号:US18967844

    申请日:2024-12-04

    Abstract: Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.

Patent Agency Ranking