-
1.
公开(公告)号:US20240106799A1
公开(公告)日:2024-03-28
申请号:US17936152
申请日:2022-09-28
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li , Samir Ariwala , Tahir H. Khan
IPC: H04L9/40
CPC classification number: H04L63/0236 , H04L63/102 , H04L63/105
Abstract: Systems and methods described herein provide profile-based routing and access control for a management interface of virtual network services with multiple tenants. A network device receives a request from a user device to access a webpage for an assisted network management service, and obtains, in response to the request, a user profile associated with a user of the user device. The network device retrieves an Internet Protocol (IP) address for a customer web server, of multiple customer web servers for the assisted network management service, that corresponds to the user profile. The network device generates, based on the IP address, a routing rule to route the request to the customer web server.
-
公开(公告)号:US11582589B2
公开(公告)日:2023-02-14
申请号:US16899150
申请日:2020-06-11
Applicant: Verizon Patent and Licensing Inc.
Inventor: David Taft , Vinod Kumar Choyi , Maqbool Chauhan , Jerry Steben , Parry Cornell Booker , Hossein M. Ahmadi , Minbao Li , Sudhakar Reddy Patil
Abstract: A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.
-
公开(公告)号:US11363008B2
公开(公告)日:2022-06-14
申请号:US16693818
申请日:2019-11-25
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li , Doug Shock , Steven L. Spak , Wei Liu
Abstract: The techniques described herein may be used to provide a user with access to distinct applications (with Lightweight Directory Access Protocol (LDAP) authentication) based on a single set of user credentials from the user. A server may receive user credentials from a user device. The server may authenticate the user of the user device by communicating with an LDAP server. After the user has been authenticated, the server may detect a request from the user device to access a first application with LDAP authentication. The server may create temporary credentials for the user, provide the temporary credentials to the application, receive an authentication request (that includes the temporary credentials) from the application, and authenticate the user based on a local copy of the temporary credentials. If/when the user requests access to a second application, the server may authenticate the user for the second application in a similar manner.
-
公开(公告)号:US20230028642A1
公开(公告)日:2023-01-26
申请号:US17385397
申请日:2021-07-26
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li , Eugene A. Oliva , Michael L. Hoarle , David Taft
IPC: H04L29/06
Abstract: One or more computing devices, systems, and/or methods for managing security associated with applications are provided. In an example, a central security gateway may determine first security policy information associated with a first application. The central security gateway may establish a first encrypted connection with a first device of the first application. The central security gateway may manage, based upon the first security policy information and using the first encrypted connection, security associated with the first application. The central security gateway may determine second security policy information associated with a second application. The central security gateway may establish a second encrypted connection with a second device of the second application. The central security gateway may manage, based upon the second security policy information and using the second encrypted connection, security associated with the second application.
-
公开(公告)号:US11050731B2
公开(公告)日:2021-06-29
申请号:US16431574
申请日:2019-06-04
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li
Abstract: Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform deployments. A user equipment (UE) may provide user information to a cloud admin device. The cloud admin device may authenticate and authorize the UE locally and then initiate a sign on procedure with each cloud platform deployment. The sign on procedure may include obtaining user group information for the user and providing the user group information to the cloud platform deployments so that the cloud platform deployments may return permission information without having to each perform an authentication and authorization procedure. The cloud admin device may relay the permission information to the UE, and the UE may use the permission information to access any/all of the cloud services.
-
6.
公开(公告)号:US20180270219A1
公开(公告)日:2018-09-20
申请号:US15462633
申请日:2017-03-17
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li
IPC: H04L29/06
CPC classification number: H04L63/0815 , H04L63/083 , H04L63/10 , H04W12/009 , H04W12/06
Abstract: Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform deployments. A user equipment (UE) may provide user information to a cloud admin server. The cloud admin server may authenticate and authorize the UE locally and then initiate a sign on procedure with each cloud platform deployment. The sign on procedure may include obtaining user group information for the user and providing the user group information to the cloud platform deployments so that the cloud platform deployments may return permission information without having to each perform an authentication and authorization procedure. The cloud admin server may relay the permission information to the UE, and the UE may use the permission information to access any/all of the cloud services.
-
公开(公告)号:US20230179967A1
公开(公告)日:2023-06-08
申请号:US18161535
申请日:2023-01-30
Applicant: Verizon Patent and Licensing Inc.
Inventor: David Taft , Vinod Kumar Choyi , Maqbool Chauhan , Jerry Steben , Parry Cornell Booker , Hossein M. Ahmadi , Minbao Li , Sudhakar Reddy Patil
Abstract: A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.
-
8.
公开(公告)号:US20190288996A1
公开(公告)日:2019-09-19
申请号:US16431574
申请日:2019-06-04
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li
Abstract: Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform deployments. A user equipment (UE) may provide user information to a cloud admin device. The cloud admin device may authenticate and authorize the UE locally and then initiate a sign on procedure with each cloud platform deployment. The sign on procedure may include obtaining user group information for the user and providing the user group information to the cloud platform deployments so that the cloud platform deployments may return permission information without having to each perform an authentication and authorization procedure. The cloud admin device may relay the permission information to the UE, and the UE may use the permission information to access any/all of the cloud services.
-
公开(公告)号:US10356080B2
公开(公告)日:2019-07-16
申请号:US15462633
申请日:2017-03-17
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li
Abstract: Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform deployments. A user equipment (UE) may provide user information to a cloud admin server. The cloud admin server may authenticate and authorize the UE locally and then initiate a sign on procedure with each cloud platform deployment. The sign on procedure may include obtaining user group information for the user and providing the user group information to the cloud platform deployments so that the cloud platform deployments may return permission information without having to each perform an authentication and authorization procedure. The cloud admin server may relay the permission information to the UE, and the UE may use the permission information to access any/all of the cloud services.
-
公开(公告)号:US10110661B2
公开(公告)日:2018-10-23
申请号:US14872442
申请日:2015-10-01
Applicant: Verizon Patent and Licensing Inc.
Inventor: Minbao Li , Amit Singh , Kaushal K Shah , Pugazh Thyagarasan , Bharadwaja Cheruvu
IPC: H04L29/08
Abstract: Techniques described herein may be used to expeditiously provide web content to user devices. A web server may provide a first webpage to a user device. Prior to the user device requesting another webpage (e.g., while the user of the user device is viewing the first webpage), the server device may identify a second webpage that the user device is likely to request next and obtain content corresponding to the second webpage. The web server may receive a request for the second webpage, and in response to the request, may provide the second webpage, along with the content, to the user device. The content may include information that is not typically cached by the web server. Additionally, the web server may verify that there are adequate system resources available (e.g., processing capacity, memory capacity, etc.) prior to obtaining the content.
-
-
-
-
-
-
-
-
-