GROUP ACCESS CONTROL
    23.
    发明申请

    公开(公告)号:US20220360589A1

    公开(公告)日:2022-11-10

    申请号:US17314950

    申请日:2021-05-07

    Abstract: This disclosure describes techniques for controlling group access to a collaboration technology. The techniques include generating a shared encryption key among authorized producers of content associated with a collaboration technology. The techniques include receiving, by the authorized producers and from authenticated consumers, requests to access the content. The requests may be received in a partitioned manner, such that individual producers are serving a particular subset of the authenticated consumers. In response to receiving the requests, the techniques include sending the shared encryption key from the individual producers to the corresponding subset of authenticated consumers. The techniques include using the shared encryption key to encrypt content by the authorized producers, which may then be decrypted by the authenticated consumers using the shared encryption key, achieving end-to-end encryption of event content.

    In-network content caching exploiting variation in mobility-prediction accuracy

    公开(公告)号:US11095751B2

    公开(公告)日:2021-08-17

    申请号:US16044722

    申请日:2018-07-25

    Abstract: A network device in a network edge receives content directed to a mobile device attached to the network edge from an upstream network device and forwards the content toward the mobile device. The network device makes a decision whether to cache the content based at least in part on a popularity of the content in a region covered by the network device and a prediction error for an estimated probability that the mobile device will transition from the region to another region. The popularity is directly correlated with a first bias toward caching the content. The prediction error is inversely correlated with a second bias toward caching the content. The decision is implemented: the network device either caches the content or foregoes caching the content, in accordance with the decision.

    TRANSPORT LAYER SECURITY EXTENSION FOR HYBRID INFORMATION CENTRIC NETWORKING

    公开(公告)号:US20210120038A1

    公开(公告)日:2021-04-22

    申请号:US16656621

    申请日:2019-10-18

    Abstract: Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.

    Reusable acknowledgments
    27.
    发明授权

    公开(公告)号:US10911207B1

    公开(公告)日:2021-02-02

    申请号:US16721717

    申请日:2019-12-19

    Abstract: This disclosure describes techniques for employing a reusable acknowledgment in communications among network devices. The techniques include generating a reusable negative acknowledgment (NACK) in response to a request for data that are unavailable. The reusable NACK may be sent as a response for at least some additional requests for unavailable data, rather than generating a new NACK for each request. As such, the reusable NACK may help decrease the computational load for a network device. In some cases, the use of a reusable NACK may help lessen the impacts of denial-of-service type attacks across a network.

    LIGHTWEIGHT NAMING SCHEME FOR AGGREGATING REQUESTS IN INFORMATION-CENTRIC NETWORKING

    公开(公告)号:US20190306233A1

    公开(公告)日:2019-10-03

    申请号:US15943775

    申请日:2018-04-03

    Abstract: In one embodiment, a device in a network receives an interest request for one or more pieces of content data available in the network. The interest request specifies the one or more pieces of content data via one or more bits sets in a content request bitmap of the interest request, each bit of the content request bitmap being associated with a different piece of content data. The device compares the content request bitmap to a content availability bitmap in a forwarding information base (FIB) of the device that is associated with a particular interface of the device and each bit of the content availability bitmap indicates whether a particular piece of content data is available via the particular interface. The device forwards the interest request via the particular interface, based on the comparison between the content request bitmap and the content availability bitmap in the FIB of the device.

    IAAS-AIDED ACCESS CONTROL FOR INFORMATION CENTRIC NETWORKING WITH INTERNET-OF-THINGS

    公开(公告)号:US20190297063A1

    公开(公告)日:2019-09-26

    申请号:US15928265

    申请日:2018-03-22

    Abstract: A producer communicates over a network with a user application in an infrastructure-as-a-service (IaaS) and an IaaS node. The producer encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. The producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content.

Patent Agency Ranking