Technologies for distributed routing table lookup

    公开(公告)号:US09847935B2

    公开(公告)日:2017-12-19

    申请号:US14264912

    申请日:2014-04-29

    Abstract: Technologies for distributed table lookup via a distributed router includes an ingress computing node, an intermediate computing node, and an egress computing node. Each computing node of the distributed router includes a forwarding table to store a different set of network routing entries obtained from a routing table of the distributed router. The ingress computing node generates a hash key based on the destination address included in a received network packet. The hash key identifies the intermediate computing node of the distributed router that stores the forwarding table that includes a network routing entry corresponding to the destination address. The ingress computing node forwards the received network packet to the intermediate computing node for routing. The intermediate computing node receives the forwarded network packet, determines a destination address of the network packet, and determines the egress computing node for transmission of the network packet from the distributed router.

    LICENSING IN THE CLOUD
    26.
    发明申请
    LICENSING IN THE CLOUD 审中-公开
    云中的许可

    公开(公告)号:US20160180063A1

    公开(公告)日:2016-06-23

    申请号:US14581742

    申请日:2014-12-23

    Abstract: At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.

    Abstract translation: 包括响应于系统执行的多个指令的至少一个机器可读介质导致系统向许可证服务器发送唯一标识符,基于唯一标识符建立安全通道,请求激活设备的许可证 通过安全通道从许可证服务器通过安全通道从许可证服务器接收许可证数据; 确定许可证是否有效,并且响应于许可证数据有效的确定而激活设备。

    Separate network slicing for security events propagation across layers on special packet data protocol context

    公开(公告)号:US12256218B2

    公开(公告)日:2025-03-18

    申请号:US17484811

    申请日:2021-09-24

    Abstract: An apparatus and system to provide separate network slices for security events are described. A dedicated secure network slice is provided for PDP data from a UE. The network slice is used for detecting security issues and sending security-related information to clients. The communications in the dedicated network slice are associated with a special PDP context used by the UE to interface with the network slice. Once the UE has detected a security issue or has been notified of the security issue on the network or remote servers, the UE uses a special PDP service, and is able to stop uplink/downlink channels, close running applications and enter into a safe mode, cut off connections to the networks, and try to determine alternate available connectivity.

    ADAPTIVE AND HIERARCHICAL NETWORK AUTHENTICATION FRAMEWORK

    公开(公告)号:US20230188982A1

    公开(公告)日:2023-06-15

    申请号:US17550841

    申请日:2021-12-14

    CPC classification number: H04W12/06 H04W12/79

    Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.

    PHYSICAL LAYER TECHNIQUES TO MITIGATE THE HANDOVER PROCESS VULNERABILITIES

    公开(公告)号:US20230095401A1

    公开(公告)日:2023-03-30

    申请号:US17483912

    申请日:2021-09-24

    Abstract: An apparatus and system to mitigate non-genuine handovers are described. The handovers include handovers based on fake measurements and handovers to malicious cells. To mitigate these, a mitigation procedure is initiated when excessive handovers are detected. Location information obtained from the UE, estimation of PHY layer properties by the serving and/or target cell, or AI modeling of the best serving cell at the UE location is used to determine whether the handover is valid. If not, the handover is canceled and the UE is stopped from initiating new handovers for a specified time, the UE may be instructed to perform re-authentication with the network, and/or the serving cell recommends to the network authentication entity to revoke the UE authentication. To ensure that the target cell is legitimate, an AI model is used to classify the target cell as known/unknown and the result sent to the network in NAS signaling.

Patent Agency Ranking