GLOBAL IDENTIFICATION OF DEVICES BASED ON DESIGNATED IPv6 ADDRESS

    公开(公告)号:US20190260577A1

    公开(公告)日:2019-08-22

    申请号:US15901202

    申请日:2018-02-21

    Abstract: A method, a device, and a non-transitory storage medium are described in which a global identification service is provided. The service includes a selection of an Internet Protocol version 6 (IPv6) address to an end device. The service encrypts a unique identifier of the end device with an encryption key to generate an IPv6 address. The service verifies whether the IPv6 address is an IPv6 address allocated to or owned by a service provider. When the IPv6 address is an allocated or owned IPv6 address, the IPv6 address is assigned to the end device. When the IPv6 address is not an allocated or owned IPv6 address, the service selects another encryption key until a suitable IPv6 address is generated. Subsequent to an assignment of the IPv6 address, a network uses the IPv6 address as a globally unique identifier for the end device.

    Mobile edge computing
    23.
    发明授权

    公开(公告)号:US11388222B2

    公开(公告)日:2022-07-12

    申请号:US15971803

    申请日:2018-05-04

    Abstract: A wireless network device can receive, at a traffic director in a kernel space, a data packet from a client device and determine whether the data packet is intended for an application cloud server operating in a cloud environment. The wireless network device can provide, based on determining that the data packet is intended for the application cloud server, the data packet to an application server instance executing on the wireless network device. The application server instance can be implemented in a virtualized software container in a user space, and can be configured to perform one or more operations associated with the application cloud server. The wireless network device can receive, at the traffic director and from the application server instance, a result of the application server instance performing the one or more operations on the data packet, and transmit the result to the application cloud server.

    Systems and methods for network performance monitoring, event detection, and remediation

    公开(公告)号:US11089516B2

    公开(公告)日:2021-08-10

    申请号:US16712071

    申请日:2019-12-12

    Abstract: A system described herein may provide a technique for selecting and configuring a capture component and a filtering and analysis component for traffic capture in a manner that suitably accounts for Service Level Agreements (“SLAs”) of traffic to be captured. A traffic capture request may indicate one or more SLAs and/or other attributes, and an orchestration system may identify a network function (such as a User Plane Function (“UPF”) of a wireless network) that handles traffic that includes the requested traffic and instantiate the capture component at a node that implements the network function. The orchestration system may select a node, from a cluster of nodes, that is able to filter and analyze the traffic in an expedient manner in accordance with SLA(s) associated with the requested traffic, and install the filtering and analysis component at the selected node.

    SYSTEMS AND METHODS FOR NETWORK PERFORMANCE MONITORING, EVENT DETECTION, AND REMEDIATION

    公开(公告)号:US20210185565A1

    公开(公告)日:2021-06-17

    申请号:US16712071

    申请日:2019-12-12

    Abstract: A system described herein may provide a technique for selecting and configuring a capture component and a filtering and analysis component for traffic capture in a manner that suitably accounts for Service Level Agreements (“SLAs”) of traffic to be captured. A traffic capture request may indicate one or more SLAs and/or other attributes, and an orchestration system may identify a network function (such as a User Plane Function (“UPF”) of a wireless network) that handles traffic that includes the requested traffic and instantiate the capture component at a node that implements the network function. The orchestration system may select a node, from a cluster of nodes, that is able to filter and analyze the traffic in an expedient manner in accordance with SLA(s) associated with the requested traffic, and install the filtering and analysis component at the selected node.

    SYSTEMS AND METHODS FOR CONGESTION CONTROL ON MOBILE EDGE NETWORKS

    公开(公告)号:US20210105659A1

    公开(公告)日:2021-04-08

    申请号:US16593063

    申请日:2019-10-04

    Abstract: A network device receives, from a congestion controller, traffic policy information associated with a data stream between a sender and a receiver, where the traffic policy information includes a maximum round trip delay time (RTT) and a maximum throughput rate (Rate). The network device obtains a receiver advertised window size (RWND) for the receiver for the data stream. The network device modifies the RWND based on the RTT and the Rate to produce a modified receiver window size (RWND′) and sends the RWND′ to the sender for use in controlling congestion on the data stream between the sender and the receiver.

    Global identification of devices based on designated IPv6 address

    公开(公告)号:US10652012B2

    公开(公告)日:2020-05-12

    申请号:US15901202

    申请日:2018-02-21

    Abstract: A method, a device, and a non-transitory storage medium are described in which a global identification service is provided. The service includes a selection of an Internet Protocol version 6 (IPv6) address to an end device. The service encrypts a unique identifier of the end device with an encryption key to generate an IPv6 address. The service verifies whether the IPv6 address is an IPv6 address allocated to or owned by a service provider. When the IPv6 address is an allocated or owned IPv6 address, the IPv6 address is assigned to the end device. When the IPv6 address is not an allocated or owned IPv6 address, the service selects another encryption key until a suitable IPv6 address is generated. Subsequent to an assignment of the IPv6 address, a network uses the IPv6 address as a globally unique identifier for the end device.

    Controlling a congestion window size

    公开(公告)号:US10361963B2

    公开(公告)日:2019-07-23

    申请号:US15150778

    申请日:2016-05-10

    Abstract: A device may determine one or more round-trip time threshold values and may determine a round-trip time value associated with a flow. The device may determine a smoothed round-trip time value based on the one or more round-trip time threshold values and the round-trip time value. The device may determine a congestion window threshold value based on the smoothed round-trip time value and may determine a congestion window value based on the congestion window threshold value. The device may provide traffic associated with the flow based on the congestion window value.

    HARDWARE IDENTIFICATION-BASED SECURITY AUTHENTICATION SERVICE FOR IoT DEVICES

    公开(公告)号:US20180338242A1

    公开(公告)日:2018-11-22

    申请号:US15597243

    申请日:2017-05-17

    Abstract: A method, a device, and a non-transitory storage medium are provided to store a hardware identifier that uniquely identifies the IoT device; perform an attachment procedure with a wireless network, wherein the attachment procedure includes authenticating the IoT device by the wireless network and establishing a bearer connection; establish a secure channel with a first network device via the bearer connection, in response to successfully completing the attachment procedure; transmit, to the first network device, a first request to authenticate the IoT device, wherein the first request includes the hardware identifier; receive, from the first network device, a first response that indicates whether the IoT device is authenticated; determine that the IoT device is authenticated based on the first response; and transmit, to the first network device, a second request for a key in response to a determination that the IoT device is authenticated.

    Real-time traffic analysis over mobile networks

    公开(公告)号:US10084712B1

    公开(公告)日:2018-09-25

    申请号:US15467762

    申请日:2017-03-23

    Abstract: A device can determine a set of flow characteristics associated with an encrypted traffic flow. The set of flow characteristics can include a cumulative length of payload packets included in the encrypted traffic flow, an average payload length of the payload packets, and a throughput associated with the encrypted traffic flow. The device can determine, based on the set of flow characteristics, whether the encrypted traffic flow is likely to be a video traffic flow. The device can cause the encrypted traffic flow to be managed based on whether the encrypted traffic flow is likely to be a video traffic flow.

Patent Agency Ranking