REDUCING AUTHENTICATION STEPS DURING WI-FI AND 5G HANDOVER

    公开(公告)号:US20210112408A1

    公开(公告)日:2021-04-15

    申请号:US16865959

    申请日:2020-05-04

    Abstract: Technologies for systems, methods and computer-readable storage media for reducing the time to complete authentication during inter-technology handovers by reusing security context between 5G and Wi-Fi. Assuming, that the administrative domain for Wi-Fi and 5G match (and belongs to an enterprise for instance), using an already established security context in one technology to do fast authentication in the other technology during handover. Specifically, if UE is on Wi-Fi and handing over to 5G, use its Wi-Fi security context to do fast security setup in 5G, which includes a corresponding method for use when the UE goes from 5G to Wi-Fi.

    METHODS TO ENABLE WI-FI ONBOARDING OF USER EQUIPMENT BY UTILIZING AN ESIM

    公开(公告)号:US20210112382A1

    公开(公告)日:2021-04-15

    申请号:US16895695

    申请日:2020-06-08

    Abstract: Systems and methods are provided for providing, by a user equipment, a short message service (SMS) message to initiate Wi-Fi onboarding to a mobile network, receiving, by the user equipment, a binary SMS message including a request for a certificate signing request by a server, generating, by the user equipment, the certificate signing request based on the request for the certificate signing request of the binary SMS message, providing, by the user equipment, the certificate signing request to the mobile network, and receiving, by the user equipment, a binary SMS message including Wi-Fi login data based on the certificate signing request provided to the mobile network.

    Underlay overlay correlation for visibility and debugging

    公开(公告)号:US10476784B2

    公开(公告)日:2019-11-12

    申请号:US15263405

    申请日:2016-09-13

    Abstract: A network device may receive a flow having source information corresponding to a first client device and destination information corresponding to a second client device. A tag may then be created by the network device for the flow based upon the source information and the destination information. Next, the network device may encapsulate a packet corresponding to the flow. The packet may be encapsulated with encapsulation information including the created tag. The encapsulated packet may then be routed through a plurality of intermediate network devices in the network. The created tag encapsulated with the packet may identify the packet as being a part of the flow as the packet is routed through the plurality of intermediate network devices.

    Computer network control for application instantiation

    公开(公告)号:US10200311B2

    公开(公告)日:2019-02-05

    申请号:US15260048

    申请日:2016-09-08

    Abstract: An application switch instantiates two application-side network service instances for the same application. Each network service instance is characterized by a common Internet Protocol (IP) address, a common Open Systems Interconnection (OSI) reference model layer 2 (L2) media access control (MAC) address, and a unique (for the application) supplemental L2 identifier. The application switch maintains a mapping between a {client IP address, client port} tuple and a particular instantiated network service instance based at least in part on the supplemental L2 identifier of a particular one of the instantiated first and second network service instances. When the application switch receives a client communication via an application switch client-side network, the application switch determines the particular instantiated network service instance corresponding to the { , } tuple based on the mapping, and switches the received client communication to the determined application-side network service instance.

    RENDERING NETWORK POLICY AND MONITORING COMPLIANCE
    38.
    发明申请
    RENDERING NETWORK POLICY AND MONITORING COMPLIANCE 有权
    渲染网络政策和监控合规性

    公开(公告)号:US20160211988A1

    公开(公告)日:2016-07-21

    申请号:US14725015

    申请日:2015-05-29

    Abstract: In one embodiment, a network controller receives data indicative of one or more traffic requirements for network traffic. The network controller maps the data indicative of the one or more traffic requirements into a network policy. The network controller causes installation of the network policy onto one or more networking devices. The one or more networking devices are configured to route the network traffic based on the network policy. The network controller receives feedback regarding the installed network policy. The network controller adjusts the network policy based on the received feedback.

    Abstract translation: 在一个实施例中,网络控制器接收指示网络业务的一个或多个业务需求的数据。 网络控制器将指示一个或多个业务需求的数据映射到网络策略中。 网络控制器将网络策略安装到一个或多个网络设备上。 一个或多个网络设备被配置为基于网络策略路由网络流量。 网络控制器收到有关安装的网络策略的反馈。 网络控制器根据收到的反馈调整网络策略。

Patent Agency Ranking