Originator-based network restraint system for identity-oriented networks

    公开(公告)号:US10659497B2

    公开(公告)日:2020-05-19

    申请号:US15639976

    申请日:2017-06-30

    Abstract: A computer-implemented method of extending generic resilient identity services (GRIDS) is provided that comprises: receiving, by a mapping server, a resolve request from an originator endpoint for a locator of a destination endpoint; sending, by the mapping server, a request for authorization to provide the requested locator, the request for authorization indicating an identifier of the originator endpoint; receiving, by a policy server, the request for authorization; accessing, by the policy server, from a database, a set of policies for the destination endpoint; based on the identifier of the originator endpoint and the set of policies for the destination endpoint, sending, by the policy server, an authorization response to the mapping server; and based on the authorization response, sending, by the mapping server, a response to the resolve request to the originator endpoint.

    Identifier-based resolution of identities

    公开(公告)号:US10530659B2

    公开(公告)日:2020-01-07

    申请号:US15924919

    申请日:2018-03-19

    Abstract: An apparatus in an IP network, the apparatus comprises: a receiver configured to: obtain an identity of a first entity, the identity is a unique identification of the first entity at a given time, obtain a first identifier of the identity, and obtain a second identifier of the identity, the first identifier and the second identifier are identifications of the identity; and a processor coupled to the receiver and configured to: create an association of the first identifier and the second identifier with the identity, and instruct storage of the association in a database.

    Predictive Routing For Mobility
    4.
    发明申请

    公开(公告)号:US20190306776A1

    公开(公告)日:2019-10-03

    申请号:US16445522

    申请日:2019-06-19

    Abstract: A method of utilizing a list of predictive paths by a map-server. The method includes receiving the list of predictive paths, storing the list of predictive paths in a memory, receiving, from a first network element, a request for a location of a user device, the request related to transmitting a packet to the user device, and transmitting, to the first network element, a plurality of user locations based on the list of predictive paths, the plurality of user locations identifying where a second user device will transmit the packet when the packet is received by the second user device.

    Monitoring, measuring, analyzing communication flows between identities in an identity-enabled network using IPFIX extensions

    公开(公告)号:US10389630B2

    公开(公告)日:2019-08-20

    申请号:US15640087

    申请日:2017-06-30

    Abstract: A computer-implemented method of monitoring communication flows between identities is provided that comprises: accessing a first data packet that indicates a source identifier, a destination identifier, a first source locator, and a first destination locator; accessing a second data packet that indicates the source identifier, the destination identifier, a second source locator, and a second destination locator, the second destination locator being different from the first destination locator; storing data regarding the first data packet and the second data packet in a single ID flow record based on a determination that the source identifier of the first data packet matches the source identifier of the second data packet and a determination that the destination identifier of the first data packet matches the destination identifier of the second data packet; and based on the single ID flow record, adjusting a resource allocation.

    ID-BASED DATA PLANE SECURITY FOR IDENTITY-ORIENTED NETWORKS

    公开(公告)号:US20190007211A1

    公开(公告)日:2019-01-03

    申请号:US15640156

    申请日:2017-06-30

    Abstract: A computer-implemented method of transmitting encrypted data comprises accessing, by one or more processors of an origination endpoint, first data to be transmitted to a destination having a corresponding identifier; generating, by the one or more processors, an identifier security header; generating, by the one or more processors, second data from the first data and the identifier security header; encrypting, by the one or more processors, the second data; generating, by the one or more processors, authentication data based on the encrypted second data; generating, by the one or more processors, third data from the encrypted second data and the authentication data; generating, by the one or more processors, fourth data from the identifier corresponding to the destination and the third data; and sending, by the one or more processors, the fourth data to the destination.

    ORIGINATOR-BASED NETWORK RESTRAINT SYSTEM FOR IDENTITY-ORIENTED NETWORKS

    公开(公告)号:US20180337950A1

    公开(公告)日:2018-11-22

    申请号:US15639976

    申请日:2017-06-30

    Abstract: A computer-implemented method of extending generic resilient identity services (GRIDS) is provided that comprises: receiving, by a mapping server, a resolve request from an originator endpoint for a locator of a destination endpoint; sending, by the mapping server, a request for authorization to provide the requested locator, the request for authorization indicating an identifier of the originator endpoint; receiving, by a policy server, the request for authorization; accessing, by the policy server, from a database, a set of policies for the destination endpoint; based on the identifier of the originator endpoint and the set of policies for the destination endpoint, sending, by the policy server, an authorization response to the mapping server; and based on the authorization response, sending, by the mapping server, a response to the resolve request to the originator endpoint.

    ID-based data plane security for identity-oriented networks

    公开(公告)号:US10764050B2

    公开(公告)日:2020-09-01

    申请号:US15640156

    申请日:2017-06-30

    Abstract: A computer-implemented method of transmitting encrypted data comprises accessing, by one or more processors of an origination endpoint, first data to be transmitted to a destination having a corresponding identifier; generating, by the one or more processors, an identifier security header; generating, by the one or more processors, second data from the first data and the identifier security header; encrypting, by the one or more processors, the second data; generating, by the one or more processors, authentication data based on the encrypted second data; generating, by the one or more processors, third data from the encrypted second data and the authentication data; generating, by the one or more processors, fourth data from the identifier corresponding to the destination and the third data; and sending, by the one or more processors, the fourth data to the destination.

Patent Agency Ranking