Abstract:
A method implemented by a network element (NE), comprising receiving a classification message comprising a classification rule for identifying a service function chain (SFC) in a network, wherein the SFC comprises an ordered set of service functions (SFs) that provides services to an application, and a dynamic application-specific contextual data associated with an operation of the application, receiving a first of a plurality of application data packets, determining that the first of the application data packets matches the classification rule, generating a first SFC packet by adding the dynamic application-specific contextual data to the first of the application data packets according to the classification rule to enable communication of the dynamic application-specific contextual data to at least one of the SFs in the SFC, and sending the first SFC packet towards a next NE according to an SF path in the network associated with the SFC.
Abstract:
A call media session restoration method comprising detecting a network reconnection triggering event that disconnects a media session for a client and a relay connection on a network device for the media session, sending a relay address allocation request to the network device, wherein the relay address allocation request comprises a session update attribute that identifies the relay connection, receiving a user authentication request message from the network device, authenticating the relay address allocation request with the network device, wherein the relay address allocation request is authenticated in accordance with the user authentication request message, and wherein authenticating the relay address allocation request comprises resending the session update attribute, and performing a connectivity check between the client and a peer via the relay connection, wherein performing the connectivity check restores the media session and the relay connection and reuses the relay address for the relay connection.
Abstract:
An intruder detection method is provided, comprising a security server sending a verification prompt to a device in a controlled-access area, based on an entry indication of an entrant into the controlled-access area, with the verification prompt indicating the entrant should perform a predefined verification action, the security server receiving entrant behavior information, the security server comparing the entrant behavior information to a behavior model of a set of authorized persons associated with the controlled-access area, with the behavior model including the verification prompt, and the security server generating an intruder indication if the entrant behavior information does not match a behavior sequence included in the behavior model.
Abstract:
An intruder detection method is provided, comprising a security server sending a verification prompt to a device in a controlled-access area, based on an entry indication of an entrant into the controlled-access area, with the verification prompt indicating the entrant should perform a predefined verification action, the security server receiving entrant behavior information, the security server comparing the entrant behavior information to a behavior model of a set of authorized persons associated with the controlled-access area, with the behavior model including the verification prompt, and the security server generating an intruder indication if the entrant behavior information does not match a behavior sequence included in the behavior model.
Abstract:
Various disclosed embodiments include methods and systems for provisioning traversal using relays around network address translation (TURN) credentials and servers for network address translation/firewall (NAT/FW) traversal via a Voice-over-Internet-protocol/Web Real-Time Communication (VoIP/WebRTC) signaling channel. The method comprises receiving, at a signaling gateway, a signaling message from a first electronic device (ED) when the first electronic device registers with the signaling gateway or sends other signaling messages for requesting a TURN credential. The signaling message comprises one or more signaling message parameters. The signaling message further comprises a request that the signaling gateway generate a TURN credential for the first electronic device, the TURN credential associated with the one or more signaling message parameters. The method comprises sending, from the signaling gateway, the TURN credential to the first electronic device.
Abstract:
Various disclosed embodiments include methods and systems for network address translation traversal. The method comprises receiving, at a Voice over Internet Protocol (VoIP) server, a registration message from a first user equipment (UE). The registration message includes an Interactive Connectivity Establishment (ICE) capability of the first UE, and a request that the VoIP server generate ICE parameters for the first UE when the first UE makes a call to a second UE. The ICE parameters include a Traversal Using Relays around NAT (TURN) long-term credential. The method comprises sending, from the VoIP server, the TURN long-term credential to the first UE.
Abstract:
Various disclosed embodiments include methods and systems for provisioning traversal using relays around network address translation (TURN) credentials and servers for network address translation/firewall (NAT/FW) traversal via a Voice-over-Internet-protocol/Web Real-Time Communication (VoIP/WebRTC) signaling channel. The method comprises receiving, at a signaling gateway, a signaling message from a first electronic device (ED) when the first electronic device registers with the signaling gateway or sends other signaling messages for requesting a TURN credential. The signaling message comprises one or more signaling message parameters. The signaling message further comprises a request that the signaling gateway generate a TURN credential for the first electronic device, the TURN credential associated with the one or more signaling message parameters. The method comprises sending, from the signaling gateway, the TURN credential to the first electronic device.
Abstract:
A method and device for providing a key for IoT communication are disclosed. The method includes an embodiment whereby an IoT device transmits a security code to a personal electronic device, derives a first security key and a second security key from the security code, protects outgoing communication with a control device based on the first security key, and protects outgoing communication with the personal electronic device based on the second security key.
Abstract:
A call establishing method comprising registering with a server to obtain authorization credentials, obtaining a client encryption key using the authorization credentials, wherein the client encryption key is uniquely associated with a web session, establishing a media session for the web session, creating a client side call state for the media session using the client encryption key, wherein the client side call state comprises call information that is associated with the web session and the media session, and wherein the client side call state is encrypted using the client encryption key, and storing the client side call state within a network device.
Abstract:
Various disclosed embodiments include methods and systems for network address translation traversal. The method comprises receiving, at a Voice over Internet Protocol (VoIP) server, a registration message from a first user equipment (UE). The registration message includes an Interactive Connectivity Establishment (ICE) capability of the first UE, and a request that the VoIP server generate ICE parameters for the first UE when the first UE makes a call to a second UE. The ICE parameters include a Traversal Using Relays around NAT (TURN) long-term credential. The method comprises sending, from the VoIP server, the TURN long-term credential to the first UE.