Abstract:
An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (SID). The application identifier identifies the application and the SID uniquely identifies a session between the application and a destination network device. The authentication device decrypts, using a first private key of a first public/private key pair, the encrypted SID to produce a decrypted SID; and determines a first hash value of certain data that includes the application identifier and session information associated with the session. The authentication device further encrypts, using a second public key of a second public/private key pair, the determined first hash value and the decrypted SID to produce an authentication token comprising the encrypted first hash value and the SID; and sends the authentication token to the application at the mobile device.
Abstract:
A network device receives registration information for a vendor application that selectively provides access to toll-free data for users. The registration information include a vendor account to which data charges can be billed. In response to the registration information, the network device sends a token corresponding to the vendor application. The network device receives, from a vendor device, an application programming interface (API) call that includes the token, a data flow identifier, and flow information. The flow information identifies a particular data flow directed to a copy of the vendor application residing on a user device. The network device validates the token; causes data charges for particular data packets, corresponding to the flow information, to be billed to the vendor account; and sends, to the vendor device, a response to the API call that includes the data flow identifier.
Abstract:
A method includes receiving readings from a plurality of Internet of Things (IoT) devices. The method identifies rules associated with the readings from the IoT devices and determines a three dimensional (3D) dataset based on the plurality of IoT devices, the readings and rules associated with the readings from the plurality of IoT devices. The method includes determining policies to be applied to routing of the readings based on rules for dividing the readings into subsets of the 3D dataset, and routing processing for subsets of the readings to be processed in parallel by processing units based on the policies. The method further includes processing the readings to generate a list of actions, and resolving the conflicts in the list of actions based on a multi-phase queue. The method also includes executing the actions.
Abstract:
A device can receive, from a network device, information that identifies a user device. The network device might have authenticated the user device based on the user device accessing a radio access network. The device can receive, from the user device, a request for a first token. The request can include an encrypted session identifier. A server device might have encrypted the session identifier. The device can determine the session identifier, and generate the first token based on the session identifier and the information that identifies the user device. The device can encrypt the first token using an application public key, and provide, to the user device, the encrypted first token. The user device can provide, to the server device, the encrypted first token. The server device can register the user device to receive content based on the encrypted first token.
Abstract:
A device can receive, from a user device, a transmission control protocol (TCP) synchronize (SYN) packet associated with a request to establish a TCP connection with a server device. The device can prevent a first TCP connection from being established between the device and the user device based on the TCP SYN packet. The device can cause a second TCP connection to be established between the device and the server device based on the TCP SYN packet and after preventing the first TCP connection from being established. The device can cause a third TCP connection to be established between the device and the user device after causing the second TCP connection to be established. The device can transfer network traffic between the user device and the server device based on the second TCP connection and the third TCP connection.
Abstract:
A device can receive, from a network device, information that identifies a user device. The network device might have authenticated the user device based on the user device accessing a radio access network. The device can receive, from the user device, a request for a first token. The request can include an encrypted session identifier. A server device might have encrypted the session identifier. The device can determine the session identifier, and generate the first token based on the session identifier and the information that identifies the user device. The device can encrypt the first token using an application public key, and provide, to the user device, the encrypted first token. The user device can provide, to the server device, the encrypted first token. The server device can register the user device to receive content based on the encrypted first token.
Abstract:
Systems and methods described herein provide redundant functionality for multi-cloud high availability continuous service provisioning. Service rule configuration of regional internet services platforms at different geographical locations are provisioned through a multi-cloud provisioning platform. The systems and methods provide that there is no disruption of service provisioning, in the event of a failure of one cloud provisioning platform, as long as at least one other cloud provisioning platform is available. In the event of a cloud disaster outage at one cloud provisioning platform, a regional internet services platform will automatically register with another active cloud provisioning platform.
Abstract:
A device may receive campaign information for deploying a toll-free data service campaign. The campaign information may identify a uniform resource identifier for accessing a toll-free data service associated with the toll-free data service campaign. The device may determine a host name included in the uniform resource identifier. The device may determine a network address associated with the host name. The device may modify the uniform resource identifier, to generate a modified uniform resource identifier for accessing the toll-free data service, by replacing the host name, included in the uniform resource identifier, with the network address. The device may deploy the toll-free data service campaign by providing, to an enforcement device, the modified uniform resource identifier.
Abstract:
A device may receive first data items and second data items that may have been output by sensor devices. The device may add, to a node in a data structure, at least some of the first data items. The device may divide the node to create subnodes that correspond to subregions of a geographic region. The device may add, to at least one of the subnodes, at least some of the second data items. The device may generate a probability of a first relationship, between the first data items and the second data items, based on determining subnodes that include a first data item and determining subnodes that exhibit a predefined second relationship with a second data item. The device may send, to another device, the probability of the first relationship to support location-based services.
Abstract:
A method includes receiving readings from a plurality of Internet of Things (IoT) devices. The method identifies rules associated with the readings from the IoT devices and determines a three dimensional (3D) dataset based on the plurality of IoT devices, the readings and rules associated with the readings from the plurality of IoT devices. The method includes determining policies to be applied to routing of the readings based on rules for dividing the readings into subsets of the 3D dataset, and routing processing for subsets of the readings to be processed in parallel by processing units based on the policies. The method further includes processing the readings to generate a list of actions, and resolving the conflicts in the list of actions based on a multi-phase queue. The method also includes executing the actions.