Flexible data analytics processing and exposure in 5GC

    公开(公告)号:US12120200B2

    公开(公告)日:2024-10-15

    申请号:US17424663

    申请日:2020-01-21

    Abstract: Methods and systems for providing flexible information exposure in a Fifth Generation (5G) Core (5GC) and an Operations, Administration, and Maintenance (OAM) system are provided. According to one aspect of the present disclosure, a method, performed by a first network node of a 5GC for providing flexible information exposure in the 5GC and an OAM system, comprises: receiving, from a second network node, a request to register the second network node as a provider of data and/or a compute function; registering the second network node as a provider of the data and/or the compute function; storing information associating the second network node with the data and/or compute function provided by the second network node; and sending, to the second network node, a response to the request to register the second network node as a provider of data and/or a compute function.

    Formal verification of network changes

    公开(公告)号:US12081395B2

    公开(公告)日:2024-09-03

    申请号:US17410915

    申请日:2021-08-24

    Applicant: VMware LLC

    CPC classification number: H04L41/0816 H04L41/0886 H04L41/14 H04L47/2441

    Abstract: A network insight system that performs intent verification of network changes is provided. The system generates a first model of a network comprising a first set of one or more rule tables, each rule table described by one or more flow nodes. The system generates a second model of the network comprising a second set of one or more rule tables. Each rule table is described by one or more flow nodes. Each flow node specifies a set of packets and an action to be taken on the specified set of packets. They system determines a set of differential flow nodes for the second model based on the flow nodes of the first model and the flow nodes of the second model. Each differential flow node is classified as being one of (i) newly removed, (ii) newly added, and (iii) unaffected. The system verifies a network change based on the determined differential flow nodes.

    Network data analysis method, network data analysis functional network element and communication system

    公开(公告)号:US12047247B2

    公开(公告)日:2024-07-23

    申请号:US18020521

    申请日:2021-05-12

    Inventor: Song Zhao

    CPC classification number: H04L41/14

    Abstract: The present disclosure relates to the field of communications, and provides a network data analytics method, a network data analytics function (NWDAF) network element and a communication system. The NWDAF network element collects network data associated with an area of interest AOI, wherein the network data comprises energy-saving state information of a cell of the area of interest AOI. The network data associated with the area of interest AOI is analyzed by combining the energy-saving state information of the cell of the area of interest AOI, and the analysis result is output. The NWDAF network element can distinguish network data of the cell in the energy-saving state and the non-energy-saving state.

    Method and reproduction unit for reproducing protected messages

    公开(公告)号:US12034708B2

    公开(公告)日:2024-07-09

    申请号:US18005365

    申请日:2021-07-15

    Applicant: dSPACE GmbH

    Inventor: Bjoern Mueller

    CPC classification number: H04L63/0428 H04L41/14 H04L63/123

    Abstract: A method for sending registered secure messages via a messaging system to a receiver device that is to be tested includes: supplying first secure and still serialized messages from message packages for processing in a reproduction unit; in the first messages, reducing the data volume of the serialized messages; deserializing the reduced first messages and creating second secure messages by adding a second counter value in each case or, where applicable, by replacing a first counter value with the second counter value, and creating and adding a second authenticator in each case by using the second counter value, the encryption information, and the key, and by using the communication description or the information obtained by applying a data interpretation algorithm; and serializing the second secure messages and sending corresponding message packages to the receiver device to be tested.

Patent Agency Ranking