Abstract:
The present invention relates to a method performed in a memory available to a computation device, for providing a space puzzle, using functional encryption for key generation, encryption and decryption, comprising the steps of a) Computing, by a puzzle generating entity, 'PGE', a master secret key, 'MSK', and a public key, 'PK' b) Computing, by said PGE, a random predicate, 'RP', c) Computing, by said PGE, a secret key, 'SK', using said computed MSK and said computed RP, d) Providing, by said PGE, a challenge comprising said PK and said SK, to a proving computing entity, e) Computing, by said proving computing entity, a response to said challenge using the size of said RP by computing a higher dimensional virtual structure each dimension of said higher dimensional virtual structure being of said size of said RP, f) Encrypting each row of said higher dimensional structure with said PK, g) Decrypting said encrypted rows using said SK to obtain a decrypted predicate, h) Recomputing said RP using said decrypted predicate and said higher dimensional virtual structure. i) Verifying said provided challenge by comparing said recomputed RP with said random predicate.
Abstract:
A method for preserving privacy in an HTTP communication between a client and a server, the method comprising: intercepting an HTTP request that is sent from said client to said server; extracting a cookie from said HTTP request, wherein said cookie includes a cookie name and a cookie value; splitting said cookie value into information segments; and modifying one or more of said information segments based on predefined modification rules. Furthermore, a corresponding system is disclosed.
Abstract:
A method for performing path protection in an SDN network (1), comprises establishing protected connections, wherein each of said protected connections is between two endpoint switches (5) and includes a working path along a first set of intermediate switches (3) and at least one protection path along a second set of intermediate switches (3), providing metadata to said switches (3, 5), said metadata carrying information about the endpoint switches (5) of protected connections together with a unique identifier allocated to each or a group of said protected connections following the same path, by said intermediate switches (3), in case of experiencing a local port and/or link failure, using said metadata to generate a failure message towards endpoint switches (5) of the connections affected by said port and/or link failure, and by said endpoint switches (5), upon receiving a failure message, switching the affected connections from their working path to their at least one protection path.
Abstract:
The present invention relates to a method of forwarding packet flows in a network, wherein said packet flows originate from a plurality of end hosts (6) in the network and wherein said packet flows are transmitted from the respective one of said end hosts (6) to a sink node (8) via predefined routing paths. A routing path for packet flows of an end host (6) includes one or more SDN switches (2) that are under control of an SDN controller (4), wherein said one or more SDN switches (2) include an edge switch (7) having at least one port connected to said end host (6). The forwarding of a packet flow from a particular of said end hosts (6) by the respective edge switch (7) is enabled by means of a dedicated packet - door-opener packet - that, when being processed at said switches (2, 7), effectuates the activation or installation of a forwarding rule within said switches (2, 7) for forwarding said packet flow to the next switch along its routing path or to its final destination.
Abstract:
For providing an efficient resource allocation within a network a method for operating a wireless network is claimed, wherein the use of network resources is managed by a management entity within the network, wherein the management entity performs a network traffic forecast for a definable time period, wherein the network traffic forecast estimates expected traffic demands with a predefined or tunable confidence degree, divides forecasted available network resources into one or more classes of traffic reflecting different service quality within said classes using the confidence degree, and defines and allocates at least one network resource slice of said class or classes of traffic to operators and/or third parties for the time period considering an SLA of incoming service requests. Further, an according wireless network for carrying out the method and a management entity for managing the use of network resources within a wireless network are claimed.
Abstract:
A system is disclosed in which an application server sends, to an interworking function, a request for setting up sponsored data connectivity for one or more services provided by the application server. The request includes an application server identifier and packet flow description(s) associated with the one or more services. The interworking function determines, from the received information, information for forwarding to a core network node, and sends the information to the core network node for managing and/or storing respective policy charging control (PCC) rules associated with the one or more services. The interworking function can be a Service Capability Exposure Function.
Abstract:
The present invention relates to a method for perfornning CRAN process migration in a centralized radio access network, CRAN. The generic solution proposed here is to achieve seamless migration of CRAN processing utilizing traffic duplication by means of SDN rules on network devices and guard intervals for the data flows in order to start processing in a defined state on the node that is migrated to. In addition, a warm-up phase is implemented in the RAN application logic.
Abstract:
A method of performing network management for a shared Radio Access Network, RAN, infrastructure (3) provided by a mobile network operator, comprises managing said shared RAN infrastructure (3) by means of a master operator network manager (4) of said mobile network operator, said master operator network manager (4), upon receiving service requests from one or more tenants (2), allocating resources to accommodate said service requests, wherein said master operator network manager (4) cooperates with a capacity or resource broker (1) residing inside the network of said mobile network operator that considers information on the mobility of the user or the set of users involved in a particular service request for deciding on the resource allocations to said service request. Furthermore, a corresponding network management system for a shared Radio Access Network, RAN, infrastructure (3) is disclosed.
Abstract:
A method for querying semantic information stored across several semantically enhanced resources of a resource structure, particularly for a machine-to-machine application, is disclosed, wherein a semantic description is associated with each of the semantically enhanced resources. This method comprises the steps of: accessing a first semantically enhanced resource of the resource structure by a querying entity, wherein a first semantic description is associated with the first semantically enhanced resource, loading the first semantic description into a memory, analyzing the first semantic description, and loading into the memory a second semantic description associated with a second semantically enhanced resource of the resource structure, if a semantic element of the first semantic description contains a resource link, said resource link pointing to the second semantically enhanced resource. Additionally an according system for querying semantic information, a querying entity, a method for generating a resource structure and a database for enabling queries regarding semantic information stored across several semantically enhances resources are disclosed.
Abstract:
A Proxy Call Session Control Function, P-CSCF, comprises a transceiver and a controller. The transceiver receives a register request from a user equipment, UE, in a visited public land mobile network, VPLMN. The controller retrieves a network identifier, PLMN ID, for the VPLMN, queries a database for any local emergency number(s), and includes the PLMN ID for the VPLMN in a header and forwards the register request to a Serving Call Session Control Function, S-CSCF.