TECHNIQUES FOR SELECTING NETWORK PROTOCOLS

    公开(公告)号:US20220167243A1

    公开(公告)日:2022-05-26

    申请号:US17105266

    申请日:2020-11-25

    Abstract: This disclosure describes techniques for selecting network protocols using heatmaps. For instance, a system may receive radio frequency information from one or more sources located within an environment. The system may then generate heatmaps using the radio frequency information, where the heatmaps represent characteristics associated with different network protocols. The characteristics may include signal strengths, throughputs, data packet drop rates, data packet retry rates, and/or the like for various locations within the environment. A user device may then receive the heatmaps from the system. Using a location of the user device and the heatmaps, the user device may determine to communicate using a network protocol from the different network protocols. The user device may then establish a connection using the network protocol.

    QUALITY OF SERVICE (QOS) FLOW MANAGEMENT FOR OPTIMIZING USE OF QOS RESOURCES AND SUPPORTING QOS GUARANTEES IN A PRIVATE 5G NETWORK

    公开(公告)号:US20220141703A1

    公开(公告)日:2022-05-05

    申请号:US17084150

    申请日:2020-10-29

    Abstract: In one illustrative example, a user plane function (UPF) may detect initial traffic for an application for a user equipment (UE) for which no current dedicated Quality of Service (QoS) flow is established. In response, the UPF may send, to a control plane function, a message which indicates a request for creating a dedicated QoS Flow for traffic for the application for the UE. The message may include flow metadata and an application identifier obtained in detecting the initial traffic. A QoS Flow may then be created for the traffic based on a selected QoS policy associated with the application identifier. Subsequently, the UPF may determine that a measured time period of traffic inactivity for the QoS Flow is outside a limit set by a threshold. Based on the determining, the UPF may send, to the control plane function, a message which indicates a request for deleting the QoS Flow.

    TECHNIQUES TO GENERATE WIRELESS LOCAL AREA ACCESS NETWORK FAST TRANSITION KEY MATERIAL BASED ON AUTHENTICATION TO A PRIVATE WIRELESS WIDE AREA ACCESS NETWORK

    公开(公告)号:US20210306854A1

    公开(公告)日:2021-09-30

    申请号:US17069047

    申请日:2020-10-13

    Abstract: Presented herein are techniques to provide for the ability to utilize 3GPP-generated Session Keys that can be generated via a primary authentication or a secondary authentication process for a user equipment (UE) via a private wireless wide area (WWA) access network in which the keys can be leveraged to facilitate connection of the UE to a wireless local area (WLA) access network. In one example, a method may include obtaining a request to authenticate a UE for connection to a WWA access network; determining that the UE is capable of a Fast Transition (FT) capability; authenticating the UE for connection to the WWA access in which, based on the FT capability, the authenticating includes generating a root security key for the UE; and upon determining that the UE is attempting to access the WLA access network, providing the root security key for the UE to the WLA access network.

    BOOTSTRAPPING FAST TRANSITION (FT) KEYS ON WIRELESS LOCAL AREA ACCESS NETWORK NODES BASED ON PRIVATE WIRELESS WIDE AREA ACCESS NETWORK INFORMATION

    公开(公告)号:US20210306850A1

    公开(公告)日:2021-09-30

    申请号:US17069056

    申请日:2020-10-13

    Abstract: Presented herein are techniques to provide for the ability to optimize the caching of Fast Transition (FT) hierarchical keys based on a derived or statically defined neighbor relationship between wireless wide area (WWA) access network nodes and wireless local area (WLA) access network nodes and also user equipment (UE) mobility triggers in the WWA access network. In one example, a method may include instructing a UE to report detection of a WLA access network and based, at least in part, on obtaining a notification via a WWA access node indicating UE detection of the WLA access network, identifying WLA access nodes that neighbor the WWA access node. The method may further include generating FT key material for the UE and communicating a portion of the FT key material to the WLA access nodes that neighbor the WWA access node to facilitate authenticating the UE to the WLA access network.

    TECHNIQUES FOR DECOUPLING AUTHENTICATION AND SUBSCRIPTION MANAGEMENT FROM A HOME SUBSCRIBER SERVER

    公开(公告)号:US20210185506A1

    公开(公告)日:2021-06-17

    申请号:US16896399

    申请日:2020-06-09

    Abstract: Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.

    Multipath subflow anchoring for security policy enforcement

    公开(公告)号:US10992712B2

    公开(公告)日:2021-04-27

    申请号:US15906288

    申请日:2018-02-27

    Abstract: A policy server determines and explicitly provides a source host with a multipath access policy. The policy server obtains a notification that the source host is connected to an access network. The notification includes authentication credentials of a user of the source computing device. The policy server determines a multipath policy based on the authentication credentials. The multipath policy determines whether data flows from the source host are transmitted over multiple network connections. The policy server determines a set of one or more multipath proxy devices based on the authentication credentials, and provides an access policy to the source host. The access policy includes the multipath policy and network addresses associated with the multipath proxy devices.

Patent Agency Ranking