Abstract:
Federation policy exchange is provided in response to receiving a sharing query from an Access Point (AP) indicating that an associated wireless network supports federated identities with data sharing, determining whether the sharing query is within sharing preferences; and in response to determining that the sharing query is within the sharing preferences, transmitting, to the AP, a positive response for identity sharing that authorizes collection and sharing of identity data with at least one entity identified in a sharing policy for the associated wireless network. In various embodiments, federation policy exchange includes transmitting a support notification, via an AP, indicating support for federated identities with data sharing within a wireless network associated with the AP; and in response to receiving a first identify sharing preference from a User Equipment (UE) that indicates that negotiation is preferred, transmitting a sharing policy for the wireless network to the UE.
Abstract:
Techniques are described for integrating cellular access within an enterprise fabric. In one example, a method includes obtaining, by a cellular termination function via a cellular access point, a request from a client for data plane connectivity via a network, wherein the cellular access point is registered within the network and is in communication with a first switch of the network; obtaining, by the cellular termination function, cellular policy information and enterprise policy information for the client; obtaining, by the cellular termination function, an Internet Protocol (IP) address for the client; and establishing data plane connectivity for the client with the network via the cellular access point, the first switch of the network, and a second switch of the network based, at least in part, on the IP address for the client, wherein the second switch connects the network with one or more data networks.
Abstract:
An example method is provided in one example embodiment and may include receiving, at a packet data network gateway (PGW), a packet associated with an Internet Protocol (IP) flow of a user equipment (UE); identifying a routing rule associated with the IP flow, wherein the routing rule comprises routing access information that identifies whether the IP flow can be routed across a plurality of access networks using weighted link aggregation; and selecting a particular access network to facilitate communications for the IP flow of the UE based on the routing rule. In some cases, the selecting can include assigning the IP flow of the UE to a bearer established for the UE for the particular access network.
Abstract:
A method is provided in one example embodiment and may include configuring a slice identity for each of a plurality of virtual radio access network (vRAN) slices, wherein each vRAN slice comprises functionality to perform, at least in part, one or more radio protocol operations on subscriber traffic; configuring an allotment of radio resources that can be utilized by each vRAN slice of the plurality of vRAN slices; receiving, by a slice manager, a subscriber profile identity (SPID) for a subscriber; and mapping the SPID for the subscriber to a particular vRAN slice of the plurality of vRAN slices. The method can further include communicating the mapping for the subscriber to the particular vRAN slice to which the SPID is mapped. The method can further include communicating the allotment of radio resources that can be utilized by the particular vRAN slice to the particular vRAN slice.
Abstract:
An example method is provided in one example embodiment and may include subscribing to a key distribution service by a plurality of Wi-Fi access points belonging to a same mobility domain; receiving a request from a user equipment to connect to a first Wi-Fi access point of the plurality of Wi-Fi access points belonging to the same mobility domain; determining one or more second Wi-Fi access points of the plurality of Wi-Fi access points belonging to the same mobility domain that neighbor the first Wi-Fi access points; and distributing keying parameters to each of the one or more second Wi-Fi access points. The keying parameters can be associated with 802.11r pairwise master key (PMK) keying parameters.
Abstract:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.
Abstract:
System, methods, and computer-readable media for a Neutral Host (NH) operation of a 5G radio, whereby a NH operator receives feedback from hosts and determines to partition Physical Resource Block (PRB) resources. Thus, a NH system is provided that enables a third-party to independently operate other channels, whereby individual physical random access channels (PRACH) are operated by independent hosts. The NH system is able to indicate partitioned resources to individual hosts, including PRACH definition and mutually exclusive set of PRBs partitioned between tenants. The hosts operating in the NH system may be operable to implement their own independent schedulers, incorporating host specific logic, that can be configured with the partitioned resources but which may further operate independently of each other.
Abstract:
The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.
Abstract:
Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.
Abstract:
In one embodiment, a method can include: (i) performing an initial authentication with a mobile device in an access gateway, the access gateway being a point of attachment; (ii) forwarding a first message from the mobile device to an edge proxy; (iii) receiving a second message from the edge proxy; and (iv) returning a modified version of the second message to the edge proxy for a final authentication of the mobile device.