BLOCKCHAIN-BASED AUDITING, INSTANTIATION AND MAINTENANCE OF 5G NETWORK SLICES

    公开(公告)号:WO2020041037A1

    公开(公告)日:2020-02-27

    申请号:PCT/US2019/046298

    申请日:2019-08-13

    Abstract: Disclosed herein is a distributed ledger method for a fifth-generation (5G) network. A network slice is created in the 5G network and a root block is generated in response, containing parameters of the network slice and contracts between participants in the network slice. A blockID of the root block is transmitted to identified participants in the network slice, who sequentially commit a plurality of new blocks to a blockchain beginning from the root block. The plurality of new blocks comprises auditing information of the network slice, wherein the information is collected by the participants in the network slice. The blockchain is stored in a blockchain network of a plurality of disparate blockchains. Desired auditing information for the network slice is retrieved by using the blockID of the root block to traverse the blockchain beginning at the root block until all blocks with the desired auditing information have been read.

    OFFLOADED SECURITY AS A SERVICE
    3.
    发明申请
    OFFLOADED SECURITY AS A SERVICE 审中-公开
    卸载安全即服务

    公开(公告)号:WO2015072957A2

    公开(公告)日:2015-05-21

    申请号:PCT/US2013/046729

    申请日:2013-06-20

    CPC classification number: H04W12/02 H04L63/1408 H04W4/06

    Abstract: In one implementation, traffic in a mobile network is offloaded to a security as a service server or a cloud server. A mobile access gateway (MAG) in the mobile network identifies one or more mobile nodes that are configured for communication on the mobile network. The MAG receives a message that includes an address of a mobile node and sends a request based on the message to the security as a service server. The MAG forwards traffic flows to the security as a service server according to the message, which is configured to detect an indication of malicious software in the traffic flows and/or filter content of the traffic flows according to a user profile.

    Abstract translation: 在一个实现中,移动网络中的流量作为服务服务器或云服务器被卸载到安全性。 移动网络中的移动接入网关(MAG)识别被配置用于在移动网络上进行通信的一个或多个移动节点。 MAG接收包含移动节点的地址的消息,并将基于该消息的请求作为服务服务器发送给安全性。 MAG根据该消息将流量转发到作为业务服务器的安全,该流量配置为根据用户配置文件检测流量中恶意软件的指示和/或过滤流量内容。

    SHORT TERM CERTIFICATE MANAGEMENT DURING DISTRIBUTED DENIAL OF SERVICE ATTACKS
    4.
    发明申请
    SHORT TERM CERTIFICATE MANAGEMENT DURING DISTRIBUTED DENIAL OF SERVICE ATTACKS 审中-公开
    分布式拒绝服务攻击期间的短期证书管理

    公开(公告)号:WO2017196558A1

    公开(公告)日:2017-11-16

    申请号:PCT/US2017/030042

    申请日:2017-04-28

    Abstract: In one embodiment, a distributed denial of service attack on a network is identified. In response to the distributed denial of service attack, a script to request a short term certificate is executed. The short term certificate is generated by a certificate server and received either directly or indirectly from the certificate server. An instruction to redirect traffic using the short term certificate and private key is sent to a distributed denial of service attack protection service that is operable to filter or otherwise mitigate malicious traffic involved in the distributed denial of service attack.

    Abstract translation: 在一个实施例中,识别网络上的分布式拒绝服务攻击。 为了响应分布式拒绝服务攻击,执行脚本以请求短期证书。 短期证书由证书服务器生成并直接或间接从证书服务器接收。 使用短期证书和私钥重定向流量的指令被发送到分布式拒绝服务攻击保护服务,该服务可用于过滤或以其他方式缓解涉及分布式拒绝服务攻击的恶意流量。

    OFFLOADED SECURITY AS A SERVICE
    7.
    发明公开
    OFFLOADED SECURITY AS A SERVICE 审中-公开
    放电安全性服务

    公开(公告)号:EP2910036A2

    公开(公告)日:2015-08-26

    申请号:EP13897259.1

    申请日:2013-06-20

    Abstract: In one implementation, traffic in a mobile network is offloaded to a security as a service server or a cloud server. A mobile access gateway (MAG) in the mobile network identifies one or more mobile nodes that are configured for communication on the mobile network. The MAG receives a message that includes an address of a mobile node and sends a request based on the message to the security as a service server. The MAG forwards traffic flows to the security as a service server according to the message, which is configured to detect an indication of malicious software in the traffic flows and/or filter content of the traffic flows according to a user profile.

Patent Agency Ranking