Application specific network slices

    公开(公告)号:US11824674B2

    公开(公告)日:2023-11-21

    申请号:US17509918

    申请日:2021-10-25

    CPC classification number: H04L12/189 H04L12/185 H04L12/1813 H04W28/20

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.

    DYNAMIC CUSTOMIZATION OF NETWORK CONTROLLER DATA PATH BASED ON CONTROLLER INTERNAL STATE AWARENESS

    公开(公告)号:US20230300019A1

    公开(公告)日:2023-09-21

    申请号:US17695312

    申请日:2022-03-15

    CPC classification number: H04L41/0654 H04L43/0876 H04L43/0823

    Abstract: Techniques for a network controller to manage its data path dynamically in a data network. The techniques include causing the network controller to enter a first state, wherein the first state is associated with first processing rules for processing usage data. The network controller receives first usage data from one or more network devices associated with the data network, processes the first usage data according to the first processing rules. Further, the network controller may detect an event associated with transitioning the network controller to a second state, which cause the network controller to transition from the first state into a second state, wherein the second state is associated with second processing rules for processing the usage data. Moreover, the network controller receives second usage data from the one or more network devices, and processes the second usage data according to the second processing rules.

    ENCRYPTED DATA PACKET FORWARDING
    13.
    发明公开

    公开(公告)号:US20230198964A1

    公开(公告)日:2023-06-22

    申请号:US17553375

    申请日:2021-12-16

    Abstract: A method of transmitting an encrypted data packet includes, with a processor, in response to receiving the encrypted data packet, executing an extended Berkeley packet filter (eBPF) application at an express data path (XDP) hook point located within a kernel space, determining whether the encrypted data packet is to be processed via a trusted application (TA) within a trusted execution environment (TEE) based on an analysis by the eBPF application, and identifying application intelligence data defining packet forwarding decisions based on a manner in which the encrypted data packet is processed.

    APPLICATION SPECIFIC NETWORK SLICES

    公开(公告)号:US20230132233A1

    公开(公告)日:2023-04-27

    申请号:US17509918

    申请日:2021-10-25

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.

    Verifying accuracy of ML pipelines using third party co-ordination

    公开(公告)号:US11070575B2

    公开(公告)日:2021-07-20

    申请号:US16293937

    申请日:2019-03-06

    Abstract: Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.

    Systems and methods for protecting a service mesh from external attacks on exposed software vulnerabilities

    公开(公告)号:US10999312B2

    公开(公告)日:2021-05-04

    申请号:US16406585

    申请日:2019-05-08

    Abstract: Systems and method handling software vulnerabilities in service meshes can include receiving information on software vulnerabilities from external feeds. From a services catalog which maintains data associated with service instances supported by a service mesh, one or more vulnerable service instances supported by the service mesh are identified. Notifications are provided to sidecar proxies associated with vulnerable service instances. The notifications include criteria such as criticality levels and categories associated with the software vulnerabilities. Based on destination policies for the vulnerable service instances, instructions are provided to the sidecar proxies to trip circuit breakers associated with the vulnerable service instances and thus prevent further access and cascading impact of the software vulnerabilities. The software vulnerabilities are reported to an orchestration system for the service mesh and a fix or different version of the vulnerable service instance is installed where possible.

    Secure remote access to a 5G private network through a private network slice

    公开(公告)号:US10785652B1

    公开(公告)日:2020-09-22

    申请号:US16567175

    申请日:2019-09-11

    Abstract: In one illustrative example, a network node may receive, from a user equipment (UE), a message indicating a token authorization request for access to a custom, enterprise private network slice of a 5G network. The message may include a token provided to the UE by an enterprise server of an enterprise private network of the enterprise. The network node may perform a token validation procedure and, based on a successful token validation, send a message for causing a provisioning of one or more rules in a forwarding entity of the 5G network, for causing enterprise user plane (UP) traffic of the UE to be forwarded to an anchor UPF of the private network slice. The enterprise UP traffic communication may be used for the remote control and/or monitoring of elements in a private 5G network of the enterprise.

    VERIFYING ACCURACY OF ML PIPELINES USING THIRD PARTY CO-ORDINATION

    公开(公告)号:US20200287919A1

    公开(公告)日:2020-09-10

    申请号:US16293937

    申请日:2019-03-06

    Abstract: Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.

Patent Agency Ranking