H04L61/45

Security management for network function messaging in a communication system

In a communication system wherein a first security edge protection proxy (SEPP) element of a first network is operatively coupled to a second SEPP element of a second network, a method includes receiving, at the first SEPP element, a first message from a first network function in the first network addressed to a second network function in the second network, the first message comprising one of a request and a response line comprising a uniform resource identifier (URI) having a plurality of elements. The method also includes forming, at the first SEPP, a second message comprising encrypted and integrity protected portions, the encrypted portion comprising an encryption of at least a subset of the plurality of elements of the URI, the integrity protected portion comprising a structured representation of the URI wherein instances of elements in the subset are replaced with references to the encrypted portion.

Security management for network function messaging in a communication system

In a communication system wherein a first security edge protection proxy (SEPP) element of a first network is operatively coupled to a second SEPP element of a second network, a method includes receiving, at the first SEPP element, a first message from a first network function in the first network addressed to a second network function in the second network, the first message comprising one of a request and a response line comprising a uniform resource identifier (URI) having a plurality of elements. The method also includes forming, at the first SEPP, a second message comprising encrypted and integrity protected portions, the encrypted portion comprising an encryption of at least a subset of the plurality of elements of the URI, the integrity protected portion comprising a structured representation of the URI wherein instances of elements in the subset are replaced with references to the encrypted portion.

Systems and methods for automatic pairing of devices
11785438 · 2023-10-10 · ·

A system comprising a user device having a user identifier (ID), short range communication interface, an application, and a software development kit (SDK) layer; a remote system communicatively coupled to the user device and the application, and configured to obtain the user ID, obtain a plurality of device IDs associated with a plurality of remote devices, associate the user ID with the plurality of device IDs, and provide the plurality of device IDs to the application based on the user ID; wherein the application is configured to receive the plurality of device IDs from the remote system, cause the user device to automatically pair with the plurality of remote devices based on receiving the plurality of device IDs, and receive data from a remote device of the plurality of remote device via the short range communication interface of the user device.

Email message receiving system in a cloud infrastructure

A new and improved onboarding process for configuring and activating an email message receiving system (EMRS) to accept and process email messages on behalf of a customer is disclosed. The process comprises generating a customer-account-specific Domain Name Server (DNS) name that identifies a customer of the EMRS and a mail server for accepting and processing email messages for a domain associated with the customer. The process includes providing the customer-account-specific DNS name to the customer, receiving a request to process email messages for the domain associated with the customer and identifying using the customer-account-specific DNS name, the mail server for receiving the email messages for the domain. The process further includes verifying, using the customer-account-specific DNS name, that the customer has permission for receiving the email messages for the domain. The process includes processing the email messages and delivering the messages to a destination system.

DHCP server IP address allocation improvement to nullify the impact of mac randomization
11765128 · 2023-09-19 · ·

A Dynamic Host Configuration Protocol (DHCP) server includes a memory storing computer-readable instructions, and a processor configured to execute the computer-readable instructions to determine a media access control (MAC) address associated with a client, determine the MAC address associated with the client is a randomized MAC address, and assign an IP address the client from a DHCP IP server pool. The processor assigns an IP address to the client from a DHCP IP server pool using one of identifying, in a DHCP server table, at least one host name of the client and assigning a previously assigned IP address to the at least one host name of the client, and when the host name of the client is not available, assigning the IP address using a first lease with a first duration shorter than a default lease duration used for non-randomized MAC addresses.

DYNAMICALLY UPDATING DISTRIBUTED CONTENT OBJECTS

A document object may be transmitted to a plurality of user devices. The document object may include at least one field for display of a content object of a group of content objects. The field may be associated with an identifier corresponding to the group of content objects. When the document object is accessed, then the access may trigger a request to a server, which may select a content object of the group of content objects using a content object identification function. The content object identification function may be dynamically updated based at least in part on the document object being accessed by one or more of the plurality of user devices. Responsive to the request, a unique content object identifier corresponding to the selected content object may be transmitted to the user device and displayed at the accessed document object.

METHOD AND SYSTEM FOR RESOURCE EXPOSURE IN KUBERNETES, AND DEVICE AND MEDIUM
20230319132 · 2023-10-05 ·

Disclosed is a method for resource exposure in kubernetes, including: in response to receiving a request for applying for a service resource, judging whether a mapping relationship between a label corresponding to a type of the service resource and virtual IPs exists in a first configuration file of a keepalived service; in response to absence of the mapping relationship, acquiring new virtual IPs and establishing, in the first configuration file, a mapping relationship between the new virtual IPs and the label; and binding the virtual IPs corresponding to the label in the first configuration file to a plurality of pods corresponding to the service resource, so as to expose the plurality of the pods outside a kubernetes cluster by the virtual IP. Further disclosed are a system, a computer device and a readable storage medium.

METHOD AND SYSTEM FOR RESOURCE EXPOSURE IN KUBERNETES, AND DEVICE AND MEDIUM
20230319132 · 2023-10-05 ·

Disclosed is a method for resource exposure in kubernetes, including: in response to receiving a request for applying for a service resource, judging whether a mapping relationship between a label corresponding to a type of the service resource and virtual IPs exists in a first configuration file of a keepalived service; in response to absence of the mapping relationship, acquiring new virtual IPs and establishing, in the first configuration file, a mapping relationship between the new virtual IPs and the label; and binding the virtual IPs corresponding to the label in the first configuration file to a plurality of pods corresponding to the service resource, so as to expose the plurality of the pods outside a kubernetes cluster by the virtual IP. Further disclosed are a system, a computer device and a readable storage medium.

Method and apparatus for providing secure internal directory service for hosted services
11750561 · 2023-09-05 · ·

A system and method for providing secure access to an organization's internal directory service from external hosted services. The system includes a remote directory service configured to accept directory service queries from an application running on hosted services. The remote directory service passes the queries to a directory service proxy server inside a firewall of the organization via a secure connection service. The directory service proxy server passes the queries to the internal directory service inside said firewall. Request responses from the internal directory service pass through the directory service proxy server to the remote directory service through said firewall via the secure connection service. The remote directory service returns the response to the requesting application.

SYSTEMS AND METHODS FOR GENERATING NEW RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES

Methods, systems, and storage media for generating new record objects based on electronic activities are disclosed. Example implementations may: access a plurality of electronic activities; access a plurality of record objects; parse an electronic activity of the plurality of electronic activities; determine, responsive to parsing the electronic activity, that the electronic activity is to be matched to one or more record objects; determine for each candidate record object that a match score indicating a likelihood of electronic activity being matched to the candidate record object is below a threshold; determine an object type of a new record object to generate based on one or more participants of the electronic activity; generate the new record object of the determined type; and store in a data structure an association between the new record object and the electronic activity.