H04L63/10

5G network slicing with distributed ledger traceability and resource utilization inferencing

Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.

Access control with multiple security ecosystems

A method according to one embodiment includes monitoring, by an access control device, for changes to a first access control database stored on the access control device, wherein the first access control database is associated with a first security ecosystem having a first set of security protocols; automatically updating a mediation database stored on the access control device to identify a change to the first access control database in response to a determination that the change occurred; and automatically updating a second access control database stored on the access control device based on the change identified in the mediation database and in response to the automatic update of the mediation database, wherein the second access control database is associated with a second security ecosystem different from the first security ecosystem and having a second set of security protocols different from the first set.

System for securing a cyber-physical method
11711341 · 2023-07-25 · ·

The invention relates to an industrial system comprising machines, systems for controlling machines connected by a first communication network, and a gateway intended to connect the first communication network to a second communication network. The gateway comprises a memory and comprises a processor configured to copy to the memory first data transmitted over the second communication network and relating to the operation of the machines.

Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
11711369 · 2023-07-25 · ·

Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a requesting system, a data access request. After authenticating the requesting system, the computing platform may load, using a first data container, first source data from a data track. The computing platform may send the first source data to a second data container. Then, the computing platform may load, using the second data container, second source data from the data track and may produce a first combined dataset. The computing platform may send the first combined dataset to a third data container. Subsequently, the computing platform may load, using the third data container, third source data from the data track and may produce a second combined dataset. Thereafter, the computing platform may send, to the requesting system, the second combined dataset.

SYSTEM, APPARATUS AND METHOD FOR ENCRYPTING OVERLAY NETWORKS USING QUANTUM KEY DISTRIBUTION
20180013556 · 2018-01-11 ·

A network system is provided for improving network communication performance between a first client site and a second client site, the network system including: at least one client site network component bonding or aggregating one or more diverse network connections; and at least one network server component, configured to interoperate with the client site network component, the network server component including a server/concentrator that is implemented at an access point to a high performing network, between the client site network component and the network server component data traffic is carried to a network backbone of the high performing network, while maintaining management of data traffic so as to provide a managed network path that incorporates both at least the bonded/aggregated connection and at least one network path carried over the high performing network. The system uses quantum key distribution to encrypt the managed network path.

HETEROGENEOUS MEDIA SERVICES

Systems and methods adapted for providing heterogeneous media services in communication systems, such as using transport layer security deferral and/or medium redirect, are disclosed. In operation according to embodiments, heterogeneous media services may be facilitated by obtaining, by a hybrid broadcast receiver of a receiver device, a computer parsable object comprising information regarding content segment availability and access, wherein the hybrid broadcast receiver is adapted to obtain content via both broadcast and broadband connections for a streaming client of the receiver device. The hybrid broadcast receiver of embodiments may further operate to evaluate the computer parsable object for one or more content segment entries indicating transport layer security is to be invoked with respect to a connection used for obtaining one or more content segments and to overwrite the one or more content segment entries preventing the transport layer security from being invoked by the streaming client.

Enhanced token transfer

Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.

Dynamic functional partitioning for security pass-through virtual network function (VNF)
11711754 · 2023-07-25 · ·

A network device or system can operate to enable a security pass-through with a user equipment (UE) and further define various virtual functions between a physical access point (pAP) and a virtual AP (vAP) based on one or more communication link parameters (e.g., latency). The security pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the security pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network.

Authenticated service application sessions using visual authentication indicia
11711353 · 2023-07-25 · ·

Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products that are configured to provide authenticated access to a service application. The embodiments disclose an apparatus and system configured to launch an authenticated service application session in response to capturing authentication success rendering comprising visual authentication indicia. The authentication success rendering is a captured via a user device display, and includes visual authentication indicia. To facilitate rendering of the authentication success rendering, embodiments output a browser sign-in session request configured to launch a browser sign-in session associated with a browser application. Additionally, to facilitate capturing the rendering, embodiments initiate a display recorder module configured to capture, during the browser sign-in session and via the user device display, authentication success rendering comprising visual authentication indicia. Embodiments may be configured to parse the captured authentication success rendering to identify the visual authentication indicia, and decode the visual authentication indicia to identify user authentication data. Finally, embodiments may execute a service application sign-in protocol using the user authentication data to launch the authenticated service application session.

Active-active environment control
11709744 · 2023-07-25 · ·

The present disclosure provides a method, system, and device for security object synchronization at multiple nodes of an active-active environment. To illustrate, a source node may generate a corresponding security object sync request for each of multiple target nodes. The source node may send the security object sync request to the target nodes via a source queue and, for each target node, a corresponding distribution queue. A distribution queue may be closed based on an acknowledgement received from a corresponding target node, after a time period, or after a number of transmission attempts. A synchronization log may be maintained to indicate which security object sync requests have been delivered to which target nodes. In some implementations, the source node and the target nodes are part of an active-active environment that may be synchronized in time so the nodes resolve conflicts between received security object updates initiated from two different nodes.