Patent classifications
H04L69/22
Communication Method, Communication Apparatus, and Communication Device
A communication method includes: generating an extremely high-throughput physical layer protocol data unit (EHT PPDU), the EHT PPDU comprises a legacy physical layer preamble and a new physical layer preamble, wherein the legacy physical layer preamble comprises a legacy short training field (L-STF), a legacy long training field (L-LTF), a legacy signal (L-SIG) field in turn, a first field of the new physical layer preamble is a repeat of a field in the legacy physical layer preamble and is modulated by binary phase shift keying, BPSK; and sending the PPDU.
RADIO ACCESS NETWORK (RAN) ARCHITECTURE
A method for steering an original packet transmitted by a UE. The method includes receiving a first packet, wherein the first packet encapsulates the original packet. The method also includes extracting networking information (e.g., IP source, IP destination, tunnel identifier) from the first packet. The method also includes generating an SFC header (e.g., an NSH header), wherein the SFC header comprises: i) an SPI that identifies a service path and ii) metadata, wherein the metadata comprises the networking information extracted from the first packet. The method also includes generating a second packet comprising the SFC header and the original packet. The method also includes providing the second packet to an SFF that is configured to select a service path based on the SPI included in the SFC header of the second packet and forward the second packet based on the selected service path.
RADIO ACCESS NETWORK (RAN) ARCHITECTURE
A method for steering an original packet transmitted by a UE. The method includes receiving a first packet, wherein the first packet encapsulates the original packet. The method also includes extracting networking information (e.g., IP source, IP destination, tunnel identifier) from the first packet. The method also includes generating an SFC header (e.g., an NSH header), wherein the SFC header comprises: i) an SPI that identifies a service path and ii) metadata, wherein the metadata comprises the networking information extracted from the first packet. The method also includes generating a second packet comprising the SFC header and the original packet. The method also includes providing the second packet to an SFF that is configured to select a service path based on the SPI included in the SFC header of the second packet and forward the second packet based on the selected service path.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
HEADER ENRICHMENT FOR HYPERTEXT TRANSFER PROTOCOL SECURE
Methods, apparatus, and systems for enhancing the CP Function and UP Function to support the header enrichment for HTTPS are disclosed. In one example aspect, the method includes transmitting, by a first communication component, to a second communication component, a session message instructing the second communication component to detect one or more messages from a user device based on a communication security protocol, wherein the session message includes detection information for the communication security protocol.
Systems and Methods for Tunneling Network Traffic to Apply Network Functions
The systems and methods described herein provide a mechanism to apply network functions to a packet. The packet received by a network switch from a host may be configured so that the packet may be transmitted and forwarded to a target destination with desired network function, such as desired security settings, traffic path control or policy enforcement. In one example, the system may include a network switch and a network controller. The packet from hosts may enter the network switch through network ports (Px). The packet may then be tunneled and further transmitted to a server insertion to add a service identifier for the packet. The packet with the service modifier is then transmitted to a service block over the network. The service block may apply specific network functions to be processed or already processed to the packets. Subsequently, the packet with the specific network functions may then routes to the target destination with the desired network functions
System and method for determining trust for SIP messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
System and method for determining trust for SIP messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
Systems and methods for database geocoding
In an embodiment, a system can determine geocoded data from a database of geographic coordinates and metadata. The system correlates metadata, such as invoice data, to geolocation data, such as GPS or cellular data to determine geocoded data. The system further identifies one or more geographic coordinates for one or more location names, which may not have a corresponding metadata entry, by generating clusters of geographic coordinates. The clusters are then matched to one or location names using a matching algorithm. Accordingly, improved geocoded data may be determined.