Patent classifications
H04L12/04
MODULAR SYSTEM (SWITCH BOARDS AND MID-PLANE) FOR SUPPORTING 50G OR 100G ETHERNET SPEEDS OF FPGA+SSD
A chassis front-end is disclosed. The chassis front-end may include a switchboard including an Ethernet switch, a Baseboard Management Controller, and a mid-plane connector. The chassis front-end may also include a mid-plane including at least one storage device connector and a speed logic to inform at least one storage device of an Ethernet speed of the chassis front-end. The Ethernet speeds may vary.
HARDWARE BASED PACKET REPLICATION AT TAIL END NODE
Aspects of the disclosed technology address limitations relating to packet replication for multi-destination traffic, by providing methods for performing hardware-based replication in network infrastructure devices, such as switches. In some aspects, application specific integrated circuits (ASICs) resident in physical devices can be used to perform packet replication. Depending on implementation, a hardware-based replication process can include steps for receiving a first packet that includes a first outer header containing first address information, receiving a second packet including a second outer header containing a hardware replication flag, forwarding the first packet to all virtual tunnel endpoints (VTEPs) connected with the TOR switch, and performing hardware replication for the second packet based on the hardware replication flag to generate one or more unicast packets. Systems and machine readable media are also provided.
HARDWARE BASED PACKET REPLICATION AT TAIL END NODE
Aspects of the disclosed technology address limitations relating to packet replication for multi-destination traffic, by providing methods for performing hardware-based replication in network infrastructure devices, such as switches. In some aspects, application specific integrated circuits (ASICs) resident in physical devices can be used to perform packet replication. Depending on implementation, a hardware-based replication process can include steps for receiving a first packet that includes a first outer header containing first address information, receiving a second packet including a second outer header containing a hardware replication flag, forwarding the first packet to all virtual tunnel endpoints (VTEPs) connected with the TOR switch, and performing hardware replication for the second packet based on the hardware replication flag to generate one or more unicast packets. Systems and machine readable media are also provided.
Methods and systems of increasing security quality of computing-device communications
In one embodiment, method of increasing security of computing-device mobile device communications comprising executing on one or more processors in a central repository server the step of obtaining a first user's public key. The first user's public key is one of a pair of certification keys generated by an application in a first user's computing device. The method includes the step of obtaining, from the first user via the first user's computing device, a set of first user's communication identifiers. The set of first user's communication identifier includes a first user's mobile device number, a first user's email address, or a first user's online social network identifier. The method includes the step of receiving a set of first user's communication identifiers from the first user via the first user's computing device. The method includes the step of generating one or more associations of the first user's public key with the set of first user's communication identifiers. With the one or more processors in the central repository server implementing delivery of the first user's public key to a second user's mobile device the method receives from another application operating in the second user's mobile device, a request for the first user's public key. The request includes at least one of the first user's communication identifiers. The method includes the step of retrieving the first user's public key, the set of first user's communication identifiers, and the association of the first user's public key with the set of first user's communication identifiers from the computer data store. The method includes the step of authenticating that the at least one of the first user's communication identifiers received from the other application is associated with the first user's public key using the retrieved associations of the first user's public key with the set of first user's communication identifiers from the computer data store. The method includes the step of communicating the first user's public key to the other application operating in the second user's mobile device.
Methods and systems of increasing security quality of computing-device communications
In one embodiment, method of increasing security of computing-device mobile device communications comprising executing on one or more processors in a central repository server the step of obtaining a first user's public key. The first user's public key is one of a pair of certification keys generated by an application in a first user's computing device. The method includes the step of obtaining, from the first user via the first user's computing device, a set of first user's communication identifiers. The set of first user's communication identifier includes a first user's mobile device number, a first user's email address, or a first user's online social network identifier. The method includes the step of receiving a set of first user's communication identifiers from the first user via the first user's computing device. The method includes the step of generating one or more associations of the first user's public key with the set of first user's communication identifiers. With the one or more processors in the central repository server implementing delivery of the first user's public key to a second user's mobile device the method receives from another application operating in the second user's mobile device, a request for the first user's public key. The request includes at least one of the first user's communication identifiers. The method includes the step of retrieving the first user's public key, the set of first user's communication identifiers, and the association of the first user's public key with the set of first user's communication identifiers from the computer data store. The method includes the step of authenticating that the at least one of the first user's communication identifiers received from the other application is associated with the first user's public key using the retrieved associations of the first user's public key with the set of first user's communication identifiers from the computer data store. The method includes the step of communicating the first user's public key to the other application operating in the second user's mobile device.
SECURITY KEY DERIVATION FOR HANDOVER
Methods, systems, and devices for wireless communication are described that support security key derivation for handover. A network entity (e.g., an access and mobility function (AMF)) may establish an access stratum (AS) key to ensure secure communications between a user equipment (UE) and a base station. If the UE relocates to a new network entity (e.g., target network entity), the initial network entity (e.g., source network entity) may perform a handover procedure to the target network entity. In some aspects, the network entities may derive a unified AS key for the handover procedure. Additionally, the network entities may utilize one or more intermediate keys (e.g., refreshed intermediate keys) derived from, in part, respective freshness parameters for the handover procedure. The target network entity may then utilize the derived intermediate keys to derive the AS key for the handover procedure and establish communications with the UE.
Methods and network nodes for multi-connectivity handling in a communication system
A method of multi-connectivity handling in a communication system is disclosed. The method may be performed in a first network node and comprises: generating a data protocol packet destined to a communication device, and including in the data protocol packet at least one identifier identifying data protocol processing context and the first network node. Methods in a second network node and in a communication device are also disclosed, as are first and second network nodes, communication device, computer programs and computer program products.
Initializing femtocells
A femtocell may be initialized on a network by automatically contacting a network service provider. The access point then automatically downloads an initial configuration from a bootstrap server belonging to the network service provider. In some cases, a femtocell access point may automatically determine, after boot up, whether it was pre-provisioned with credentials to authenticate itself with the network service provider. If so, it may use a domain name service to obtain an address of a bootstrap server. Otherwise, it may use dynamic host configuration protocol to discover the bootstrap server's Internet Protocol address.
SECURE INFORMATION TRANSMITTING SYSTEM AND METHOD FOR PERSONAL IDENTITY AUTHENTICATION
A secure information transmitting system and method for personal identity authentication, which, on the basis of a user public key, encrypt and transmit an authentication number transmitted from a server that provides a service to a user to a mobile communication terminal of the user, thereby preventing an unauthorized user who obtained the authentication number from being recognized even if an authentication number is externally exposed through hacking.
SECURE INFORMATION TRANSMITTING SYSTEM AND METHOD FOR PERSONAL IDENTITY AUTHENTICATION
A secure information transmitting system and method for personal identity authentication, which, on the basis of a user public key, encrypt and transmit an authentication number transmitted from a server that provides a service to a user to a mobile communication terminal of the user, thereby preventing an unauthorized user who obtained the authentication number from being recognized even if an authentication number is externally exposed through hacking.