Patent classifications
H04L61/5061
Method for transmitting an existing subscription profile from a MNO to a secure element, corresponding servers and secure element
The invention concerns a method for transmitting a subscription profile from a MNO to a secure element cooperating with a terminal, the secure element being pre-provisioned with a temporary profile comprising a unique identifier, a first MCC and a first MNC, the method comprising: Transmitting from a POS of the MNO the unique identifier of the secure element to a SM-DP; Creating or reserving the subscription profile at the SM-DP; Provisioning in a D-HSS server having the first MCC/MNC the unique identifier and a temporary IMSI comprising a second MCC, a second MNC; Provisioning in the HSS of the MNO the temporary IMSI and an ephemeral Ki; At the first attempt of the secure element to connect to the D-HSS server with its temporary profile, exchanging data in signaling messages between the secure element and the D-HSS for provisioning the secure element with the temporary IMSI; At the next attempt of the secure element to connect to the MNO network with the temporary IMSI, open an APN and send from the SM-DP to the secure element the subscription profile.
LANDING PAGE REDIRECT WITH SYNCHRONIZED MINI-SERVERS
Techniques for redirecting a client device from a server to a mini-server are disclosed herein. Initially, the client device establishes a connection with the server. The server provides a landing page to the client device, where the landing page is programmed to include an element that, when selected, redirects the client device away from its connection with the server. In response to a selection of the element, the client device establishes a connection with the mini-server. The mini-server is part of a first local area network (LAN), and, as a result of switching networks, the client device is now a part of a second LAN. The two LANs are connected to one another via a network bridge. The mini-server is able to receive input from the client device and synchronize that input across other mini-servers in the first LAN in order to redundantly store the input.
EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO USER EQUIPMENT ON RADIO-BASED NETWORKS
Disclosed are various embodiments for extending cloud-based virtual private networks to user equipment on radio-based networks. In one embodiment, a request is received from a client device for service from a radio-based network. The client device is provided with access to a virtual private cloud network through the radio-based network in response to receiving the request from the client device for service from the radio-based network. Encapsulated network traffic is forwarded from the client device to the virtual private cloud network via a network link between the radio-based network and a cloud provider network that hosts one or more resources on the virtual private cloud network.
LOCALIZATION AT SCALE FOR A CLOUD-BASED SECURITY SERVICE
Techniques for providing localization at scale for a cloud-based security service are disclosed. In some embodiments, a system/method/computer program product for providing localization at scale for a cloud-based security service includes receiving a connection request at a network gateway of a cloud-based security service; performing a source Network Address Translation (NAT) from a registered set of public IP addresses associated with a tenant; and providing secure access to a Software as a Service (SaaS) using the cloud-based security service.
Method and Apparatus for Binding Network Card in Multi-Network Card Server, and Electronic Device and Storage Medium
The present application discloses a method and an apparatus for binding a network card in a multi-network card server, an electronic device and a computer readable storage medium. The method comprises: acquiring a target address of a target server, wherein a connection between the target server and the multi-network card server is to be established; querying an IP address library according to the target address to determine an operator to which the target address belongs, wherein the IP address library records a correspondence between IP addresses and operators; selecting a network card, according to the determined operator to which the target address belongs, corresponding to the determined operator from a plurality of network cards in the multi-network card server; and binding the selected network card to establish the connection between the multi-network card server and the target server. On the premise of avoiding the inter-operator connection, the present application realizes binding the corresponding network card to enable the automatic connection between the multi-network card server and the target server.
MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM FOR CLOUD NETWORKING
An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP) packet, inserting a tenant-specific option information within the DHCP packet, and transmitting the DHCP packet with the tenant-specific option information.
MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM FOR CLOUD NETWORKING
An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP) packet, inserting a tenant-specific option information within the DHCP packet, and transmitting the DHCP packet with the tenant-specific option information.
SYSTEM AND METHOD OF ESTABLISHING SEAMLESS REMOTE ACCESS VIRTUAL PRIVATE NETWORK CONNECTIONS
A system and a method of establishing seamless remote access VPN connections are described. For establishment of a VPN connection for a user device, a cluster leader of a cluster of controllers identifies an active controller and a standby controller, based on network load of each controller of the cluster of controllers. An active VPN connection is established between the user device and the active controller and a standby VPN connection is established between the user device and the standby controller. The standby VPN connection is utilized in place of the active VPN connection during failover of the active controller. Because information of an active session is regularly shared by the active controller to the standby controller, the standby controller can seamlessly resume the active session during failover of the active controller.
Discovering unused internet protocol version 4 address blocks
The disclosed technology is directed towards locating and counting unused nodes, such as free Internet Protocol version 4 (IPv4) address blocks. A hierarchical structure of nodes is created from an origin block to a specified lower level, and the hierarchical structure is processed using mapping and eliminating to locate free nodes. A first node group comprises node(s) in use, a second node group identifies intermediate subnets between the first node of the first node group and the specified origin block, and a third node group identifies any subnets hierarchically below node(s) in use. Unused (free) node count information is obtained based on nodes below the origin block that are not in the first node group, the second node group, or the third node group.
Discovering unused internet protocol version 4 address blocks
The disclosed technology is directed towards locating and counting unused nodes, such as free Internet Protocol version 4 (IPv4) address blocks. A hierarchical structure of nodes is created from an origin block to a specified lower level, and the hierarchical structure is processed using mapping and eliminating to locate free nodes. A first node group comprises node(s) in use, a second node group identifies intermediate subnets between the first node of the first node group and the specified origin block, and a third node group identifies any subnets hierarchically below node(s) in use. Unused (free) node count information is obtained based on nodes below the origin block that are not in the first node group, the second node group, or the third node group.