H04L63/0876

Network control device, user terminal, communication system, network control method, and network control program

A tunnel connection is enabled between a user terminal and a service provider using a simpler network configuration. A communication system 10 includes a user terminal 20, a service provider 30, a carrier network 40 that connects the user terminal 20 and the service provider 30 to each other, and a network control device 50 that controls the carrier network 40. The network control device 50 sets respective virtual tunnel end points (VTEPs) for a POI terminal 46 that is on the carrier network 40 and that is connected to the service provider 30 and for the user terminal 20, and sets a virtual tunnel between the virtual tunnel end points. The user terminal 20 communicates with the service provider 30 via the virtual tunnel.

Key-derivation verification in telecommunications network
11582231 · 2023-02-14 · ·

A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.

Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach

Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network. The device fingerprinting systems and devices herein are configured to operate with limited data without sitting between network devices and the internet, without monitoring all network traffic, and without limited or no active scanning. The embodiments herein may passively collect information as distributed peers and may perform very limited active scans. In some embodiments, the information is used as an input to a custom hierarchical learning model to fingerprint devices on a network by identifying attributes of the devices such as the operating system family, operating system version, and device role. In some embodiments, a dynamic deployer selection process may be utilized to simply and efficiently deploy software. Some embodiments herein involve end-to-end encryption of credentials in a deployment process.

METHOD AND TERMINAL FOR PROCESSING SECURITY POLICY FOR V2X
20230042442 · 2023-02-09 ·

A method for processing a security policy of a device may include a step for receiving, from another device, a first message including first information about a security policy of the other device. The first message may include a direct communication request message or a link modification request message. The method may further include the steps of: determining whether to accept or reject the first message on the basis of both the first information about the security policy of the other device and second information about the security policy of the device; and sending a second message on the basis of the determination.

SYSTEMS AND METHODS FOR PROVIDING ONLINE SECURITY
20230043208 · 2023-02-09 ·

A method for providing online security may include: (1) receiving, by a validation computer program executed by a trusted entity backend for a trusted entity, a call from a web browser executed on a customer electronic device browsing a webpage for an online entity, the call comprising an online entity identifier for the online entity and a session identifier, wherein the webpage for the online entity may include a hidden <iframe> comprising code that causes the web browser to execute the call; (2) confirming, by the validation computer program, that a cookie for the trusted entity may be stored on the customer electronic device; and (3) returning, by the validation computer program, a first value indicating that the customer electronic device is known to the trusted entity or a second value indicating that the customer electronic device is not known to the trusted entity based on the confirmation.

RANDOM MEDIA ACCESS CONTROL ADDRESS WITH FAST RECONNECTION MECHANISM
20230043950 · 2023-02-09 · ·

The present invention provides a wireless communication method of an access point. The wireless communication method comprises the steps of: establishing a cache table comprising a plurality of reference MAC and corresponding PMKs and reference PMKIDs; receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match items of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.

SYSTEMS AND METHODS TO TRANSFER SOFTWARE ENTITLEMENTS BETWEEN INFORMATION HANDLING SYSTEMS
20230044720 · 2023-02-09 ·

Embodiments of systems and computer implemented methods are provided to transfer software licenses and entitlements associated with a user account from a first information handling system (IHS) to a second IHS. A computer implemented method in accordance with the present disclosure may generally include executing an entitlement management service to reassign the software licenses and entitlements associated with the user account to the second IHS, executing at least one local validation service on the second IHS to validate the second IHS and the user's workspace, and if the second IHS and the user's workspace is successfully validated by the at least one local validation service, executing one or more cloud-based orchestration services to verify the user account, determine which software licenses and entitlements are associated with the user account, and acquire and validate the software licenses and entitlements before transferring the software licenses and entitlements to the second IHS.

SYSTEMS AND METHODS FOR CREATING A VIRTUAL KVM SESSION BETWEEN A CLIENT DEVICE AND A TARGET DEVICE
20230039059 · 2023-02-09 ·

Systems and methods for establishing a KVM session are disclosed. The KVM session is designed to provide a communication channel between a client device and a target device without the use of an appliance. For example, the KVM session includes a virtualized KVM session in which the hardware and software used to create the communication channel are stored on a network-based device, as opposed to a multi-port appliance physically connected to the target device. A virtual KVM session eliminates the need for the target device to have a-priori knowledge related to the client device. The virtual KVM session can individually communicate with the client device and the target device, and negotiate a session between the client device and the target device prior to any communication between the target device and the client device. In some embodiments, the virtual KVM session uses out-of-band signaling and SIP to negotiate a session.

Device-Side Federated Machine Learning Computer System Architecture

Techniques are disclosed in which a computer system receives a transaction request and uses a federated machine learning model to analyze the transaction request. A server computer system may generate a federated machine learning model and distribute portions of the federated machine learning models to other components of the computer system including a user device and/or edge servers. In various embodiments, various components of the computer system apply transaction request evaluation factors to the portions of the federated machine learning model to generate scores. The server computer system uses the scores to determine a response to the transaction request.

System for user authentication
11556932 · 2023-01-17 · ·

A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.