Patent classifications
H04L63/164
Operations and maintenance techniques subsystem for secure classified remote access as a service
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user. A method includes performing systematic monitoring; performing a network vulnerability analysis; remediating a finding; and notifying a user. One or more non-transitory computer readable media include program instructions that when executed, cause a computer to: perform systematic monitoring; perform a network vulnerability analysis; remediate a finding; and notify a user.
SYSTEM AND METHOD OF NETWORKING SECURITY FOR VIRTUALIZED BASE STATION
Systems and methods for implementing IPsec connections for one or more virtualized base station entities are provided.
Providing security for internet of things (IoT) devices
Examples provided herein describe a method for providing security for Internet of Things (IoT) devices. For example, a data packet from an IoT device may be received at an edge device. A signature associated with the IoT device may be accessed at the edge device, where the signature includes network layer information about the IoT device. A set of rules may be applied by the edge device to validate the IoT device based on the accessed signature. Responsive to the IoT device being validated based on the accessed signature, received data packet, and the applied set of rules, the edge device may process the data packet from the IoT device.
METHODS AND APPARATUS FOR REDUCING COMMUNICATIONS DELAY
The present invention relates to methods and apparatus for reducing delay while providing secure communications between nodes. An exemplary method embodiment includes a first node performing the steps of: identifying packets corresponding to a first communications session, the first communications session corresponding to a first application type; segmenting at least a first packet corresponding to the first communications session into at least a first packet portion and a second packet portion, the first packet including a first packet header and a first packet payload, the first packet portion including at least a portion of the first packet header, the second packet portion including at least a portion of the first packet payload; communicating, in encrypted form, the first packet portion from the first node to a security function node; and communicating, in unencrypted form, the second packet portion from the first node to the security function node.
SECURELY AND RELIABLY TRANSMITTING MESSAGES BETWEEN NETWORK DEVICES
The present disclosure relates to systems for generating network packets that facilitate reliable and secure transmission of data between computing devices. For example, systems described herein involve generating a network packet in which a transport layer and security layer are implemented within an authentication header of the network packet. Information from the authentication header may be evaluated by a receiving device using a security key to compute an integrity check vector and an initialization vector to determine that a network packet has been provided in a correct order as well as check against a variety of security threats.
SELECTING A VPN CONNECTION USING NEGOTIATED CRYPTOGRAPHIC ALGORITHMS TO IMPROVE THROUGHPUT
The techniques described herein enable a virtual private network (VPN) gateway to select a VPN connection, from multiple VPN connections established between a network VPN gateway and a remote VPN gateway, based on performance factors such as throughput. A system may measure throughput in megabytes per second (Mbps). More specifically, a VPN gateway (e.g., a remote VPN gateway or a network VPN gateway) can configure a routing preference that selects a VPN connection that is more performant based on a cryptographic algorithm that is used for the VPN connection. The VPN gateway can update the routing preference to select an alternative VPN connection when the performance of the VPN connection suffers.
END-TO-END FLOW CONTROL WITH INTERMEDIATE MEDIA ACCESS CONTROL SECURITY DEVICES
An apparatus includes an input interface to receive incoming packets from a first network device and an output interface to send outgoing packets to a second network device. Media access control security (MACsec) circuitry is coupled between the input interface and the output interface. Bypass flow-control (FC) circuitry is coupled between the input interface and the MACsec circuitry. The bypass FC circuitry is to detect an FC packet in the incoming packets and pass the FC packet passively to the output interface to enable end-to-end flow control directly between the first network device and the second network device.
Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
A method for a connection mechanism in a public cloud network is disclosed. The method includes acquiring a plurality of connection credentials from a public cloud portal (PCP) Admin Device; pairing and registration with a private cloud virtual private network (VPN) server (PCVS) from a private matter gateway (PMG); establishing a plurality of initial VPN tunnels between the PCVS and the PMG; connecting to the PMG on demand between a PCVS smart device client and the PMG through the PCVS; and running a plurality of vertical peer-to-peer (P2P) private and secure PCVS smart device client applications between at least one PCVS smart device client and one of at least one PMG smart device client, at least one PMG network service and another PCVS smart device client.
NON-ACCESS STRATUM SIGNALING OVER A NON-3GPP NETWORK
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a cellular modem may transmit, to an applications processor, an indication to use a non-Third Generation Partnership Project (non-3GPP) interworking function (N3IWF) for non-access stratum (NAS) signaling. Accordingly, the cellular modem may establish a first virtual interface with the applications processor. The cellular modem may further perform an Internet Key Exchange (IKE) procedure with a core network using the first virtual interface and the N3IWF and transmit a key generated during the IKE procedure to the applications processor. Numerous other aspects are described.
IPsec anti-replay window with quality of service
In some examples, an example method to provide an IPsec anti-replay window with quality of service (QoS) at a first network endpoint may include configuring a multiple number of anti-replay windows, generating a first security association (SA), and establishing the first SA with a second network endpoint. The first SA may include a first multiple number of security parameter indexes (SPIs), where each of the first multiple number of SPIs may be assigned to a specific QoS level, and each of the first multiple number of SPIs may be assigned to one of the multiple number of anti-replay windows. Establishing the first SA with the second network endpoint may include assigning the first SA to a first encryption key, and providing the first encryption key to the second network endpoint.