H04L61/503

NETWORK CONFIGURATION SECURITY USING ENCRYPTED TRANSPORT
20220210192 · 2022-06-30 ·

At an authentication server, a request for at least a first dynamic host configuration protocol (DHCP) option is received from a client device, and it is determined if the authentication server implements DHCP. Based at least in part on a determination that the authentication server does not implement a DHCP, the operations further include transmitting an application program interface (API) call to a DHCP server associated with the authentication server acting as a DHCP gateway, receiving a response from the DHCP server, and transmitting the response to the client device.

Gateway system, control plane gateway device, and communication method

Embodiments of the present invention provide a gateway system and a communication method. The gateway system includes: a control plane entity, connected or integrated with a mobility management network element, and configured to allocate an IP address to UE and configure a data path for connecting a user plane entity with an RAN, a PDN or another gateway; one or more user plane entities, located between the PDN and the RAN, independent of the control plane entity, configured to forward data on the data path configured by the control plane entity. The gateway system is composed of the control plane entity and the user plane entity which are independent of each other, the number of the user plane entities may be independently changed to adapt to the change of network traffic without replacing all gateway entities, the network deployment is more convenient and the cost is lower.

Securing communications in a network function virtualization (NFV) core network

A method of electronic communication via a virtual network function (NFV) implementation of a core network. The method comprises receiving a hypertext transfer protocol (HTTP) content request from a user equipment (UE), wherein the HTTP content request comprises an identification of a content source and determining by an orchestrator service that insufficient NFV processing capacity is available to perform the HTTP content request, where the orchestrator service is an application that executes on a first physical host. The method further comprises dynamically increasing the NFV processing capacity by the orchestrator service, performing the HTTP content request using the increased NFV processing capacity, and returning a HTTP content response to the UE, wherein the HTTP content response does not comprise identification of the content source.

Securing communications in a network function virtualization (NFV) core network

A method of electronic communication via a virtual network function (NFV) implementation of a core network. The method comprises receiving a hypertext transfer protocol (HTTP) content request from a user equipment (UE), wherein the HTTP content request comprises an identification of a content source and determining by an orchestrator service that insufficient NFV processing capacity is available to perform the HTTP content request, where the orchestrator service is an application that executes on a first physical host. The method further comprises dynamically increasing the NFV processing capacity by the orchestrator service, performing the HTTP content request using the increased NFV processing capacity, and returning a HTTP content response to the UE, wherein the HTTP content response does not comprise identification of the content source.

Specifying link layer information in a URL

A system of specifying link layer information in a URL is described. In an embodiment, a URL is generated which includes both a link layer network type and information which is used by a resolving device to identify a particular link layer network of the specified type. In various embodiments, the URL includes a link layer network type and a corresponding link layer network name or pairs of link layer network types and corresponding link layer network names. Where the URL comprises more than one link layer network name, the resolving device may determine at runtime which of the named link layer networks to connect to and this decision may be based on criteria or preference information included within the URL.

Systems and methods for micro network segmentation

A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.

Establishing untrusted non-3GPP sessions without compromising security

Systems, methods, and devices are disclosed for establishing sessions over a network. A query can be sent, from a mobile device to an authoritative DNS server, requesting a session over a network. In response to the query, a list of available communication protocol options can be received from the authoritative DNS server. A specific communication protocol can be selected from the list of available communication protocol options, where the specific communication protocol is selected based on one or more performance metrics. A connection with a gateway device can then be initiated using the selected specific communication protocol.

Establishing untrusted non-3GPP sessions without compromising security

Systems, methods, and devices are disclosed for establishing sessions over a network. A query can be sent, from a mobile device to an authoritative DNS server, requesting a session over a network. In response to the query, a list of available communication protocol options can be received from the authoritative DNS server. A specific communication protocol can be selected from the list of available communication protocol options, where the specific communication protocol is selected based on one or more performance metrics. A connection with a gateway device can then be initiated using the selected specific communication protocol.

SYSTEM AND METHOD FOR IMPROVED AND EFFECTIVE GENERATION AND REPRESENTATION OF A COMMUNICATION TRUST TREE
20210352140 · 2021-11-11 · ·

A system and method for generating and representing a communication trust tree of network nodes in a network are provided. The method includes receiving an address of a starting node in a communication tree; collecting, for each node of the communication tree extending from the starting node, a response from at least another node of the communication tree; grouping nodes based on their at least a response, wherein nodes having a same response are grouped into a group, wherein each node communication tree is associated with at least one group; and generating a communication trust tree that comprises a hierarchical tree of the generated groups.

COMMUNICATION METHOD, COMMUNICATIONS APPARATUS, AND COMMUNICATIONS SYSTEM
20220006810 · 2022-01-06 ·

This application discloses a communication method, and relates to the communications field. In the method, a fixed mobile interworking function (FMIF) receives an access request message that carries first authentication information of a fixed network device and that is sent by a broadband network gateway (BNG), where the first authentication information is generated by the BNG based on a dial-up packet sent by the fixed network device, and the first authentication information includes an identifier of the fixed network device. The FMIF encapsulates the first authentication message in a message format supported by a control plane interface between the FMIF and a core network device, to obtain a second authentication message; and the FMIF sends the second authentication message to the core network device through the control plane interface. The core network device performs authentication on the fixed network device based on the second authentication message.