H04L61/503

Method and system for near real-time IP user mapping

Systems and methods are provided for near real-time IP user mapping. Such methods may include obtaining IP address assignment data points from different sources including an authentication, authorization, and accounting (AAA) server of a private network, a service provider that provides a computer-based service within the private network, and user devices that have access to the private network. The methods may also include applying an IP mapping rule to the obtained IP address assignment data points to generate IP address mapping.

Method and system for near real-time IP user mapping

Systems and methods are provided for near real-time IP user mapping. Such methods may include obtaining IP address assignment data points from different sources including an authentication, authorization, and accounting (AAA) server of a private network, a service provider that provides a computer-based service within the private network, and user devices that have access to the private network. The methods may also include applying an IP mapping rule to the obtained IP address assignment data points to generate IP address mapping.

SPECIFYING LINK LAYER INFORMATION IN A URL
20220255834 · 2022-08-11 ·

A system of specifying link layer information in a URL is described. In an embodiment, a URL is generated which includes both a link layer network type and information which is used by a resolving device to identify a particular link layer network of the specified type. In various embodiments, the URL includes a link layer network type and a corresponding link layer network name or pairs of link layer network types and corresponding link layer network names. Where the URL comprises more than one link layer network name, the resolving device may determine at runtime which of the named link layer networks to connect to and this decision may be based on criteria or preference information included within the URL.

Securing Communications in a Network Function Virtualization (NFV) Core Network

A method of electronic communication via a virtual network function (NFV) implementation of a core network. The method comprises receiving a hypertext transfer protocol (HTTP) content request from a user equipment (UE), wherein the HTTP content request comprises an identification of a content source and determining by an orchestrator service that insufficient NFV processing capacity is available to perform the HTTP content request, where the orchestrator service is an application that executes on a first physical host. The method further comprises dynamically increasing the NFV processing capacity by the orchestrator service, performing the HTTP content request using the increased NFV processing capacity, and returning a HTTP content response to the UE, wherein the HTTP content response does not comprise identification of the content source.

Securing Communications in a Network Function Virtualization (NFV) Core Network

A method of electronic communication via a virtual network function (NFV) implementation of a core network. The method comprises receiving a hypertext transfer protocol (HTTP) content request from a user equipment (UE), wherein the HTTP content request comprises an identification of a content source and determining by an orchestrator service that insufficient NFV processing capacity is available to perform the HTTP content request, where the orchestrator service is an application that executes on a first physical host. The method further comprises dynamically increasing the NFV processing capacity by the orchestrator service, performing the HTTP content request using the increased NFV processing capacity, and returning a HTTP content response to the UE, wherein the HTTP content response does not comprise identification of the content source.

Network access method and apparatus and network device
11395143 · 2022-07-19 · ·

This application discloses a network access method and apparatus, and a network device. The network access method is performed by an access gateway, includes: receiving a PPPoE message or a IPoE message sent by a user terminal, obtaining access information included in the PPPoE message or the IPoE message; encapsulating the access information into an NAS message or an EAP message; then, sending the NAS message or the EAP message to a control plane function entity CP; receiving network interface information sent by the CP; and sending the network interface information to the user terminal, so that the user terminal accesses a network. As can be learned from this solution, the user terminal is not limited by a protocol stack when accessing the network. Therefore, full services can be provided by deploying only one core network. This not only saves a resource but also facilitates network maintenance.

Network access method and apparatus and network device
11395143 · 2022-07-19 · ·

This application discloses a network access method and apparatus, and a network device. The network access method is performed by an access gateway, includes: receiving a PPPoE message or a IPoE message sent by a user terminal, obtaining access information included in the PPPoE message or the IPoE message; encapsulating the access information into an NAS message or an EAP message; then, sending the NAS message or the EAP message to a control plane function entity CP; receiving network interface information sent by the CP; and sending the network interface information to the user terminal, so that the user terminal accesses a network. As can be learned from this solution, the user terminal is not limited by a protocol stack when accessing the network. Therefore, full services can be provided by deploying only one core network. This not only saves a resource but also facilitates network maintenance.

Establishing untrusted non-3GPP sessions without compromising security

Systems, methods, and devices are disclosed for establishing sessions over a network. A query can be sent, from a mobile device to an authoritative DNS server, requesting a session over a network. In response to the query, a list of available communication protocol options can be received from the authoritative DNS server. A specific communication protocol can be selected from the list of available communication protocol options, where the specific communication protocol is selected based on one or more performance metrics. A connection with a gateway device can then be initiated using the selected specific communication protocol.

Establishing untrusted non-3GPP sessions without compromising security

Systems, methods, and devices are disclosed for establishing sessions over a network. A query can be sent, from a mobile device to an authoritative DNS server, requesting a session over a network. In response to the query, a list of available communication protocol options can be received from the authoritative DNS server. A specific communication protocol can be selected from the list of available communication protocol options, where the specific communication protocol is selected based on one or more performance metrics. A connection with a gateway device can then be initiated using the selected specific communication protocol.

Network access control
11159524 · 2021-10-26 · ·

The present disclosure discloses methods of controlling network access, NASs and non-transitory machine-readable storage mediums. In an example of the present disclosure, when a terminal comes online for a first time, a NAS obtains a temporary role for a terminal; when receiving an IP address request from the terminal, the NAS requests an IP address for the terminal, wherein a lease for the temporary IP address is a set minimum lease; the NAS forces the terminal to go offline when the portal authentication is successful; when the terminal comes online for a second time, the NAS obtains a service role for the terminal; when receiving an IP address request sent by the terminal at expiry of the lease for the temporary IP address, the NAS requests a service IP address for the terminal, wherein the service IP address belongs to an IP network segment corresponding to the service role.