Secure creation of application containers for fifth generation cellular network slices

    公开(公告)号:US11284297B2

    公开(公告)日:2022-03-22

    申请号:US16841526

    申请日:2020-04-06

    Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.

    Identification and remediation of mesh instability source in a mesh network

    公开(公告)号:US10979918B2

    公开(公告)日:2021-04-13

    申请号:US16195987

    申请日:2018-11-20

    Abstract: In one embodiment, a method comprises identifying, by an apparatus, a mesh instability source device that adds a substantial instability influence that substantially degrades network communications in a mesh network, including: determining, for each mesh network device in the mesh network, a corresponding node stability contribution that identifies a long-term capability of the corresponding mesh network device to provide reliable communications for other mesh network devices in the mesh network, and determining a corresponding influence of the node stability contribution on child mesh network devices relying on the corresponding mesh network device for connectivity in the mesh network, and identifying the mesh instability source device as having a corresponding worst influence of the node stability contribution in the mesh network; and eliminating the substantial instability influence based on determining a remediation solution, and causing the remediation solution to be implemented for the mesh instability source device.

    Granting wireless network access based on application authentication credentials of client devices

    公开(公告)号:US10944757B2

    公开(公告)日:2021-03-09

    申请号:US16135915

    申请日:2018-09-19

    Abstract: A method comprises obtaining, from a client device, a first set of application authentication credentials formatted in accordance with a first authentication protocol. The first set of application authentication credentials corresponds to a first user profile. The method includes translating the first set of application authentication credentials to a second set of application authentication credentials. The second set of application authentication credentials is formatted in accordance with a second authentication protocol different from the first authentication protocol and corresponds to the first user profile. The method includes providing the second set of application authentication credentials to an application authentication system. The method includes, in response to providing the second set of application authentication credentials to the application authentication system, obtaining, from the application authentication system, an application authentication indicator. In response to determining that the application authentication indicator indicates a successful authentication, granting the client device network access.

    SECURING SUBSTATION COMMUNICATIONS USING SECURITY GROUPS BASED ON SUBSTATION CONFIGURATIONS

    公开(公告)号:US20200351249A1

    公开(公告)日:2020-11-05

    申请号:US16402568

    申请日:2019-05-03

    Abstract: In one embodiment, a network policy engine obtains a substation configuration description for a substation, indicative of intelligent electronic devices (IEDs), associated network communication devices, and related communication configuration information. The network policy engine then creates a mapping of the IEDs and the associated network communication devices based on the substation configuration description, associating each of the IEDs to a corresponding network port of the associated network communication devices. The network policy engine may then further create network control parameters based on the substation configuration description, which comprise defined communication flows for the IEDs and associated security group tags (SGTs) for the defined communication flows. The techniques herein may then cause the SGTs to be imposed at mapped network ports of the network communication devices for the IEDs according to security group access (SGA)-based network control to thereby establish secure network communication for the IEDs within the particular substation.

    DISTRIBUTED LEARNING MODEL FOR FOG COMPUTING
    69.
    发明申请

    公开(公告)号:US20200293925A1

    公开(公告)日:2020-09-17

    申请号:US16298465

    申请日:2019-03-11

    Abstract: The disclosed technology relates to a process for metered training of fog nodes within the fog layer. The metered training allows the fog nodes to be continually trained within the fog layer without the need for the cloud. Furthermore, the metered training allows the fog node to operate normally as the training is performed only when spare resources are available at the fog node. The disclosed technology also relates to a process of sharing better trained machine learning models of a fog node with other similar fog nodes thereby speeding up the training process for other fog nodes within the fog layer.

Patent Agency Ranking