SECURITY ZONE COMPLIANCE MONITORING IN MOBILE NETWORKS

    公开(公告)号:US20240147226A1

    公开(公告)日:2024-05-02

    申请号:US17979415

    申请日:2022-11-02

    CPC classification number: H04W12/033 H04W12/08 H04W12/64

    Abstract: In one illustrative example, a controller may operate to send a request message towards a user equipment (UE) which operates to communicate traffic in a session in a mobile network. In response, the controller may receive, from a user plane function which anchors the session of the UE, a response message which includes an identifier of the user plane function. The controller may verify whether a zone or security level value that is assigned to the user plane function matches a zone or security level value that is assigned to the UE. If the controller identifies a discrepancy between the zone or security level values, the controller may provide a notification indication to indicate the discrepancy. The UE may be an industrial Internet of Things (IIoT) device and the zone or security level values may be based on International Electrotechnical Commission (IEC) 62443.

    Central scheduling for enterprise wireless randomizing changing/rotating MAC address

    公开(公告)号:US11902246B2

    公开(公告)日:2024-02-13

    申请号:US17731652

    申请日:2022-04-28

    CPC classification number: H04L61/5076 H04L61/5007 H04L61/5061

    Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.

    LEVERAGING CONTEXTUAL METADATA COMMUNICATION TO IMPROVE DNS SECURITY

    公开(公告)号:US20240015132A1

    公开(公告)日:2024-01-11

    申请号:US17862019

    申请日:2022-07-11

    CPC classification number: H04L61/4511 H04L61/2514 H04L9/3236

    Abstract: Techniques for leveraging efficient metadata communications to improve domain name system (DNS) security are described. The DNS service uses a hash value to uniquely identify a client, and detect any change in metadata in order to keep policies up-to-date for the client. In an example method a first DNS query for a client device is intercepted. A cryptographic hash function is applied to metadata associated with the client device to generate a hash value. The hash value is added to an additional records section of the first DNS query to generate a second DNS query. The second DNS query is transmitted to a DNS service. The metadata associated with the client device is transmitted to the DNS service on an out-of-band encrypted channel. A DNS response, including the hash value, is received from the DNS service and transmitted to the client device.

    Secure creation of application containers for fifth generation cellular network slices

    公开(公告)号:US11825345B2

    公开(公告)日:2023-11-21

    申请号:US18153882

    申请日:2023-01-12

    CPC classification number: H04W28/06 H04L45/50 H04W40/02

    Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.

    Dynamic anchor assignments for UWB ranging

    公开(公告)号:US11812334B2

    公开(公告)日:2023-11-07

    申请号:US17885981

    申请日:2022-08-11

    CPC classification number: H04W4/023 H04B1/7163 H04W74/0825

    Abstract: Presented herein are techniques for assigning Ultra-Wideband (UWB) anchors for client ranging. A control device can monitor UWB ranging between a mobile device and a primary anchor. In response to determining that a signal strength between the mobile device and the primary anchor is below a threshold, the control device can identify anchors for which the mobile device has had a signal strength above the threshold during a period of time, and select one of the anchors as a new primary anchor for the mobile device. For example, the control device can select the new primary anchor based on a relative collision tolerance mapping for the new primary anchor and at least one other anchor within a UWB range of the new primary anchor. The control device can send a command causing UWB ranging to be performed between the mobile device and the new primary anchor.

Patent Agency Ranking