496 research outputs found

    ACCESS POINT NAME (APN)/DATA NETWORK NAME (DNN) BASED AUTO-ANCHORING OF FIFTH GENERATION/NEXT GENERATION TRAFFIC IN WI-FI

    Get PDF
    Private Third Generation Partnership Project (3GPP) Fifth Generation/next Generation (5G/nG) network environments will have a mix of access technologies, such as Wi-Fi6 and 5G/nG Radio Access Network (RAN) technologies. Techniques presented herein provide for the capability to transport and intelligently anchor 5G/nG data using a Wi-Fi system, which may allow for private 5G/nG onboarding utilizing the Wi-Fi system

    DISTRIBUTED LOCATION PROCESSING USING REVERSE TRACKING AND AN INTERNET OF THINGS PLATFORM

    Get PDF
    The concept of location tracking is of great relevance in various enterprise and industrial environments. The techniques presented herein propose location tracking techniques that are independent from centralized servers and that use scalable technology and architectures to provide resiliency, faster location updates, reduced cost, and increases reliability

    TECHNIQUES FOR AUTOMATICALLY PASSING PRESENTATION CONTROL IN AN ONLINE MEETING

    Get PDF
    Techniques are presented for improving and streamlining an online meeting experience by predetermining the list of presenters and their corresponding presentation material, such that presentation control is dynamically passed based on the content currently being shared. Having a smooth transition between presenters and presentation materials improves the online meeting experience

    PASSWORD-LESS TRUST BASED ACCESS AUTHORIZATION FOR REMOTE INTERNET-OF-THINGS (IOT) DEVICES

    Get PDF
    The industry is moving away from password-based authorizations as they are often difficult to manage and are associated with various risks. Techniques herein solve an important issue with regard to remote Internet of Things (IoT) gateway access by utilizing a password-less trust-based authentication mechanism through which dynamic trust-based authorizations can be provided for devices utilizing a combination of a user trust score and a device risk profile in a unique manner. Such an approach will improve IoT security and will also help to solve an important security issue within the IoT/industrial world

    PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS

    Get PDF
    The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure

    PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS

    Get PDF
    The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure

    PROACTIVE EXCHANGE OF DATA BETWEEN CLOUD PROVIDERS VIA CONTROLLER COORDINATION AND TRIGGER DYNAMIC WORKFLOWS

    Get PDF
    A multi-cloud Software Defined Network (SDN) controller proactively learns insights about subscribers, such as enterprise users, end users, and/or other cloud providers. Based on the learned insights, the multi-SDN controller applies dynamic policies on other cloud provides to which those subscribers are attached to. The multi-cloud SDN controller co-ordinates with various cloud providers, enterprise network controllers, and Internet Service Providers (ISPs) to proactively notify other cloud providers with information about affected users so that those providers can install additional resources at cloud edge/core on the fly. Additionally, the multi-cloud SDN controller facilitates a warm hand off from one cloud region to another cloud region. When the multi-cloud SDN controller learns about an enterprise outage, it proactively notifies other cloud providers of the outage event and the other cloud providers can use this for a warm hand off of session to the region(s) through which the users will be reconnected. The likely regions are derived based on telemetry obtained from multi-cloud SDN controller. The multi-cloud SDN controller also triggers a proactive cleanup of user context of the cloud provider side. The cloud provider cleans up after the connection reset event based on information from the multi-cloud SDN controller, rather than wait on a timeout of the connection

    SECURE INTERNET OF THINGS (IOT) FIRMWARE UPGRADES IN A WIRELESS NETWORK

    Get PDF
    Internet of Things (IoT) devices/sensors/endpoints (collectively and generally IoT devices) are becoming part and parcel of many establishments. With the inbuilt support for Wi-Fi 6, also known as “AX Wi-Fi or 802.11ax Wi-Fi,” in many IoT devices, the number of deployed IoT devices will continue grow. Wi-Fi® is trademark of the Wi-Fi Alliance. These IoT devices come from various manufacturers and will require network/Internet access for firmware upgrades. As such, there is a need to create a secure and tested firmware upgrade environment for such devices. Presented herein are techniques to track the firmware of IoT devices and use Manufacturer Usage Descriptions (MUD) to recognize the recommended firmware and settings. Further, the techniques presented herein include a mechanism to optimize firmware upgrades using Target Wake Time (TWT) scheduling

    TECHNIQUES TO FACILITATE INTELLIGENT MEC APPLICATION DEPLOYMENT FOR PRIVATE 5G ENTERPRISE NETWORKS

    Get PDF
    Private 5G networks are emerging that allow a cellular network to be deployed and operated as an extension of an enterprise network. The deployment of such a private 5G cellular network typically involves the integration of cellular network components with exiting elements of an enterprise network, such as using the existing network to implement fronthaul, midhaul, and backhaul network connectivity. A key advantage of 5G cellular connectivity is the ability to offer edge compute resources to user equipment through the use of multi-access edge compute (MEC) deployments. However, in an enterprise network, edge compute resources may be scarce. In order to address such issues, novel techniques are proposed herein that provide for a MEC deployment controller that enables the deployment of enterprise edge applications to a radio access network of an enterprise network

    NETWORK ASSISTED HANDOVER TO A PRIVATE 5G NETWORK

    Get PDF
    An efficient handover mechanism is needed to facilitate seamless user equipment (UE) handover for public 5G to public 5G handover scenarios and also for public 5G to private 5G handover scenarios. The traditional approach for UE handovers can cause several minutes of delay when handing-over between public to private 5G networks. In order to address such issues, this submission proposes novel techniques that can be embedded within Third Generation Partnership Project (3GPP) call flows that will allow the network to query a UE about the available networks the UE can see in order to guide the UE to the best network to which to connect based on internal policies/logic. Having such an ability is highly desired by private 5G network operators. Accordingly, techniques herein facilitate efficient UE handovers for such public to private 5G handover scenarios
    corecore