白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Secure remote access to a 5G private network through a private network slice

專利號
US10785652B1
公開日期
2020-09-22
申請人
Cisco Technology, Inc.(US CA San Jose)
發(fā)明人
Rammohan Ravindranath; Rajesh Indira Viswambharan; Prashanth Patil
IPC分類
H04L29/06; H04W12/08; H04L12/911; H04W12/06; H04W28/02
技術(shù)領(lǐng)域
network,enterprise,mec,5g,slice,may,private,or,ue,in
地域: CA CA San Jose

摘要

In one illustrative example, a network node may receive, from a user equipment (UE), a message indicating a token authorization request for access to a custom, enterprise private network slice of a 5G network. The message may include a token provided to the UE by an enterprise server of an enterprise private network of the enterprise. The network node may perform a token validation procedure and, based on a successful token validation, send a message for causing a provisioning of one or more rules in a forwarding entity of the 5G network, for causing enterprise user plane (UP) traffic of the UE to be forwarded to an anchor UPF of the private network slice. The enterprise UP traffic communication may be used for the remote control and/or monitoring of elements in a private 5G network of the enterprise.

說明書

With reference back to FIG. 5, again, the enterprise UP traffic of UE 102 may be forwarded and routed toward and to anchor UPF 540 in “Slice 1” along the path 530 to the private 5G network 522 of the factory, whereas the subscriber UP traffic of UE 102 may be forwarded and routed in “Slice 2” along the path 532 to the Internet 520 or other network. The enterprise UP traffic communication may be used for remote control and/or monitoring of elements in the private 5G network 522 of the factory.

FIG. 7 is a flowchart 700 for describing a method for secure access to a private network slice of a mobile network (e.g. 5G network) of an MVNO for communications, suitable for a secure remote access to a private network (e.g. a private 5G network) of an enterprise. The method may be performed by one or more network nodes of the mobile network (e.g. 5G network), where a network node may include a function such as an NF or AF which performs the method. A network node may include one or more processors and one or more network interfaces, where the one or more processors are configured to perform the steps of the method. The method may be embodied as a computer program product which includes a non-transitory computer readable medium and computer instructions stored in the non-transitory computer readable medium, where the computer instructions are executed by one or more processors of the network node of the mobile network.

權(quán)利要求

1
微信群二維碼
意見反饋