18500302. END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Paramvir Bahl of Bellevue WA (US)

Rachee Singh of Redmond WA (US)

END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC - A simplified explanation of the abstract

This abstract first appeared for US patent application 18500302 titled 'END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC

Simplified Explanation

Software-defined networking (SDN) and network function virtualization (NFV) are used in various parts of 5G network infrastructure to implement security measures for network slices, ensuring isolation of slice traffic from other network traffic.

  • SDN and NFV technologies are leveraged in 5G networks to enable end-to-end security for network slices by providing logical and/or physical isolation of slice traffic.
  • Network slice controllers are deployed in the 5G network to abstract and virtualize the diverse network infrastructure, allowing for the mapping of infrastructure properties across different infrastructure types for each network slice.
  • Dynamic allocation of network resources based on real-time traffic demands allows for the customization of end-to-end network slices to meet specific quality of service parameters for different types of traffic, including privileged traffic that may be prioritized during network congestion.

Potential Applications

The technology described in the patent application could be applied in various industries such as telecommunications, IoT, and smart cities to ensure secure and efficient network operations.

Problems Solved

This technology addresses the challenge of providing end-to-end security and isolation for network slices in 5G networks, ensuring that slice traffic is protected from unauthorized access or interference.

Benefits

The use of SDN and NFV in 5G networks enables the implementation of strong security measures for network slices, improving overall network performance and reliability.

Potential Commercial Applications

The technology could be utilized by network operators, service providers, and enterprises to enhance the security and efficiency of their 5G networks, attracting customers who prioritize secure and reliable network services.

Possible Prior Art

Prior art in the field of SDN and NFV technologies in telecommunications networks may include research papers, patents, and commercial products that address network virtualization and security in similar contexts.

Unanswered Questions

How does the implementation of network slice controllers impact the overall performance of 5G networks?

The article does not delve into the specific performance implications of deploying network slice controllers in 5G networks and how they may affect network latency, throughput, or scalability.

What are the potential challenges or limitations of using SDN and NFV for implementing security in 5G network slices?

The article does not discuss any potential drawbacks or obstacles that may arise when utilizing SDN and NFV technologies for securing network slices in 5G networks.


Original Abstract Submitted

Software-defined networking and network function virtualization constructs are leveraged across diverse portions of 5G network infrastructure including radio access network, mobile core, and wide area network to enable a security property to be implemented for a network slice from end-to-end to provide for strong logical and/or physical isolation of slice traffic from other network traffic. One or more network slice controllers are implemented in the 5G network that are interoperable as separate elements, or under centralized control, to enable the underlying diverse network infrastructure to be abstracted and virtualized so that infrastructure properties can be mapped across infrastructure types for the end-to-end slice. Network resources may be dynamically allocated based on real-time traffic demands to instantiate the end-to-end network slices on a customized basis to meet particular quality of service parameters for various traffic types, including privileged traffic that may be prioritized when resources become scarce and network congestion occurs.