18504514. V-EASDF AND IPUPS simplified abstract (Nokia Technologies Oy)
Contents
- 1 V-EASDF AND IPUPS
V-EASDF AND IPUPS
Organization Name
Inventor(s)
Laurent Thiebaut of Massy (FR)
Shubhranshu Singh of Munich (DE)
V-EASDF AND IPUPS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18504514 titled 'V-EASDF AND IPUPS
Simplified Explanation
The abstract describes a method for allocating a network security function between a visited network and a home network of a user equipment, and controlling domain name system related signaling between network elements in the visited and home networks to subject the signaling to the network security function.
- The method involves allocating network security functions between different networks.
- It controls domain name system related signaling between network elements in different networks.
- The goal is to subject the signaling to network security functions.
Potential Applications
This technology could be applied in:
- Mobile networks
- Edge computing environments
- Virtual private networks
Problems Solved
This technology helps in:
- Enhancing network security
- Managing domain name system related signaling efficiently
- Ensuring secure communication between different networks
Benefits
The benefits of this technology include:
- Improved network security
- Enhanced control over domain name system related signaling
- Better management of network elements in different networks
Potential Commercial Applications
This technology could be valuable in:
- Telecommunication companies
- Internet service providers
- Cloud service providers
Possible Prior Art
One possible prior art could be the use of virtual private networks to secure communication between different networks.
Unanswered Questions
How does this method impact network performance?
This article does not provide information on how the method may affect network performance. It would be interesting to know if there are any performance implications of implementing this technology.
Are there any specific network protocols that are affected by this method?
The article does not mention any specific network protocols that may be impacted by the method described. It would be helpful to understand if certain protocols are more affected than others.
Original Abstract Submitted
A method, for use in a network control element, is provide, the method comprising: allocating a network security function between a visited network and a home network of a user equipment, and controlling domain name system related signalling between an edge computing related network element in the visited network and a network element in the home network such that the domain name system related signalling is subjected to the network security function.