Abstract: Techniques are described for operating a core cellular network stack on a cloud computing environment (e.g., a public cloud infrastructure). For example, virtualized packet gateways can be run on virtual machines of the cloud computing environment and standard load balancers can distribute network traffic of the cellular network among the virtualized packet gateways. The virtualized packet gateways can be setup with a local cache of an external key-value store containing bearers of the cellular network and process received data plane network packets using the local cache. Bearers can be updated within the cellular network using the external key-value store, and virtualized packet gateways can obtain and use updated bearer details.
Type:
Grant
Filed:
November 5, 2018
Date of Patent:
April 14, 2020
Assignee:
Microsoft Tehnology Licensing, LLC
Inventors:
Noel Andrew Bainbridge, Matthew John Balkwill, Bozidar Radunovic
Abstract: Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller. The controller controls at least one security domain using an authentication protocol, such as a modified Kerberos protocol. One obtains a set of security domain credentials, generates a cluster name secret, gives the cluster a virtual name, and authenticates the machines to the domain controller using these items. In some cases, authentication uses a ticket-based protocol which accepts the cluster name secret in place of a proof of valid security domain membership. In some, the domain controller uses a directory service which is compatible with an active directory service; the cluster virtual name is provisioned as an account in the directory service. The cluster virtual name may concurrently serve clients on different security domains of the directory service.
Type:
Grant
Filed:
October 5, 2017
Date of Patent:
April 23, 2019
Assignee:
Microsoft Tehnology Licensing, LLC
Inventors:
Sai Sudhir Anantha Padmanaban, Lokesh Srinivas Koppolu, Andrea D'Amato, Yi Zeng
Abstract: A phony profiles detector for an on-line social network system is described. The phony profiles detector uses characteristics of a profile that was associated with an indication that it represents a malicious user, a so-called seed profile, to identify other profiles that should be flagged as potentially the source of undesirable behavior. Based on the degree of similarity determined for a subject profile with respect to a seed profile, the phony profiles detector generates a malicious user indicator and stores it as associated with the subject profile.