System and method for implementing network experience shifting
First Claim
1. A method, comprising:
- receiving, at a network node in a first network and via a first network access device in a second network, a request from a first user device to establish roaming network access, a first user of the first user device being associated with a second network access device in the first network and being unassociated with the first network access device, the second network access device being located in a different geographical location from the first network access device;
authenticating, with the network node, the first user;
determining, with the network node, whether the first user is associated with the second network access device;
determining, with the network node, whether the first user is authorized to access at least one of data, content, profiles, software applications, one or more first virtual network functions (“
VNFs”
), or one or more subscribed-to services that are accessible by the second network access device;
based on a determination that the first user is associated with the second network access device and that the first user is authorized to access at least one of data, content, profiles, software applications, one or more first VNFs, or one or more subscribed-to services that are accessible by the second network access device, providing, with the network node, one or more second VNFs to one of a hypervisor or a container that is in communication with the first network access device and executing instances of the one or more second VNFs on the one of the hypervisor or the container; and
establishing, with the network node, access connection to a data store by executing the instances of the one or more second VNFs on the one of the hypervisor of the container, the data store containing the at least one of data, content, profiles, software applications, one or more first VNFs, or network configuration information for one or more subscribed-to services that are accessible by the second network access device.
1 Assignment
0 Petitions
Accused Products
Abstract
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
99 Citations
32 Claims
-
1. A method, comprising:
-
receiving, at a network node in a first network and via a first network access device in a second network, a request from a first user device to establish roaming network access, a first user of the first user device being associated with a second network access device in the first network and being unassociated with the first network access device, the second network access device being located in a different geographical location from the first network access device; authenticating, with the network node, the first user; determining, with the network node, whether the first user is associated with the second network access device; determining, with the network node, whether the first user is authorized to access at least one of data, content, profiles, software applications, one or more first virtual network functions (“
VNFs”
), or one or more subscribed-to services that are accessible by the second network access device;based on a determination that the first user is associated with the second network access device and that the first user is authorized to access at least one of data, content, profiles, software applications, one or more first VNFs, or one or more subscribed-to services that are accessible by the second network access device, providing, with the network node, one or more second VNFs to one of a hypervisor or a container that is in communication with the first network access device and executing instances of the one or more second VNFs on the one of the hypervisor or the container; and establishing, with the network node, access connection to a data store by executing the instances of the one or more second VNFs on the one of the hypervisor of the container, the data store containing the at least one of data, content, profiles, software applications, one or more first VNFs, or network configuration information for one or more subscribed-to services that are accessible by the second network access device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A network node in a first network, comprising:
-
at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the network node to; receive, via a first network access device in a second network, a request from a first user device to establish roaming network access, a first user of the first user device being associated with a second network access device in the first network and being unassociated with the first network access device, the second network access device being located in a different geographical location from the first network access device; authenticate the first user, by determining whether the first user is associated with the second network access device and determining whether the first user is authorized to access at least one of data, content, profiles, software applications, one or more first virtual network functions (“
VNFs”
), or one or more subscribed-to services that are accessible by the second network access device;based on a determination that the first user is associated with the second network access device and that the first user is authorized to access at least one of data, content, profiles, software applications, one or more first VNFs, or one or more subscribed-to services that are accessible by the second network access device, provide one or more second VNFs to one of a hypervisor or a container that is in communication with the first network access device and executing instances of the one or more second VNFs on the one of the hypervisor or the container; and establish access connection to a data store by executing the instances of the one or more second VNFs on the one of the hypervisor or the container, the data store containing the at least one of data, content, profiles, software applications, one or more first VNFs, or network configuration information for one or more subscribed-to services that are accessible by the second network access device. - View Dependent Claims (31)
-
-
32. A system, comprising:
-
a first network access device in a first network, comprising; a first transceiver; at least one first processor; and a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the first network access device to; receive, via the first transceiver, a request from a first user device to establish roaming network access, a first user of the first user device being associated with a second network access device in a second network and being unassociated with the first network access device, the second network access device being located in a different geographical location from the first network access device; and authenticate the first user, by sending, via the first transceiver, a request to a network node in the second network to authenticate the first user; and the network node, comprising; at least one second processor; and a second non-transitory computer readable medium communicatively coupled to the at least one second processor, the second non-transitory computer readable medium having stored thereon computer software comprising a second set of instructions that, when executed by the at least one second processor, causes the network node to; receive, from the first network access device in the first network, the request from the first user device to establish roaming network access; authenticate the first user, by determining whether the first user is associated with the second network access device and determining whether the first user is authorized to access at least one of data, content, profiles, software applications, one or more first virtual network functions (“
VNFs”
), or one or more subscribed-to services that are accessible by the second network access device;based on a determination that the first user is associated with the second network access device and that the first user is authorized to access at least one of data, content, profiles, software applications, one or more first virtual network functions (“
VNFs”
), or one or more subscribed-to services that are accessible by the second network access device, provide one or more second VNFs to one of a hypervisor or a container that is in communication with the first network access device and executing instances of the VNFs on the one of the hypervisor or the container; andestablish access connection to a data store by executing the instances of the one or more second VNFs on the one of the hypervisor or the container, the data store containing the at least one of data, content, profiles, software applications, one or more first VNFs, or network configuration information for one or more subscribed-to services that are accessible by the second network access device.
-
Specification