Device for topology hiding of a visited network
First Claim
1. A topology hiding node device comprising:
- at least one processor;
at least one memory coupled to the processor configured to execute programmed instructions stored in the memory comprising;
coordinating communication between entities in two networks comprising a Home Public Land Mobile (HPLM) network and a Visited Public Land Mobile (VPLM) network;
representing a real identity of one the entities by at least one virtual identity allocated from a group of at least two virtual identities, when communicating with one or more of the other entities; and
recording a relation between the virtual identity and the real identity of a current communication session in a change list stored in a short term storage (STS), while the relation between the virtual identity and the real identity of a previous communication sessions is stored in a long term storage (LTS).
1 Assignment
0 Petitions
Accused Products
Abstract
A system for hiding an internal topology of a network having plurality of client and server entities is provided herein. The system comprises a topology hiding node that coordinates communication between systems in two distinct networks: Home Public Land Mobile and Visited Public Land Mobile. The topology hiding node includes long term storage and a short term storage which includes a change list.
A real identity of one system entity is represented by at least one virtual identity allocated from a group of at least two virtual identities, when communicating with the other system entities, and the relation between the virtual identities and the real identities of a current communication session is recorded in the change list and stored in short term storage and the relation between the virtual identities and the real identities of a previous communication sessions is stored in the long term storage.
-
Citations
18 Claims
-
1. A topology hiding node device comprising:
-
at least one processor; at least one memory coupled to the processor configured to execute programmed instructions stored in the memory comprising; coordinating communication between entities in two networks comprising a Home Public Land Mobile (HPLM) network and a Visited Public Land Mobile (VPLM) network; representing a real identity of one the entities by at least one virtual identity allocated from a group of at least two virtual identities, when communicating with one or more of the other entities; and recording a relation between the virtual identity and the real identity of a current communication session in a change list stored in a short term storage (STS), while the relation between the virtual identity and the real identity of a previous communication sessions is stored in a long term storage (LTS). - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for hiding an internal topology of a network, the method comprising:
-
coordinating, with a topology hiding device, communication between entities in two networks comprising a Home Public Land Mobile (HPLM) network and a Visited Public Land Mobile (VPLM) network; representing, with the topology hiding device, a real identity of one the entities by at least one virtual identity allocated from a group of at least two virtual identities, when communicating with one or more of the other entities; and recording, with the topology hiding device, a relation between the virtual identity and the real identity of a current communication session in a change list stored in a short term storage (STS), while the relation between the virtual identity and the real identity of a previous communication sessions is stored in a long term storage (LTS). - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium having stored thereon instructions for hiding an internal topology of a network comprising executable code which when executed by a processor, causes the processor to perform steps comprising:
-
coordinating communication between entities in two networks comprising a Home Public Land Mobile (HPLM) network and a Visited Public Land Mobile (VPLM) network; representing a real identity of one the entities by at least one virtual identity allocated from a group of at least two virtual identities, when communicating with one or more of the other entities; and recording a relation between the virtual identity and the real identity of a current communication session in a change list stored in a short term storage (STS), while the relation between the virtual identity and the real identity of a previous communication sessions is stored in a long term storage (LTS). - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification