When a network element attempts to establish a session with another network element, a security verification agent may be activated in one or both network elements. The security verification agents, such as front-end processors, virtual network functions, or other software agents, may reside in each of the network elements.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
AT&T Global Network Services Hong Kong LTD (Hong Kong)
AT&T Mobility II LLC (USA)
Inventor
Chau, Winnie
Mulligan, John Philip
Gowda, Shashi
Abstract
The concepts and technologies disclosed herein are directed to time-aware blockchain staged regulatory control of Internet of Things (“IoT”) data. A federation platform can receive a registration request from an enterprise edge platform to register a blockchain identifier for publication of public data on a public blockchain. The federation platform can determine if the registration request contains any restricted data parameters. In response to determining that the registration request does not contain any restricted data parameters, the federation platform can query a security module to obtain an encryption key. The federation platform can receive the encryption key from the security module and store the encryption key in association with the blockchain identifier and an enterprise edge platform ID that uniquely identifies the enterprise edge platform. The federation platform can return the encryption key to the enterprise edge platform and allow publication of encrypted public data to the public blockchain.
Aspects of the subject disclosure may include, for example, receiving information defining a high-capacity event in a mobility network, receiving information defining a network location of the high-capacity event in the mobility network, automatically configuring one or more network components of the mobility network according to a set of high-capacity parameters, the one or more network components associated with the network location of the high-capacity event, limiting access to the mobile network to specific users according to the high-capacity parameters, and after the high-capacity event, automatically configuring the one or more network components of the mobile network according to a set of reversion parameters. Other embodiments are disclosed.
The technologies described herein are generally directed to using portable situational awareness equipment with communication resources deployed to facilitate communications at a remote incident area, in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include identifying a remote incident area associated with an incident. The method can further include, based on the incident, estimating a deployment location for portable network equipment within the remote incident area, resulting in an estimated deployment location. Further, the method can include, based on the estimated deployment location and estimated signal propagation at locations within the remote incident area, selecting a placement location for communication equipment to facilitate communication with the portable network equipment.
A processing system including at least one processor may generate a plurality of visual tracks from a source visual content, where the plurality of visual tracks comprises visual tracks of different visual quality levels and with different intra frame offsets, apply at least one network condition within a communication network, transmit one or more visual streams to one or more client devices via the communication network, where the one or more visual streams includes frames selected from among the plurality of visual tracks, and measure at least one quality metric for at least one of the one or more visual streams in accordance with the applying of the at least one network condition within the communication network.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an encoded video stream for transmitting to a mobile phone or a thin client
6.
AUTONOMOUS AERIAL VEHICLE PROJECTION ZONE SELECTION
A processing system of an autonomous aerial vehicle including at least one processor may determine informational data to present for at least one person, capture at least a first image via at least one imaging sensor of the autonomous aerial vehicle in a vicinity of the at least one person and determine a first position and a first orientation of the at least one person. The processing system may then identify, based upon the first position and the first orientation of the at least one person, a plurality of candidate projection areas, each candidate projection area comprising a contiguous area within the at least the first image that is deemed to be visible to the at least one person, select one of the plurality of candidate projection areas as a projection zone, and project the informational data on the projection zone via a projector.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
Aspects of the subject disclosure may include receiving a first data set related to a first International Mobile Subscriber Identifier (IMSI) from a wireless core system, tidying the first data set by building a bandwidth matrix representing each bandwidth usage value with respect to a selected time-stamp and one or more flow IDs associated with the first IMSI, repeating the receiving and tidying operations with respect to a plurality of data sets related to remaining IMSIs, and generating data visualization displaying the bandwidth usage value of the first IMSI and the remaining IMSIs. The first IMSI and the remaining IMSIs are associated with a selected network slice ID. Other embodiments are disclosed.
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
9.
Apparatuses and methods for facilitating a health check in respect of communication networks and systems, inclusive of an outer loop health check
Aspects of the subject disclosure may include, for example, examining first actions imposed as part of a maintenance activity in respect of a communication network while the communication network is subjected to second actions as part of the maintenance activity, determining, based on the examining, that the first actions, in whole or in part, fail to adhere to a threshold, a requirement, or a specification, and based on the determining, reversing at least one action of the first actions. Other embodiments are disclosed.
AT&T Global Network Services Czech Republic s.r.o. (Czech Republic)
AT&T Mobility II LLC (USA)
Inventor
Hao, Shuai
Andrei, Alexandru Cristian
Perez, Hector
Coates, Jr., Donald
Ge, Zihui
Hicks, Alvin
Tipton, Jason
Abstract
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Aspects of the subject disclosure may include, for example, a system, comprising: a message-sending device comprising a first processing system including a first processor, wherein the message-sending device further comprises a first wireless communication mechanism, wherein the first processing system is configured to receive an input command, wherein the input command is provided by a person who is coaching a player, wherein the person who is coaching the player is located on a sideline of a field, and wherein the player is on the field; and a helmet worn by the player, wherein the helmet comprises a second processing system including a second processor, wherein the helmet further comprises a second wireless communication mechanism, and wherein the helmet further comprises a display mechanism positioned in a line of sight of at least one eye of the player; wherein the first processing system determines whether a play clock associated with a current play has been running for a threshold amount of time, resulting in a determination; wherein, responsive to the determination being that the play clock associated with the current play has not been running for the threshold amount of time, the first processing system transmits via the first wireless communication mechanism to the helmet a message that is based upon the input; wherein the second processing system receives, via the second wireless communication mechanism of the helmet, the message; and wherein, responsive to receipt of the message, the second processing system causes the display mechanism to display the message. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining indications of a respective priority level of each cell of a plurality of cells in respect of supporting Category M (CATM) communication services, determining, at a first point in time, that CATM is active in a first cell of the plurality of cells, resulting in a first determination, determining, based on the first determination, that a utilization of resources of the first cell is greater than a first threshold, resulting in a second determination, and activating, based on the second determination, CATM in at least a second cell of the plurality of cells. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
A method includes detecting that a first satellite of a non-terrestrial network is moving out of a field of view of a user endpoint device that is currently connected to the non-terrestrial network, estimating a time at which a second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, selecting, in response to the time at which the second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, an uplink power for the user endpoint device, and sending, to the user endpoint device, an instruction to transmit at the uplink power that is selected.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 52/40 - TPC being performed in particular situations during macro-diversity or soft handoff
15.
DATA-DRIVEN ARTIFICIAL INTELLIGENCE (AI) FOR COMMUNICATION NETWORKS
Aspects of the subject disclosure may include, for example, obtaining first data from a first component of a disaggregated wireless communication network; obtaining second data from a second component of the disaggregated wireless communication network; formatting the first data and the second data for use in a generative artificial intelligence (AI) process, wherein the formatting results in formatted data; applying the formatted data to the generative AI process, wherein the generative AI process results in one or more first commands for the first component of the disaggregated wireless communication network; and transmitting the one or more first commands to the first component of the disaggregated wireless communication network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining, by a processing system including a processor, network data associated with a communication network; generating, by the processing system, Quality of Service (QOS) information by applying machine learning to the network data; and providing, by the processing system, the QoS information to a Policy Control Function (PCF) that selects or generates a first UE Route Selection Policy (URSP) rule according to the QoS information and provides the first URSP to an end user device, where the first URSP rule is implemented to provide a communication service to the end user device utilizing an application via the communication network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device that receives data from a machine-type communication (MTC) device located at a premises, determines an identifier for the MTC device; compares the identifier with a list of identifiers; and, responsive to determining that the MTC device is a listed device, transmits the data to a first network element remote from the premises. The device and the first network element do not receive data from devices at the premises generating human traffic communications (HTC). The first network element transmits the data to a second network element for aggregation and subsequent transmission to a cloud data facility comprising cloud storage. A data path from the device to the first network element, from the first network element to the second network element, and from the second network element to the cloud data facility forms a secure data path. Other embodiments are disclosed.
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
A streaming orchestrator may monitor the quality of video being delivered to a home or other building. If the streaming orchestrator determines that additional performance is needed, it may create an additional User Plane Gateway in the virtual “white box” environment residing in the customer premises. The streaming orchestrator may instruct gNodeBs to continue to route traffic back to the central core functions or to route traffic to local user plane gateways which transmit video streams to the Internet via localized high-speed connections.
A method performed by a processing system including at least one processor includes calculating a quantum network relative performance metric for a current configuration of a hybrid quantum-classical telecommunications network, identifying a proposed new configuration for the hybrid quantum-classical telecommunications network, calculating the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network, and implementing the proposed new configuration in the hybrid quantum-classical telecommunications network when the quantum network relative performance metric for the proposed new the hybrid quantum-classical telecommunications network is greater than the quantum network relative performance metric for the current configuration of the hybrid quantum-classical telecommunications network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
Generating a core instance via a first access network device of a first access network, wherein the core instance facilitates operation of a second access network via a second access network device of the second access network is disclosed. Generally, implementing a core network can be highly resource intensive, e.g., high labor, equipment, and monetary costs. The level of resources that are conventionally committed in developing a core instance can be a significant barrier for many small or medium sized entities. The disclosed subject matter discloses a configuration component that can generate a core instance that can be performed at a remotely located access network. In an embodiment, a remotely implemented core instance can be updatable. Further, in response to a remotely implemented core instance failing to perform, a monitoring component can facilitate a failover operation.
A content filtering system and method includes receiving in a network device in a network from a user device, a user selected set of rules identifying a set of URLs to be blocked. The set of rules are loaded into the network device. The network device receives from the user device a request to access a specified URL. A determination is made at the network device whether the specified URL is in the user selected set of rules. If the specified URL is in the user selected set of rules, then the specified URL is blocked.
Aspects of the subject disclosure may include, for example, a system that manages reuse of mobile subscriber identity information. Further aspects may include mobile subscriber identity information used in a device having multiple device profiles indexed, directly or indirectly, by multiple ki (e.g. shared secret keys). Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device in which a cloud connection stack and a security transport stack are each partially or entirely implemented for execution in a modem (e.g., a cellular modem) or a SIM component (e.g., an IoT SAFE SIM applet) of the device, rather than on the device's own OS and processor. Some or all of the application layer protocols (e.g., MQTT, CoAP, LwM2M, etc.) in the security transport stack may be implemented (or consolidated) for execution by the modem or SIM component. Some or all of the functionality of the cloud connection stack (e.g., bootstrapping and messaging/telemetry) may additionally, or alternatively, be implemented (or consolidated) for execution by the modem or SIM component. Other embodiments are disclosed.
An example method performed by a processing system includes receiving a request from a first user to render an extended reality environment, wherein the request includes a definition of a first policy that governs user behavior within the extended reality environment, rendering the extended reality environment by presenting content contributed by at least one user in the extended reality environment, monitoring the extended reality environment to ensure that the rendering results in a compliance of the extended reality environment with the first policy, detecting that a portion of the content contributed by at least one other user of the extended reality environment results in the extended reality environment failing to comply with the first policy, and modifying a presentation of the portion of content in the extended reality environment in response to the detecting, wherein the modifying results in the compliance of the extended reality environment with the first policy.
Aspects of the subject disclosure may include, for example, receiving, over a communication network, a first message utilizing a first messaging application from a first communication device associated with a first user and identifying a recipient of the first message as a second user associated with a second communication device. Further embodiments can include determining that the second user utilizes a second message application to exchange a first group of messages via the second communication device resulting in a first determination, and transmitting, over the communication network, the first message to the second communication device utilizing the second messaging application based on the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.
Mobile telecommunications network access point configuration and fiber routing configuration for customer premises equipment is disclosed. A customer premises component (CPE) can comprise a customer premises mobile broadband to steerable fiber component (CPC) comprising a baseband control unit, a user-plane function component, and a fiber path selection component that can enable configuration of a cellular frontend facing a user equipment (UE) and configuration of a fiber backend facing other endpoint devices. The CPC can receive information pertinent to the configuring the frontend/backend from a network management component, a carrier network component, and internet component, etc. The CPC can automatically adapt configuration of the frontend/backend to selectively enable traffic to flow between the UE and another endpoint device.
H04B 10/2575 - Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
28.
LOCATION AWARE ASSIGNMENT OF RESOURCES FOR PUSH TO TRANSFER (PTT) COMMUNICATION SYSTEMS IN A FIFTH GENERATION (5G) NETWORK OR OTHER NEXT GENERATION WIRELESS COMMUNICATION SYSTEM
The technologies described herein are generally directed to facilitating operation of system that can include a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. In embodiments, the operations can include receiving, from a source user equipment, a first request to communicate to a destination group of user equipment via a multi-cast connection. Further operations can include identifying respective service areas of ones of the destination group, comprising a service area of a destination user equipment of the destination group. In some embodiments, operations can include generating a second request to initiate the multi-cast connection, the second request comprising the destination group of user equipment with the respective service areas, wherein the respective service area of the destination user equipment is for selection, by second network equipment based on the service area, a gateway group of base station equipment.
Techniques for integrating a device platform in a core network or MEC environment, and managing data communications associated with devices are presented. The device platform, integrated with the core network or MEC environment, can comprise a communication management component (CMC) that can manage communication of data associated with devices connected to the core network. CMC can receive data and metadata from a device, analyze the data and metadata, and, based on the analyzing and data management criteria, determine whether any, all, or a portion of the data is to be communicated to a second device associated with the core network or associated communication network. CMC can be trained, using machine learning, to learn to identify device types, communication protocols, and data payload formats of devices. Based on the analyzing and the training, CMC can determine the device type, communication protocol, and data payload format associated with the device.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A framework for dynamic network resource allocation and energy saving based on the real-time environment, radio network information, and machine learning (ML) can be utilized via a radio access network (RAN) intelligent controller (RIC). Real-time and predicted network utilization can facilitate resource and energy savings by leveraging the RIC platform. For example, a network information base (NIB) in the RIC platform can collects RAN and user equipment (UE) resource related information in real time and provides the abstraction of the access network in the real time. ML can predict real-time information about the UEs at time t based on data analytics and real time radio resource needs. The RIC can then instruct the network to reduce or increase resources.
The technologies described herein are generally directed to providing, based on a paging message, radio resources to facilitate a transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include identifying an idle mode activation message. The method can further include, based on the activation message, predicting that the user device is going to request an active connection. Further, the method can include prioritizing allocation of antenna resources to the user device over different user devices in an idle state, based on a prediction that the user device will transition to an active state before the different user devices. Further, the method can include, based on the prioritizing, directing a base station to cause a beamformed signal to a predicted location of the user device to accept the active connection.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Adjusting a network path between a user equipment and a network edge cloud instance is disclosed. The adjustment of the network path can be based on performance of the network path. The performance of the network path can be ranked, based on performance, against other network paths. In an embodiment, the other network paths can be between the user equipment and the network edge cloud instance. Additionally, the other network paths can be between the user equipment and another network edge cloud instance that can be located remotely from the network edge cloud instance. In an embodiment, a recommendation can be provided to a cloud service provider to enable the cloud service provider to adjust a characteristic of an application or service performed by a network edge cloud instance. The disclosed subject matter can provide advantages over conventional cloud instances that are typically supported on a device located distant from a network device operated by a network provider.
A new scalable approach to conflict-free deployment of changes across networks. The conflict rules or constraints may be modeled using policies and algorithms to determine an optimized schedule for change deployment.
H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/085 - Retrieval of network configurationTracking network configuration history
H04L 41/0873 - Checking configuration conflicts between network elements
H04L 41/12 - Discovery or management of network topologies
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
An application provided by a subscriber identity module of a cellular endpoint device may obtain a notification of a network rejection from a first cellular network and may select at least one update to at least one operational parameter of the subscriber identity module, in response to the notification of the network rejection, where the selecting is according to a selection logic of the application. The application provided by the subscriber identity module may then apply the at least one update to the at least one operational parameter of the subscriber identity module, in accordance with the selecting, and may generate a refresh instruction to the subscriber identity module.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
H04W 76/18 - Management of setup rejection or failure
A system for delaying or inhibiting data is provided in order to shorten the time required for a reselection process from a first communication protocol to a second communication protocol. Reselection from the first communication protocol to the second communication protocol (e.g., 3G to 4G) requires a period of time without data transfers to allow the reselection to complete. The system delays or inhibits data transfers on the mobile device until the reselection process completes or the mobile device is idle for a predetermined length of time. In an embodiment, the system can buffer outgoing data and then send the data once the reselection has completed. In other embodiments, the system can drop packet sessions or ignore incoming packet pages. In another embodiment, the system can delay or inhibit data based on the priority of the data.
Aspects of the subject disclosure may include, for example, a network device that comprises a processing system including a processor and a memory storing instructions that, when executed by the processing system, facilitate performance of operations. The operations include obtaining timing advance data regarding a communication device served by the network; the timing advance data is collected by a network element coupled to the network device, and the network element communicates with the communication device using control-plane signaling. The timing advance data is processed using location data regarding the network element to determine a geolocation of the communication device. The geolocation is stored at a storage device; the network device and storage device are included in a secure portion of the network. The geolocation is provided to equipment of a network customer accessing the secure portion of the network via a secure interface. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, transmitting a first identifier associated with a processing system to a communication device, transmitting first data to the communication device, obtaining, from the communication device and based on the transmitting of the first identifier and the first data, a first directive, wherein the first directive directs the processing system to utilize a first radio access technology for a first communication session, and utilizing, based on the first directive, the first radio access technology for the first communication session. Other embodiments are disclosed.
Architectures and techniques are presented that can provide point-to-point analysis to generate an improved signal strength prediction (SSP) based on, e.g., earth surface image data processing and analysis to draw conclusions of line of sight (LOS) along the propagation path between a BTS or another AP transmitter and CPE receiver. For example, USGS image data and/or elevation data of locations are identified to correspond to signal propagation between the transmitter and receiver can be analyzed for LOS signal quality at a fixed location, in addition to the statistical model prediction of the RF signal quality. As a result, foliage or terrain that obstructs the LOS can be identified and utilized to improve SSP by eliminating the additional pathloss due to LOS obstructions. Such can provide a significant improvement to SSP results that are conventionally predicted by statistical models rather than a point-to-point analysis.
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
H04B 10/112 - Line-of-sight transmission over an extended range
H04B 17/309 - Measuring or estimating channel quality parameters
H04W 16/20 - Network planning tools for indoor coverage or short range network deployment
39.
DYNAMICALLY LAYERED BEAMFORMED SIGNALS FOR FIFTH GENERATION (5G) WIRELESS COMMUNICATION SYSTEMS OR OTHER NEXT GENERATION WIRELESS COMMUNICATION SYSTEMS
The technologies described herein are generally directed to using dynamically layered beamformed control signals in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, identifying a group of different directions radiating from beamforming antenna equipment of base station equipment. The method can further include facilitating transmitting a first beamformed signal according to a first direction of the group of different directions. Further, the method can include facilitating transmitting a second beamformed signal according to a second direction of the group of different directions, with the second direction being selected based on a sequence of directions, and where transmitting beamformed signals to the group of different directions is based on the sequence of directions can facilitate establishment of wireless coverage for a corresponding geographic area.
H04B 7/0408 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas using two or more beams, i.e. beam diversity
Aspects of the subject disclosure may include, for example, a device that has a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of performing a packet analysis of protocol data unit (PDU) headers of inbound Internet and non-Internet traffic; determining whether the PDU headers identify the presence of a quantum payload and/or via deep packet inspection; detecting a presence of attack vectors in the quantum payload responsive to a determination that the PDU headers identify the presence of the quantum payload, wherein the attack vectors originate from a quantum computer, and wherein the attack vectors are cryptanalytically relevant; generating an alert responsive to detecting the presence of the attack vectors; and isolating compromised network elements, sets of elements, and/or other network components and/or subsystems, and route traffic around the compromised network elements, sets of elements, and/or other network components and/or subsystems. Other embodiments are disclosed.
A method for managing multi-vendor fifth generation/sixth generation and next-generation hybrid quantum-classical networks includes determining a proposed network compute cloud configuration for a hybrid quantum-classical telecommunications network supported by a plurality of cloud environments, determining a protocol that is required to implement the proposed network compute cloud configuration, based on a topology of the hybrid quantum-classical telecommunications network, and delegating a quantum function of the proposed network compute cloud configuration among the plurality of cloud environments, using the protocol.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
Aspects of the subject disclosure may include, for example, receiving information about an augmented reality (AR) environment which includes a plurality of objects and a user participating in the AR environment, the user viewing the AR environment through a user equipment, receiving context information for the AR environment, identifying a diminished reality (DR) object of the plurality of objects, wherein the identifying is responsive to the context information, modifying the AR environment to render the DR object invisible to the user viewing the AR environment through user equipment, monitoring movement of one or more objects of the AR environment including the DR object, and modifying visibility of the DR object to the user viewing the AR environment through user equipment as a notification of a possible collision between the user and the DR object, wherein the modifying is responsive to detecting a risk of collision. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.
A smart communications hub can enable management of driverless and/or autonomous vehicles. Separating current wireless data from driverless vehicle sensor data can allow for quicker resolutions involving driverless vehicles. The smart communications hub can communicate to other groups such as driverless vehicle providers, service providers, vehicle management, law enforcement, etc. The smart communications hub can also process requests from both mobile applications and micro-service applications.
G07C 5/00 - Registering or indicating the working of vehicles
B60T 7/16 - Brake-action initiating means for automatic initiationBrake-action initiating means for initiation not subject to will of driver or passenger operated by remote control, i.e. initiating means not mounted on vehicle
B60T 8/88 - Arrangements for adjusting wheel-braking force to meet varying vehicular or ground-surface conditions, e.g. limiting or varying distribution of braking force responsive to a speed condition, e.g. acceleration or deceleration with failure responsive means, i.e. means for detecting and indicating faulty operation of the speed responsive control means
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04N 5/765 - Interface circuits between an apparatus for recording and another apparatus
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
45.
ALTITUDE DETERMINATION ACCORDING TO CROWD SOURCED BAROMETRIC PRESSURE MEASUREMENTS
Aspects of the subject disclosure may include, for example, a process that formulates an inference that a first group of mobile devices are at ground level, and obtains, for the first group of mobile devices, positions and barometric pressure readings. Ground heights with respect to a common reference height are determined for the first group of mobile devices, and reference barometric pressures are calculated for the first group of mobile devices, at the common reference height according to the barometric pressure readings and the determined ground heights. At least a portion of the reference barometric pressures are combined to obtain a reference barometric pressure. Other embodiments are disclosed.
G01C 5/06 - Measuring heightMeasuring distances transverse to line of sightLevelling between separated pointsSurveyors' levels by using barometric means
G01D 21/02 - Measuring two or more variables by means not covered by a single other subclass
G06F 17/18 - Complex mathematical operations for evaluating statistical data
46.
METHOD AND APPARATUS FOR DETECTING NUISANCE TRAFFIC EVENTS BASED ON NETWORK AND WIRELESS PHONE NUMBER
A processing system may determine a nuisance traffic event. The processing system may receive from a first entity a request to determine a status of a wireless user endpoint device associated with a wireless phone number, wherein the status comprises a determination as to a validity of a subject communication associated with the wireless phone number, perform a presence analysis of the wireless user endpoint device based on the wireless phone number, and respond to the request by providing an indication as to the validity of the subject communication associated with the wireless phone number back to the first entity.
A processing system may determine a nuisance traffic event. The processing system may receive from a first entity a request to determine a status of the wireless user endpoint device associated with a wireless phone number, wherein the status comprises a determination as to a validity of a subject communication associated with the wireless phone number, perform a presence analysis of the wireless user endpoint device, and respond to the request by providing an indication as to the validity of the subject communication associated with the wireless phone number back to the first entity.
Cellular connections can be used to provision non-cellular devices such as internet-of-things (IOT) devices. For example, IoT devices can comprise Bluetooth, Wi-Fi, and cellular capabilities. However, the cellular capability can be used to provision the IoT devices using non-internet protocol data delivery to prevent security vulnerabilities. Data can be transmitted to the IoT device using core elements without using an IP stack. Thus, IoT device configurations and the keys can be provisioned over-the-air without the use of internet protocol data.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04W 12/037 - Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
Methods, computer readable media, and devices for rule-based deconfliction of overlapping data are disclosed. An example method performed by a processing system including at least one processor includes defining, with guidance from a human subject matter expert, a rule for resolving a conflict between a plurality of conflicting items of data, aggregating data from a plurality of data sources into a single pool of data, detecting a set of conflicting data items in the single pool of data, and ranking data items in the set of conflicting data items, using the rule.
Aspects of the subject disclosure may include, for example, facilitating a registration process such as by storing service information associated with a group of providers, which can include location information associated with the equipment, Data Network Name (DNN), Public Land Mobile Network (PLMN), and/or Single-Network Slice Selection Assistance Information (S-NSSAI). A service process can include wirelessly receiving a service request from a communication device, where the service request identifies a particular service and includes location information of the communication device; selecting a provider from among the group of providers according to the service request and the stored service information; and wirelessly providing provider information for the provider to the communication device that includes the corresponding DNN and the S-NSSAI of the provider, whereby the communication device can then attach to the corresponding equipment of the provider and obtain the particular service. Other embodiments are disclosed.
H04W 60/00 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration
51.
METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY SELECTING A NETWORK ASSOCIATED WITH AN ACCESS POINT NAME (APN) ON A COMMUNICATION DEVICE BASED ON PARAMETER(S)
Aspects of the subject disclosure may include, for example, initiating a data request over a mobile network, and identifying a group of parameters associated with the data request. Further embodiments include selecting a first active network associated with a first active access point name (APN) (or data network name (DNN) from a group of networks based on the group of parameters, and the mobile network comprises the group of networks. Additional embodiments include identifying a first access point for the first active network associated with the first active APN/DNN, and establishing a first data communication session associated with the data request to a first group of communication devices communicatively coupled to the first active network via the first access point. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, accessing device usage data that can be generated when end user devices connect with the network; and analyzing the device usage data according to identification information of the deployable cell site, which enables determining or estimating a location of the deployable cell site. In one embodiment, this analysis can be based on device usage reports and network performance data. A performance report and/or location map can be generated for an area associated with the deployable cell site. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, facilitating communication sessions such as voice calls over a plurality of radios of the wireless PBX via one or more carriers, where the wireless PBX includes a plurality of Subscriber Identity Modules (SIMs) and a plurality of radios, wherein there are a maximum number of concurrent communication sessions permitted that are fewer than a number of the plurality of SIMs; determining that the maximum number of concurrent communication sessions has been reached; and responsive to reaching the maximum number of concurrent communication sessions, facilitating establishing an outgoing voice call via a WiFi connection. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: creating a quantum digital twinning model for a public safety event; generating a map view of an area of the public safety event, wherein the map view shows images determined by the quantum digital twinning model; providing recommendations for actions to mitigate the public safety event, wherein the recommendations are determined from the quantum digital twinning model; and providing explainability of the recommendations determined. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining, by a processing system including a processor, network data associated with a communication network; generating, by the processing system, Quality of Service (QoS) information by applying machine learning to the network data; and providing, by the processing system, the QoS information to a Policy Control Function (PCF) that selects or generates a first UE Route Selection Policy (URSP) rule according to the QoS information and provides the first URSP to an end user device, where the first URSP rule is implemented to provide a communication service to the end user device utilizing an application via the communication network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving, over a communication network, a first message utilizing a first messaging application from a first communication device associated with a first user and identifying a recipient of the first message as a second user associated with a second communication device. Further embodiments can include determining that the second user utilizes a second message application to exchange a first group of messages via the second communication device resulting in a first determination, and transmitting, over the communication network, the first message to the second communication device utilizing the second messaging application based on the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example: determining whether a Subscriber Identify Module (SIM) profile that supports communication via Citizen Band Radio Spectrum (CBRS) is present on a device, resulting in a determination; responsive to the determination being that the SIM profile that supports the communication via the CBRS is present on the device, providing to a user via an interface an element that permits the user to select enabling of communication via the CBRS, disabling of communication via the CBRS, or any combination thereof; receiving from the interface a selection by the user, wherein the selection indicates either an instruction by the user to enable the communication via the CBRS, or an instruction by the user to disable the communication via the CBRS; and responsive to the selection: enabling the communication via the CBRS in a first case that the selection indicates the instruction by the user to enable the communication via the CBRS; or disabling the communication via the CBRS in a second case that the selection indicates the instruction by the user to disable the communication via the CBRS. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, providing, by a global node, a model to a group of nodes of a network, the model being associated with determining a configuration of the network for qubits; receiving, by the global node from one or more nodes of the group of nodes, updated model parameters, wherein the updated model parameters are generated by each of the one or more nodes via training of a local model utilizing the model and local data accessible to the particular node of the one or more nodes resulting in local nodes; generating, by the global node, an updated model based on the updated model parameters, the updated model being associated with determining the configuration of the network for the qubits; and providing, by the global node, the updated model to the group of nodes of the network, wherein the updated model facilitates managing distribution and usage of entangled qubit storage in devices of the network as reserve hybrid quantum-classical network capacity for bandwidth and computing. Other embodiments are disclosed.
G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
59.
Seamless Personal Hotspot Connectivity Via Personal Hotspot Tokens
Concepts and technologies are disclosed herein for seamless personal hotspot connectivity via personal hotspot tokens. According to one aspect disclosed herein, a personal hotspot-enabled device can include a processor and a memory. The memory can store instructions of an operating system and a personal hotspot application. The personal hotspot-enabled device can receive a personal hotspot token. The personal hotspot application can recognize, via a short-range communication component, a device identification associated with a peripheral device operating in proximity to the personal hotspot-enabled device. The personal hotspot application can request the personal hotspot token from the operating system. The personal hotspot application can inform the operating system of the device identification. The personal hotspot application can then receive the personal hotspot token associated with the device identification. The operating system can create a personal hotspot. The operating system can automatically authenticate the peripheral device to connect to the personal hotspot.
Aspects of the subject disclosure may include, for example, a mobile device that includes a home public land mobile network (HPLMN) identifier and a private home public land mobile network (PHPLMN) identifier. The mobile device prioritizes attaching to a radio access network (RAN) of the PHPLMN. The PHLMN and PHPLMN identifiers may be provided as part of an over-the-air (OTA) update. Other embodiments are disclosed.
Mobile telecommunications network access point configuration and fiber routing configuration for customer premises equipment is disclosed. A customer premises component (CPE) can comprise a customer premises mobile broadband to steerable fiber component (CPC) comprising a baseband control unit, a user-plane function component, and a fiber path selection component that can enable configuration of a cellular frontend facing a user equipment (UE) and configuration of a fiber backend facing other endpoint devices. The CPC can receive information pertinent to the configuring the frontend/backend from a network management component, a carrier network component, and internet component, etc. The CPC can automatically adapt configuration of the frontend/backend to selectively enable traffic to flow between the UE and another endpoint device.
Aspects of the subject disclosure may include, for example, identifying a set of network functions operative on a core network of a mobile communications system instantiated on a cloud network, identifying functional dependencies among respective network functions of the set of network functions, defining a sequence by which the set of network functions should be made unavailable prior to a maintenance event, wherein the defining the sequence is based on the functional dependencies, and deactivating respective network functions of the set of network functions according to the sequence. Other embodiments are disclosed.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
63.
OPTIMIZATION OF LONG TERM EVOLUTION/FIFTH GENERATION SERVICE THROUGH CONFORMITY-BASED RECOMMENDATIONS
A method performed by a processing system including at least one processor includes grouping a plurality of nodes of a telecommunications network into a plurality of reference groups, based on a plurality of configuration attributes and on a plurality of load, mobility, radio frequency attributes for the plurality of nodes, selecting a first reference group of the plurality of reference groups, where the first reference group includes a subset of the plurality of nodes, selecting a first configuration parameter of the first reference group to be tuned, identifying a first value for the first configuration parameter that is most prevalent among the subset of the plurality of nodes, and setting the first configuration parameter for all nodes in the subset of the plurality of nodes to the first value.
A processing system including at least one processor may obtain a request for a performance of a task, where the task is to be performed by at least one autonomous vehicle, broadcast an offer for performing the task to a plurality of autonomous vehicles, obtain from a first autonomous vehicle of the plurality of autonomous vehicles, a bid to perform the task by the first autonomous vehicle and at least a second autonomous vehicle, and assign the task to the first autonomous vehicle and the at least the second autonomous vehicle in response to the bid.
A method performed by a processing system including at least one processor includes calculating a quantum network relative performance metric for a current configuration of a hybrid quantum-classical telecommunications network, identifying a proposed new configuration for the hybrid quantum-classical telecommunications network, calculating the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network, and implementing the proposed new configuration in the hybrid quantum-classical telecommunications network when the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network is greater than the quantum network relative performance metric for the current configuration of the hybrid quantum-classical telecommunications network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
Facilitating avatar modifications for learning and other videotelephony sessions in advanced networks is provided herein. Operations of a system include evaluating a recorded interaction associated with a first entity during consumption of a first portion of a video conference determined to include the first entity. The operations also can include transforming an actual representation of the first entity in the recorded interaction to an avatar representation, resulting in an edited interaction of the first entity. Further, the operations can include outputting the edited interaction of the first entity for consumption of a second portion of the video conference by rendering the edited interaction for a second entity.
Concepts and technologies disclosed herein are directed to embedding texts to high dimensional vectors in natural language processing (“NLP”). According to one aspect, an NLP system can receive an input text that includes n number of words. The NLP system can encode the input text into a first matrix using a word embedding algorithm, such as Word2Vec algorithm. The NLP system can encode the input text into the Word2Vec by embedding each word in the n number of words of the input text into a k-dimensional Word2Vec vector using the Word2Vec algorithm. The NLP system also can decode the first matrix into a second matrix using a text embedding algorithm. In some embodiments, the second matrix is a congruence derivative matrix. The NLP system can then output the second matrix to a machine learning module that implements a machine learning technique such as short text classification.
The technologies described herein are generally directed to providing radio resources to facilitate a predicted transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include predicting that a user equipment of a group of user equipment in an idle mode will transition to an active mode during a time duration. The method can further include, identifying base station equipment that are able to provide coverage to the group of user equipment during the time duration. Further, the method can include, based on predicting the user equipment will transition to active mode, prioritizing allocation among the base station equipment, of resources to provide coverage to facilitate an active mode connection by the user equipment to the base station equipment.
H04W 24/02 - Arrangements for optimising operational condition
H04W 72/10 - Wireless resource allocation based on priority criteria
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Aspects of the subject disclosure may include, for example, a device comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: receiving, based upon a first communication between first user equipment and a first wireless network, a first temporary identifier of the first user equipment; correlating the first temporary identifier to a first permanent identifier of the first user equipment; tracking a first amount of data that is carried by the first wireless network and that is associated with the first user equipment, resulting in first tracked data usage, wherein the tracking is based upon the correlating of the first temporary identifier to the first permanent identifier; determining whether the first tracked data usage exceeds a first threshold, resulting in a first determination; and responsive to the first determination being that the first tracked data usage does not exceed the first threshold, providing a first reward to a first operator of the first wireless network. Other embodiments are disclosed.
Respective implementations facilitating non-service initiated (NSI) 911 device parameters are provided. A method can include detecting, by a system comprising a processor, an initialization of an emergency call by the system, the emergency call using a first communication network that is distinct from any second communication networks that the system is registered to use; generating, by the system in response to the detecting, a non-service initiated parameter message comprising data indicative of a location of the system; and initiating, by the system, the emergency call using the first communication network, the initiating comprising transmitting the non-service initiated parameter message to network equipment of the first communication network.
The technologies described herein are generally directed to providing, based on a paging message, radio resources to facilitate a transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include identifying an idle mode activation message. The method can further include, based on the activation message, predicting that the user device is going to request an active connection. Further, the method can include prioritizing allocation of antenna resources to the user device over different user devices in an idle state, based on a prediction that the user device will transition to an active state before the different user devices. Further, the method can include, based on the prioritizing, directing a base station to cause a beamformed signal to a predicted location of the user device to accept the active connection.
H04B 7/02 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Traffic steering for non-public networks and public land mobile network (PLMN) clouds is provided. A method can include retrieving, by a system comprising a processor and associated with a communication network, a subscriber profile for a user equipment in response to receiving a request from the user equipment for access to the communication network, wherein the request comprises first data network information that is distinct from second data network information associated with the communication network; and, in response to an attribute of the subscriber profile being determined to be equal to a defined value, replacing, by the system, the first data network information in the request with the second data network information and routing, by the system, the request to core network equipment of the communication network.
The technologies described herein are generally directed to providing radio resources to facilitate a predicted transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include predicting that a user equipment of a group of user equipment in an idle mode will transition to an active mode after passage of a time duration, starting from the predicting, that is lower than a time threshold. The method can further include identifying base station equipment that is able to provide coverage to the user equipment during the passage of the time duration before the user equipment transitions to the active mode. Further, the method can include prioritizing allocation of, within the group of user equipment, an antenna resource of the base station equipment to provide the coverage to facilitate an active mode connection by the user equipment to the base station equipment.
The technologies described herein are generally directed to generating a propagation model based on sampling by user equipment in idle mode in a fifth generation (5G) network or other next generation networks. An example method can include, based on a first location in a geographic area of a signal measurement measured by a user equipment in an idle mode, and a transmission location of the signal, estimating an estimated first path loss value. The method can further include, based on the estimated first path loss value and a second path loss value of a second carrier signal received from the carrier signal source, determining an antenna pattern of the carrier signal source. Further, the method can include based on the antenna pattern, generating a propagation model for the carrier signal source.
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 60/04 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration using triggered events
75.
ESTIMATING SIGNAL PROPAGATION BASED ON SAMPLING BY USER EQUIPMENT IN IDLE MODE
The technologies described herein are generally directed to mapping signal propagation using idle mode user equipment in a fifth generation (5G) network or other next generation networks. An example method can include, facilitating receiving, a message from a user equipment, with the message including signal information describing detection of a signal of a carrier of base station equipment while the user equipment was in an idle mode at a first location. The method can further include identifying a second location of the base station equipment corresponding to a time when the signal was transmitted, wherein the second location is different from the first location. Further, the method can include based on the first location, the second location, and the signal information, estimating a path loss of the carrier at the first location.
In one example, a method includes calculating a signal to noise ratio of a captured audio stream, determining that the signal to noise ratio of the captured audio stream is lower than a predefined threshold, acquiring visual data of a source of the captured audio stream in response to the determining that the signal to noise ratio of the captured audio stream is lower than the predefined threshold, using the visual data to infer a sound that is being made by the source of the captured audio stream, indexing the sound that is being made by the source of the captured audio stream to a library index, and transferring the library index to a receiving user endpoint device.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effectsMasking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
77.
Allocating antenna resources to prepare for idle equipment to transition to active mode
The technologies described herein are generally directed to preparing for a connection with a user equipment while the user equipment is in an idle state in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include facilitating transmitting a signal directed by an antenna of base station equipment. The method can further include, facilitating receiving, from a user equipment, a message, wherein the message comprises feedback information describing receipt of the signal while the user equipment was in an idle mode at a location. Further, the method can comprise, based on the feedback information and the location, generating a model of signal propagation applicable to signals at the location.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Quantum satellite-based global networks are provided. A system as provided herein includes a processor and a memory that stores first executable instructions that, when executed by the processor, facilitate performance of operations, the operations comprising receiving qubits from a quantum sensor device via a quantum communication channel established between the system and the quantum sensor device; providing quantum input data, derived from the qubits, to a quantum machine learning model; and adjusting a property of a communication network based on an output of the quantum machine learning model, produced in response to the providing of the quantum input data, resulting in an increased performance of a mobile application utilizing resources enabled via the communication network.
Techniques for developing and/or building microwave system infrastructure are enabled. For example, a method can comprise: based on the properties of the respective ones of the group of microwave devices as populated in the representation, defining, a system comprising a processor, rules that define permissible interactions between respective ones of a group of microwave devices associated with a development of a microwave network infrastructure, based on a representation and rules, planning, by the system, respective wireless hops between the respective ones of the group of microwave devices, and assigning, by the system, respective wireless paths to respective ones of the respective wireless hops further based on the rules.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a flow of data packets between first and second network addresses of a network, with each packet including respective header and payload portions. The identified flow of data packets is monitored over a number of sample periods to obtain a number of monitored results. A data-flow activity record is generated, having a number of symbols corresponding to the number of monitored results, the symbols including an active symbol value indicative of a presence of an exchange of data and an idle symbol value indicative of an absence of an exchange of data. A suitability of the identified data flow is inferred for estimating a throughput of the network according to the data-flow activity record without interpreting contents of each respective packet payload portion. Other embodiments are disclosed.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
Aspects of the subject disclosure may include, for example, an end-user device comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: storing for each other end-user device of a plurality of other end-user devices a respective identification, the end-user device and the plurality of other end-user devices forming a group; receiving a first indication of a first subset of the group with which to carry out first communications, the first subset comprising one or more first target end-user devices selected from the group; responsive to receipt of the first indication, sending to each of the one or more first target end-user devices a first instruction to communicate with the end-user device via a first dynamically determined channel; and engaging in the first communications with each of the one or more first target end-user devices after each of the one or more first target end-user devices has tuned to the first dynamically determined channel. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a method including generating a plurality of discrete polygons from a digital image of a location, modifying a boundary of a first discrete polygon of the plurality of discrete polygons based on a user input at a venue map graphical user interface, assigning, at the venue map graphical user interface, a first zone of a plurality of zones associated with a first venue of a plurality of venues to a second discrete polygon of the plurality of discrete polygons, and presenting a performance map graphical user interface for the first venue of the plurality of venues including the second discrete polygon of the plurality of discrete polygons overlaid onto the digital image of the location. Other embodiments are disclosed.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
Extending user equipment (UE) access to resources of a private network via a private core network component (PCNC) and a distributed carrier core network component (DCCNC) is disclosed. An allocation component comprised in a carrier core network can receive extension information from a first PCNC that can enable determining a connection between the first PCNC and another core network component that can extend resource access. In an embodiment, the other core network component can be the DCCNC resulting in the UE having access via the DCCNC and the first PCNC. In another embodiment, the other core network component can be a second PCNC resulting in the UE having access to the resources via the second PCNC, the DCCNC, and the first PCNC. In a further embodiment, extending access can result in the UE having access to the resources via a second PCNC, a plurality of DCCNCs, and the first PCNC.
Aspects of the subject disclosure may include, for example, an AT command that allows an application service provider to modify suspend/resume (S/R) and/or deactivate/activate (D/A) functionality specified in one or more elementary files of a UICC. The S/R and/or D/A functionality can be influenced by the application service provider without relying on SIM-OTA messages being forwarded by a mobile operator. Other embodiments are disclosed.
The technologies described herein are generally directed to using portable situational awareness equipment with communication resources deployed to facilitate communications at a remote incident area, in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include identifying a remote incident area associated with an incident. The method can further include, based on the incident, estimating a deployment location for portable network equipment within the remote incident area, resulting in an estimated deployment location. Further, the method can include, based on the estimated deployment location and estimated signal propagation at locations within the remote incident area, selecting a placement location for communication equipment to facilitate communication with the portable network equipment.
Embodiments for port reconfiguration for passive intermodulation interference mitigation are presented herein. A base station device comprises a signal processing component comprising a passive intermodulation interference component and an antenna configuration component. The passive intermodulation interference component determines passive intermodulation interference corresponding to uplink signals that have been received, via a configurable cellular antenna array of the base station device, from respective wireless devices of a group of wireless devices that have been communicatively coupled to the base station device. The antenna configuration component selects a defined configuration of a group of cellular antenna ports of the configurable cellular antenna array to facilitate a reduction of the passive intermodulation interference corresponding to the uplink signals.
H04B 1/525 - Hybrid arrangements, i.e. arrangements for transition from single-path two-direction transmission to single-direction transmission on each of two paths or vice versa with means for reducing leakage of transmitter signal into the receiver
H04B 1/10 - Means associated with receiver for limiting or suppressing noise or interference
H04W 72/044 - Wireless resource allocation based on the type of the allocated resource
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
89.
ANTENNA FARM INTELLIGENT SOFTWARE DEFINED NETWORKING ENABLED DYNAMIC RESOURCE CONTROLLER IN ADVANCED NETWORKS
Facilitating antenna farm intelligent software defined networking enabled dynamic resource controller networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a system can comprise evaluating a condition, the condition being at a mobile device, and a characteristic related to a defined network service associated with a connection to the mobile device. The operations can also comprise selectively modifying a quantity of antennas utilized to provide the connection to the mobile device based on the condition being determined to influence a level of service associated with the defined network service.
H04W 24/04 - Arrangements for maintaining operational condition
H04B 7/04 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
H04W 4/029 - Location-based management or tracking services
A system that incorporates teachings of the subject disclosure may include, for example, dividing a media content item into a plurality of media content segments, at each media content segment of the plurality of media content segments, applying motion estimation between at least two video frames of the media content segment to determine a content weight for the media content segment, determining a bit rate for the media content segment according to the determined content weight for the media content segment, and encoding the media content segment at the determined bit rates to generate a data stream for the media content segment, whereby a plurality of data streams for the plurality of media content segments of the media content are generated, and transmitting the plurality of data streams for the plurality of media content segments of the media content to the one or more media devices. Other embodiments are disclosed.
H04N 21/647 - Control signaling between network components and server or clientsNetwork processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load or bridging between two different networks, e.g. between IP and wireless
H04N 19/115 - Selection of the code volume for a coding unit prior to coding
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/2381 - Adapting the multiplex stream to a specific network, e.g. an IP [Internet Protocol] network
H04N 21/2383 - Channel coding of digital bit-stream, e.g. modulation
Aspects of the subject disclosure may include, for example, receiving information about an augmented reality (AR) environment which includes a plurality of objects and a user participating in the AR environment, the user viewing the AR environment through a user equipment, receiving context information for the AR environment, identifying a diminished reality (DR) object of the plurality of objects, wherein the identifying is responsive to the context information, modifying the AR environment to render the DR object invisible to the user viewing the AR environment through user equipment, monitoring movement of one or more objects of the AR environment including the DR object, and modifying visibility of the DR object to the user viewing the AR environment through user equipment as a notification of a possible collision between the user and the DR object, wherein the modifying is responsive to detecting a risk of collision. Other embodiments are disclosed.
A content filtering system and method includes receiving in a network device in a network from a user device, a user selected set of rules identifying a set of URLs to be blocked. The set of rules are loaded into the network device. The network device receives from the user device a request to access a specified URL. A determination is made at the network device whether the specified URL is in the user selected set of rules. If the specified URL is in the user selected set of rules, then the specified URL is blocked.
When a network element attempts to establish a session with another network element, a security verification agent may be activated in one or both network elements. The security verification agents, such as front-end processors, virtual network functions, or other software agents, may reside in each of the network elements.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Systems and methods may provide for deactivating the Idle mode discontinuous reception (iDRX) for services that require latency that is less than the conventional paging channel values.
Aspects of the subject disclosure may include, for example, a network device that comprises a processing system including a processor and a memory storing instructions that, when executed by the processing system, facilitate performance of operations. The operations include obtaining timing advance data regarding a communication device served by the network; the timing advance data is collected by a network element coupled to the network device, and the network element communicates with the communication device using control-plane signaling. The timing advance data is processed using location data regarding the network element to determine a geolocation of the communication device. The geolocation is stored at a storage device; the network device and storage device are included in a secure portion of the network. The geolocation is provided to equipment of a network customer accessing the secure portion of the network via a secure interface. Other embodiments are disclosed.
Wireless presence is used as a theft prevention mechanism for packages. When a package is shipped, the package includes a wireless security device. Before the package is delivered to its final destination shipping address, the wireless security device is activated and programmed with a security credential. The security credential, though, is based on information obtained during an initial purchase. The wireless security device may thus only be deactivated by a recipient participating in the initial purchase.
An architecture for dynamically selecting and routing traffic from Internet of things (IoT) devices and sensors to the nearest or most proximate IoT hub device. A method can comprise receiving a connection request from a user device; retrieving address data representing a network device of a group of network devices; and sending the address data to the user device.
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
98.
Cooperative intelligent traffic system communication between bicycles
A cooperative intelligent traffic system is provided for use between bicycles, motorcycles, and other vehicles. Sensor data from mobile devices and other sensor devices associated with the vehicle can be sent to an edge network computing device (e.g., a multi-access edge computing device) and be processed at the edge network to identify threats and hazards, and then transmit the threat assessment data to other bicycles, motorcycles, and vehicles nearby. The threat assessment data can be used by the operators of the other vehicles to warn them of upcoming threats, hazards, road conditions, and other pertinent conditions.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
H04W 4/02 - Services making use of location information
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
A virtualized network function included in a mobile communication network may be capable of performing validation of sensor data. The sensor data may be generated by one or more sensors monitoring a tangible asset that is being transported between geographical locations. The sensor data may be received by the virtualized network function from an Internet-enabled device in communication with the mobile communication network. In some cases, a contract management application included in the virtualized network function may validate the sensor data based on one or more compliance thresholds describing a shipment condition of the tangible asset. Based on determining whether the sensor data indicates a compliant shipment condition for the tangible asset, the contract management application may modify a contract associated with the tangible asset.
Aspects of the subject disclosure may include, for example, a device in which a processing system detects installation of a subscriber identity module (SIM) on a communication device configured for connection to the network; the SIM includes a radio policy manager (RPM) provided by the network operator to manage network policies. The system also monitors connection of the communication device to the network and communications between the SIM and a processor of the communication device. The RPM determines whether the communication device is compliant with the network policies; if the communication device is not compliant with the network policies, the RPM causes the connection of the communication device to the network to be disabled. Other embodiments are disclosed.