The technologies described herein are generally directed to providing radio resources to facilitate a predicted transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include predicting that a user equipment of a group of user equipment in an idle mode will transition to an active mode during a time duration. The method can further include, identifying base station equipment that are able to provide coverage to the group of user equipment during the time duration. Further, the method can include, based on predicting the user equipment will transition to active mode, prioritizing allocation among the base station equipment, of resources to provide coverage to facilitate an active mode connection by the user equipment to the base station equipment.
H04W 72/52 - Allocation or scheduling criteria for wireless resources based on load
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04W 24/02 - Arrangements for optimising operational condition
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04W 72/56 - Allocation or scheduling criteria for wireless resources based on priority criteria
Techniques for developing and/or building microwave system infrastructure are enabled. For example, a method can comprise: based on the properties of the respective ones of the group of microwave devices as populated in the representation, defining, a system comprising a processor, rules that define permissible interactions between respective ones of a group of microwave devices associated with a development of a microwave network infrastructure, based on a representation and rules, planning, by the system, respective wireless hops between the respective ones of the group of microwave devices, and assigning, by the system, respective wireless paths to respective ones of the respective wireless hops further based on the rules.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
3.
METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY SELECTING A NETWORK ASSOCIATED WITH AN ACCESS POINT NAME (APN) ON A COMMUNICATION DEVICE BASED ON PARAMETER(S)
Aspects of the subject disclosure may include, for example, initiating a data request over a mobile network, and identifying a group of parameters associated with the data request. Further embodiments include selecting a first active network associated with a first active access point name (APN) (or data network name (DNN) from a group of networks based on the group of parameters, and the mobile network comprises the group of networks. Additional embodiments include identifying a first access point for the first active network associated with the first active APN/DNN, and establishing a first data communication session associated with the data request to a first group of communication devices communicatively coupled to the first active network via the first access point. Other embodiments are disclosed.
Traffic steering for non-public networks and public land mobile network (PLMN) clouds is provided. A method can include retrieving, by a system comprising a processor and associated with a communication network, a subscriber profile for a user equipment in response to receiving a request from the user equipment for access to the communication network, wherein the request comprises first data network information that is distinct from second data network information associated with the communication network; and, in response to an attribute of the subscriber profile being determined to be equal to a defined value, replacing, by the system, the first data network information in the request with the second data network information and routing, by the system, the request to core network equipment of the communication network.
Aspects of the subject disclosure may include, for example, a device, including: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving a selection criteria for calls originating from a telephone number; detecting a call having a caller identification matching the telephone number; determining that the call does not meet the selection criteria; and blocking the call responsive to the determining. Other embodiments are disclosed.
Respective implementations facilitating non-service initiated (NSI) 911 device parameters are provided. A method can include detecting, by a system comprising a processor, an initialization of an emergency call by the system, the emergency call using a first communication network that is distinct from any second communication networks that the system is registered to use; generating, by the system in response to the detecting, a non-service initiated parameter message comprising data indicative of a location of the system; and initiating, by the system, the emergency call using the first communication network, the initiating comprising transmitting the non-service initiated parameter message to network equipment of the first communication network.
Aspects of the subject disclosure may include, for example, detecting a service outage in a service area of a wireless network, assessing scope of the service outage according to a set of bins defined for the service area affected by the service outage, identifying one or more cells serving the set of bins for the service area affected by the service outage, identifying candidate cells to be reconfigured to serve the bins, selecting one or more candidate cells, forming selected cells, determining antenna tilts for each of the selected cells, the antenna tilts determined to provide coverage to bins of the set of bins for the service area affected by the service outage, and redirecting antennas of the selected cells according to the antenna tilts to compensate for the service outage at bins of the set of bins. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device, including: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: training a role-based agent to handle queries from users of a network; training a role-based foundation model to retrieve data relevant to a role of a user; receiving a query from the user; and providing the query to the role-based agent, wherein the role-based agent uses an associated role-based foundation model to process the query, collect relevant data from the network, and formulate an answer to the query. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, transmitting a first identifier associated with a processing system to a communication device, transmitting first data to the communication device, obtaining, from the communication device and based on the transmitting of the first identifier and the first data, a first directive, wherein the first directive directs the processing system to utilize a first radio access technology for a first communication session, and utilizing, based on the first directive, the first radio access technology for the first communication session. Other embodiments are disclosed.
The technologies described herein are generally directed to providing, based on a paging message, radio resources to facilitate a transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include receiving an instruction to modify a message type to include signal propagation information; generating, by the processing system while the device is in an idle mode, the signal propagation information; transmitting, by the processing system to a network equipment, a message of the message type including the signal propagation information, wherein the signal propagation information is configured for use by the network equipment to allocate an antenna resource for the device; and transitioning, by the processing system, the device from the idle mode to an active mode, the transitioning facilitated by the antenna resource.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Aspects of the subject disclosure may include, for example, obtaining building information indicative of physical characteristics of a building; obtaining first network status information indicative of first wireless network capabilities provided by first equipment inside the building; obtaining second network status information indicative of second wireless network capabilities provided by second equipment outside the building; obtaining user demand information indicative of user demand for wireless communication services within the building; providing the building information, the first network status information, the second network status information, and the user demand information to a machine learning (ML) mechanism in order to facilitate generation by the ML mechanism of an output; responsive to the providing, receiving from the ML mechanism the output; and presenting the output in visual form, in audio form, as data, as a graph, as a chart, as a table, or any combination thereof. Other embodiments are disclosed.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Concepts and technologies disclosed herein are directed to providing a call transfer management service that enables management of calls and call transfers between linked devices to provide optimal connectivity for calls. A system can receive a notification that a first device and a second device are linked devices. In response, the system can determine that the first and second devices are linked devices. While the first and second devices remain within proximity of one another and in response to determining that the devices are linked, the system can modify call data associated with outgoing calls from the second device to assign a telephone number of the first device to the outgoing calls and modify call data associated with incoming calls to the first device to reroute the incoming calls to the second device. The system can also transfer an in-progress call handled by the first device to the second device.
A processing system may obtain a data set with records of network parameter changes, each record including at least one network parameter change and at least one attribute associated with a first aspect of a communication network, and a corresponding network performance indicator change. A first record may include a plurality of network parameter change groups. The processing system may next perform a de-confusion process by identifying a second record comprising a single network parameter change group, determining that a corresponding network performance indicator change is different from that of the at least the first record, and updating the data set to replace the first record with at least two replacement records. The processing system may apply at least one of the network parameter change groups to a second aspect of the communication network based upon a decision output of a classifier that is trained using the updated data set.
H04W 24/02 - Arrangements for optimising operational condition
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Aspects of the subject disclosure may include, for example, a device, comprising a first processing system associated with a first operator of a first network and including a processor, and a memory that stores executable instructions that, when executed by the first processing system, facilitate performance of operations. The operations may include receiving, from a second processing system associated with a second operator of a second network, a request to share one or more radio access network (RAN) resources of the first network, responsive to the receiving the request, utilizing one or more generative AI models to determine whether the one or more RAN resources are to be shared, resulting in a determination, and based on the determination indicating that the one or more RAN resources are to be shared, causing the one or more RAN resources to be allocated for use by the second network. Other embodiments are disclosed.
H04W 28/084 - Load balancing or load distribution among network function virtualisation [NFV] entitiesLoad balancing or load distribution among edge computing entities, e.g. multi-access edge computing
H04L 5/00 - Arrangements affording multiple use of the transmission path
Aspects of the subject disclosure may include, for example, establishing a first cluster comprising a first plurality of members, identifying a first plurality of values to trial in respect of a first member of the first plurality of members, the first plurality of values being included in a second plurality of values and being less than an entirety of the second plurality of values, performing a first plurality of trials in respect of the first member of the first plurality of members based on iterating amongst the first plurality of values to obtain a first plurality of results, selecting at least one value included in the first plurality of values based on the first plurality of results, and utilizing the at least one value for each member of the first plurality of members of the first cluster. Other embodiments are disclosed.
Aspects of the subject disclosure may include a method comprising: obtaining, by a mobile device comprising a processing system including a processor, data indicating that one or more first transceivers of a plurality of transceivers belongs to a first sub-group; receiving a first command from a user of the mobile device; transmitting by the processing system to the first sub-group a first communication instruction, the first communication instruction directing at least one transceiver of the first sub-group to communicate with the mobile device via a first portion of wireless spectrum that is dynamically assigned, the first communication instruction being transmitted to each of the first sub-group on a second portion of wireless spectrum distinct from the first portion of wireless spectrum; and engaging in first communications with each transceiver of the first sub-group via the first portion of wireless spectrum. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving data packets from a plurality of user equipment, where the data packets are classified according to markings configured to identify a class of service to which each packet belong, and the class of service is associated with a quality of service that determines a priority treatment of each packet; detecting the markings of each packet and based on the detected markings, recognizing that each packet corresponds to standalone network traffic or non-standalone network traffic; and prioritizing forwarding of the standalone network traffic when a determination is made that bandwidth is limited. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes grouping a plurality of nodes of a telecommunications network into a plurality of reference groups, based on a plurality of configuration attributes and on a plurality of load, mobility, radio frequency attributes for the plurality of nodes, selecting a first reference group of the plurality of reference groups, where the first reference group includes a subset of the plurality of nodes, selecting a first configuration parameter of the first reference group to be tuned, identifying a first value for the first configuration parameter that is most prevalent among the subset of the plurality of nodes, and setting the first configuration parameter for all nodes in the subset of the plurality of nodes to the first value.
Concepts and technologies disclosed herein are directed to applying a user profile to a shared space to customize at least one characteristic of the shared space. The shared space can obtain identification information corresponding to a user associated with the shared space and can determine, based at least on the identification information, if the user is a primary user of the shared space. If the shared space determines that the user is not the primary user of the shared space, the shared space can receive a user profile associated with the user from a customization service system. The shared space can instruct a control unit of the shared space to apply the user profile to the shared space to customize the shared space based on the user profile.
B60R 16/037 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for occupant comfort
The technologies described herein are generally directed to providing radio resources to facilitate a predicted transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include predicting that a user equipment of a group of user equipment in an idle mode will transition to an active mode after passage of a time duration, starting from the predicting, that is lower than a time threshold. The method can further include identifying base station equipment that is able to provide coverage to the user equipment during the passage of the time duration before the user equipment transitions to the active mode. Further, the method can include prioritizing allocation of, within the group of user equipment, an antenna resource of the base station equipment to provide the coverage to facilitate an active mode connection by the user equipment to the base station equipment.
Edge-driven network provisioning can include receiving, from a customer premises equipment located at an installation site, a configuration request that identifies the customer premises equipment and a location associated with the installation site. Available connections can be identified for data communication services that are available at the installation site for the customer premises equipment. Provisioning options that are based on the available connections can be generated and a user device associated with the customer premises equipment can be identified. The provisioning options can be provided to the user device and the user device can present the provisioning options in a user interface presented at the user device. A provisioning selection corresponding to a selection of one of the provisioning options can be received and a provisioning command can be sent to one or more recipients to cause a service to be provisioned to the customer premises equipment.
Aspects of the subject disclosure may include, for example, determining, by a processing system including a processor of a first network operator, that a user equipment located within a communication range of the processing system is an authenticated subscriber of a second network operator, resulting in a first determination, and providing, by the processing system and based on the first determination, an update to software or firmware of the user equipment that is initiated by the second network operator. Aspects of this disclosure may include determining that a first resource associated with a first cellular network is functioning in a degraded state, determining an impact of the degraded state, based on the impact exceeding a first threshold, identifying a second resource to mitigate the impact, and activating the second resource. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a user equipment (UE) device operative for receiving, from a local network, a mobile country code identifying a jurisdiction in which the local network is located, identifying, in a memory of the UE device, a lawful intercept modify parameter associated with the jurisdiction, receiving, based on the lawful intercept modify parameter, regulatory requirements for implementing lawful intercept procedures by the UE device, and communicating with the local network according to the lawful intercept procedures. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining that a first network node device satisfies an overload threshold; identifying a second network node device that satisfies an availability threshold and that is initiating incoming handovers of second network communication devices, assigning one or more first values to one or more respective first relation parameters, each first value being associated with control of the incoming handovers of the second network communication devices; selecting a third network node device that satisfies an availability threshold, the third network node device being selected to receive outgoing handovers from the first network node device; and assigning one or more second values to one or more respective second relation parameters, each second value being associated with control of the outgoing handovers to the third network node device, wherein the one or more second values are assigned independently of the one or more first values. Other embodiments are disclosed.
H04W 36/22 - Performing reselection for specific purposes for handling the traffic
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04W 72/232 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
25.
PORT RECONFIGURATION FOR PASSIVE INTERMODULATION INTERFERENCE MITIGATION
Embodiments for port reconfiguration for passive intermodulation interference mitigation are presented herein. A base station device comprises a signal processing component comprising a passive intermodulation interference component and an antenna configuration component. The passive intermodulation interference component determines passive intermodulation interference corresponding to uplink signals that have been received, via a configurable cellular antenna array of the base station device, from respective wireless devices of a group of wireless devices that have been communicatively coupled to the base station device. The antenna configuration component selects a defined configuration of a group of cellular antenna ports of the configurable cellular antenna array to facilitate a reduction of the passive intermodulation interference corresponding to the uplink signals.
H04B 1/525 - Hybrid arrangements, i.e. arrangements for transition from single-path two-direction transmission to single-direction transmission on each of two paths or vice versa with means for reducing leakage of transmitter signal into the receiver
H04B 1/10 - Means associated with receiver for limiting or suppressing noise or interference
H04W 72/044 - Wireless resource allocation based on the type of the allocated resource
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
26.
SECURE PROVISIONING FOR WIRELESS LOCAL AREA NETWORK TECHNOLOGIES
Cellular connections can be used to provision non-cellular devices such as internet-of-things (IoT) devices. For example, IoT devices can comprise Bluetooth, Wi-Fi, and cellular capabilities. However, the cellular capability can be used to provision the IoT devices using non-internet protocol data delivery to prevent security vulnerabilities. Data can be transmitted to the IoT device using core elements without using an IP stack. Thus, IoT device configurations and the keys can be provisioned over-the-air without the use of internet protocol data.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04W 12/037 - Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
Facilitating avatar modifications for learning and other videotelephony sessions in advanced networks is provided herein. Operations of a system include evaluating a recorded interaction associated with a first entity during consumption of a first portion of a video conference determined to include the first entity. The operations also can include transforming an actual representation of the first entity in the recorded interaction to an avatar representation, resulting in an edited interaction of the first entity. Further, the operations can include outputting the edited interaction of the first entity for consumption of a second portion of the video conference by rendering the edited interaction for a second entity.
The described technology is generally directed towards combining user identity information, corresponding to user profile data, with vehicle information, such as for use by a traffic zone management system that charges a fee for vehicle usage in a traffic zone. A user device, such as a mobile communications device, can be coupled to vehicle information such as via a transponder that is detected by roadside units, or by uploading the combined information to a wireless communications system. Based on the combination of information, different billing rates or the like can be applied to different users and vehicle types. The technology can work with various communication systems, including roadside units and wireless communication networks.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G07B 15/06 - Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems
H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
In one example, a method includes calculating a signal to noise ratio of a captured audio stream, determining that the signal to noise ratio of the captured audio stream is lower than a predefined threshold, acquiring visual data of a source of the captured audio stream in response to the determining that the signal to noise ratio of the captured audio stream is lower than the predefined threshold, using the visual data to infer a sound that is being made by the source of the captured audio stream, indexing the sound that is being made by the source of the captured audio stream to a library index, and transferring the library index to a receiving user endpoint device.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effectsMasking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
30.
EFFICIENT APPLICATION OF ADAPTIVE CODING AND MODULATION IN COMMUNICATION SYSTEMS
Aspects of the subject disclosure may include, for example, obtaining a received signal including information transmitted over a physical channel of a communications link, measuring a quality of the communications link according to the received signal, and characterizing interference according to the measured quality. An adaptive coding and modulation (ACM) algorithm is selected from among a group of different ACM algorithms based on the characterized interference. The selected ACM algorithm is adapted to increase information throughput of the communications link over alternative ACM algorithms of the group of different ACM algorithms in view of the characterized interference. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device that has a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of performing a packet analysis of protocol data unit (PDU) headers of inbound Internet and non-Internet traffic; determining whether the PDU headers identify the presence of a quantum payload and/or via deep packet inspection; detecting a presence of attack vectors in the quantum payload responsive to a determination that the PDU headers identify the presence of the quantum payload, wherein the attack vectors originate from a quantum computer, and wherein the attack vectors are cryptanalytically relevant; generating an alert responsive to detecting the presence of the attack vectors; and isolating compromised network elements, sets of elements, and/or other network components and/or subsystems, and route traffic around the compromised network elements, sets of elements, and/or other network components and/or subsystems. Other embodiments are disclosed.
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, when the mobile device moves away from mobile edge computing (MEC) coverage, the information from the MEC can be ported to a new MEC along the way of the mobile device's path. The initial MEC can send service related application package data to one or more neighboring MECs. When a neighboring MEC of the neighboring MECs receives the service related application package data and the neighboring MEC serves the area which the mobile device is transitioning to, then the neighboring MEC can send an acknowledgment back to the initial MEC. Once the acknowledgment is received by the initial MEC, the initial MEC can complete the handover of the application data needed to reduce or mitigate any disruption in service for the mobile device.
Aspects of the subject disclosure may include, for example, a method comprising: determining whether a backhaul communication path between a wireless communications node and a core network has become degraded; responsive to the backhaul communication path having become degraded, connecting a low earth orbit (LEO) satellite antenna for first bi-directional communication between the LEO satellite antenna and a radio element of the node; configuring the LEO satellite antenna for second bi-directional communication between the LEO satellite antenna and a LEO satellite; and based upon the configuring, facilitating outgoing communications from each of a plurality of wireless end-user devices to the core network via the LEO satellite and facilitating incoming communications to each of the plurality of wireless end-user devices from the core network via the LEO satellite. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.
A resource upgrade predictor can be operable to receive, from a first network node device, traffic information. Based on the traffic information, the resource upgrade predictor can obtain network utilization data related to other network node devices having a similar interference characteristic (e.g., signal-to-noise ratio) to the first network node device. The resource upgrade predictor can use this network utilization data to determine a demand (e.g., demand level, demand point) at which at least a defined value related to a transmission link capacity associated with transmissions between the first network node device and the user equipment, is attained (e.g., a percentage of physical resource block loading). The resource upgrade predictor can also obtain projected demand data associated with a geographic area serviced by the first network node device, and determine, based upon the demand and the projected demand data, a time at which a network resource upgrade related to the first network node device, is to be performed.
A managed Wi-Fi service network device can receive, from a cellular network device, an allowable throughput rate at which a user equipment is authorized to communicate via a managed Wi-Fi service network. Based on the allowable throughput rate, the managed Wi-Fi service network device can monitor a communication rate of the user equipment via the managed Wi-Fi service network. In response to the user equipment communicating via the managed Wi-Fi service network at a rate that exceeds the allowable throughput rate, the managed Wi-Fi service network device can facilitate reducing the communication rate of the user equipment. Also, a user equipment can receive from a cellular network device an allowable throughput rate at which the user equipment is authorized to communicate via the managed Wi-Fi service network. The UE can communicate via the managed Wi-Fi service network at a communication rate that does not exceed the allowable throughput rate.
An architecture for dynamically selecting and routing traffic from Internet of things (IoT) devices and sensors to the nearest or most proximate IoT hub device. A method can comprise receiving a connection request from a user device; retrieving address data representing a network device of a group of network devices; and sending the address data to the user device.
H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
H04L 67/54 - Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
H04L 67/564 - Enhancement of application control based on intercepted application data
H04L 67/565 - Conversion or adaptation of application format or content
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
H04L 67/62 - Establishing a time schedule for servicing the requests
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
39.
SYSTEM AND METHOD FOR MODULE AND ANTENNA REPLACEMENT IN CONNECTED VEHICLES AND EQUIPMENT
Aspects of the subject disclosure may include, for example, modifying one or more components of a connected vehicle communication system of a vehicle, the connected vehicle communication system operative to communicate vehicle data with network equipment of a service provider over a mobile network of a mobile network operator, confirming operational connectivity among the one or more components of the connected vehicle communication system, communicating to the network equipment of the service provider, information confirming a successful modification of the one or more components of the connected vehicle communication system. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, examining first actions imposed as part of a maintenance activity in respect of a communication network while the communication network is subjected to second actions as part of the maintenance activity, determining, based on the examining, that the first actions, in whole or in part, fail to adhere to a threshold, a requirement, or a specification, and based on the determining, reversing at least one action of the first actions. Other embodiments are disclosed.
SYSTEM AND METHODS FOR ENSURING SECURITY, TRUST, AND PRIVACY IN GENERATIVE ARTIFICIAL INTELLIGENCE (AI) CONTENT WITH QUANTUM BLOCKCHAINS AND QUANTUM DIGITAL SIGNATURES
A method for providing quantum computation-based security solutions for generative artificial intelligence content includes generating an item of new content based on an input, and using a generative artificial intelligence foundation model that has been trained to generate items of new content having characteristics that mimic characteristics of content included in a set of training data, storing the item of new content in a quantum temporal blockchain, detecting an action performed by the generative artificial intelligence foundation model against the item of new content, and logging the action in the quantum temporal blockchain.
In 6G, there are multiple radios that can cover the same location at any time, and yet radio failure can occur. However, a mobile edge computing (MEC) platform can increase the footprint of adjacent radios to compensate for a failed radio. To reduce the failure interruption and maintain a quality of experience for a subscriber, the MEC can utilize a virtual session capability to communicate radio change of service characteristics to a service provider. Consequently, the change in service characteristics can comprise an expanded coverage area for adjacent radios such that a mobile device of the subscriber can take advantage of the expanded coverage area without experiencing an interruption in service.
A method performed by a processing system in a cellular core network includes receiving, from a session management function of the cellular core network, a query for a policy rule associated with a subscriber who has requested a packet data unit session, querying a charging function of the cellular core network for a charging counter associated with the subscriber, receiving, from the charging function, the charging counter, wherein the charging counter contains a value identifying a service package to which the subscriber is subscribed, determining a rating group associated with the service package, and sending, to the session management function, a set of application identifiers associated with the rating group, wherein each application identifier of the set of application identifiers identifies one software application that is included in the service package.
A processing system may obtain a downscaled version of a reference copy of a video, comprising a plurality of downscaled versions of a plurality of frames of the reference copy of the video, obtain a first recorded frame of a first variant of a plurality of variants associated with the reference copy of the video, where the plurality of variants comprises a plurality of copies of the video encoded at different bitrates, generate a first downscaled version of the first recorded frame, calculate a first plurality of image distances between the first downscaled version of the first recorded frame and the plurality of downscaled versions of the plurality of frames of the reference copy of the video, and determine a first frame index of the first recorded frame in accordance with a first least image distance from among the first plurality of image distances that is calculated.
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
H04N 19/10 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
H04N 19/154 - Measured or subjectively estimated visual quality after decoding, e.g. measurement of distortion
H04N 21/232 - Content retrieval operation within server, e.g. reading video streams from disk arrays
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/236 - Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator ] into a video stream, multiplexing software data into a video streamRemultiplexing of multiplex streamsInsertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rateAssembling of a packetised elementary stream
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
45.
System and method for mitigating robocalls with false positive elimination for valid subscribers
Aspects of the subject disclosure may include, for example, a device having: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: determining whether a calling number of a call is unallocated; determining whether the calling number is unassigned to a subscriber; validating the calling number as an authentic telephone number; categorizing the calling number as fraud or spam responsive to the calling number being unallocated, allocated and unassigned, or allocated, assigned and invalid; and categorizing the calling number as neutral responsive to the calling number being allocated, assigned and validated. Other embodiments are disclosed.
A processing system including at least one processor of a network access device may detect an installation of the network access device in a wireless communication system of a vehicle. The processing system may next interrogate at least one antenna unit of the wireless communication system of the vehicle and obtain, from the at least one antenna unit in response to the interrogating, a set of antenna capability information. The processing system may then configure the wireless communication system of the vehicle in accordance with at least a portion of the set of the antenna capability information.
Aspects of the subject disclosure may include, for example, an AT command that allows an application service provider to modify suspend/resume (S/R) and/or deactivate/activate (D/A) functionality specified in one or more elementary files of a UICC. The S/R and/or D/A functionality can be influenced by the application service provider without relying on SIM-OTA messages being forwarded by a mobile operator. Other embodiments are disclosed.
A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.
Aspects of the subject disclosure may include, for example, obtaining a first communication request that includes an identifier, determining that the identifier is included in a first plurality of unassigned identifiers, resulting in a first determination, wherein the first plurality of unassigned identifiers is associated with a plurality of networks, and based on the first determination, rejecting the first communication request. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a method including collecting performance data associated with a communication network operating at a venue, providing the performance data for the communication network to a performance map graphical user interface, where the performance map graphical interface presents a plurality of discrete polygons and a plurality of graphical keys, and where the plurality of graphical keys are superimposed onto the plurality of polygons associated with a plurality of zones associated with the venue, detecting a first performance attribute associated with a first zone of the plurality of zones associated with the venue exceeding a threshold according to a first graphical key of the plurality of graphical keys that is superimposed onto a first discrete polygon of the plurality of discrete polygons, and triggering a notification according to the detecting the first performance exceeding the threshold. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes sending an instruction to an application executing on a mobile device, where the instruction causes the application to configure the mobile device to measure and report a radio frequency of a first wireless communications access network, wherein the mobile device is subscribed to a service provided by a second wireless communications access network, receiving measurements of the radio frequency of the first wireless communications access network from the mobile device, and generating a coverage map illustrating a coverage of the first wireless communications access network, using the measurements.
AT&T Global Network Services Hong Kong LTD (Hong Kong)
AT&T Mobility II LLC (USA)
Inventor
Chau, Winnie
Mulligan, John Philip
Gowda, Shashi
Abstract
The concepts and technologies disclosed herein are directed to time-aware blockchain staged regulatory control of Internet of Things (“IoT”) data. A federation platform can receive a registration request from an enterprise edge platform to register a blockchain identifier for publication of public data on a public blockchain. The federation platform can determine if the registration request contains any restricted data parameters. In response to determining that the registration request does not contain any restricted data parameters, the federation platform can query a security module to obtain an encryption key. The federation platform can receive the encryption key from the security module and store the encryption key in association with the blockchain identifier and an enterprise edge platform ID that uniquely identifies the enterprise edge platform. The federation platform can return the encryption key to the enterprise edge platform and allow publication of encrypted public data to the public blockchain.
When a network element attempts to establish a session with another network element, a security verification agent may be activated in one or both network elements. The security verification agents, such as front-end processors, virtual network functions, or other software agents, may reside in each of the network elements.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Aspects of the subject disclosure may include, for example, receiving information defining a high-capacity event in a mobility network, receiving information defining a network location of the high-capacity event in the mobility network, automatically configuring one or more network components of the mobility network according to a set of high-capacity parameters, the one or more network components associated with the network location of the high-capacity event, limiting access to the mobile network to specific users according to the high-capacity parameters, and after the high-capacity event, automatically configuring the one or more network components of the mobile network according to a set of reversion parameters. Other embodiments are disclosed.
A processing system including at least one processor may generate a plurality of visual tracks from a source visual content, where the plurality of visual tracks comprises visual tracks of different visual quality levels and with different intra frame offsets, apply at least one network condition within a communication network, transmit one or more visual streams to one or more client devices via the communication network, where the one or more visual streams includes frames selected from among the plurality of visual tracks, and measure at least one quality metric for at least one of the one or more visual streams in accordance with the applying of the at least one network condition within the communication network.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an encoded video stream for transmitting to a mobile phone or a thin client
56.
DEPLOYING COMMUNICATIONS RESOURCES FOR PORTABLE SITUATIONAL AWARENESS EQUIPMENT AT A REMOTE INCIDENT AREA
The technologies described herein are generally directed to using portable situational awareness equipment with communication resources deployed to facilitate communications at a remote incident area, in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include identifying a remote incident area associated with an incident. The method can further include, based on the incident, estimating a deployment location for portable network equipment within the remote incident area, resulting in an estimated deployment location. Further, the method can include, based on the estimated deployment location and estimated signal propagation at locations within the remote incident area, selecting a placement location for communication equipment to facilitate communication with the portable network equipment.
A processing system of an autonomous aerial vehicle including at least one processor may determine informational data to present for at least one person, capture at least a first image via at least one imaging sensor of the autonomous aerial vehicle in a vicinity of the at least one person and determine a first position and a first orientation of the at least one person. The processing system may then identify, based upon the first position and the first orientation of the at least one person, a plurality of candidate projection areas, each candidate projection area comprising a contiguous area within the at least the first image that is deemed to be visible to the at least one person, select one of the plurality of candidate projection areas as a projection zone, and project the informational data on the projection zone via a projector.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
Aspects of the subject disclosure may include receiving a first data set related to a first International Mobile Subscriber Identifier (IMSI) from a wireless core system, tidying the first data set by building a bandwidth matrix representing each bandwidth usage value with respect to a selected time-stamp and one or more flow IDs associated with the first IMSI, repeating the receiving and tidying operations with respect to a plurality of data sets related to remaining IMSIs, and generating data visualization displaying the bandwidth usage value of the first IMSI and the remaining IMSIs. The first IMSI and the remaining IMSIs are associated with a selected network slice ID. Other embodiments are disclosed.
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
60.
Apparatuses and methods for facilitating a health check in respect of communication networks and systems, inclusive of an outer loop health check
Aspects of the subject disclosure may include, for example, examining first actions imposed as part of a maintenance activity in respect of a communication network while the communication network is subjected to second actions as part of the maintenance activity, determining, based on the examining, that the first actions, in whole or in part, fail to adhere to a threshold, a requirement, or a specification, and based on the determining, reversing at least one action of the first actions. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a system, comprising: a message-sending device comprising a first processing system including a first processor, wherein the message-sending device further comprises a first wireless communication mechanism, wherein the first processing system is configured to receive an input command, wherein the input command is provided by a person who is coaching a player, wherein the person who is coaching the player is located on a sideline of a field, and wherein the player is on the field; and a helmet worn by the player, wherein the helmet comprises a second processing system including a second processor, wherein the helmet further comprises a second wireless communication mechanism, and wherein the helmet further comprises a display mechanism positioned in a line of sight of at least one eye of the player; wherein the first processing system determines whether a play clock associated with a current play has been running for a threshold amount of time, resulting in a determination; wherein, responsive to the determination being that the play clock associated with the current play has not been running for the threshold amount of time, the first processing system transmits via the first wireless communication mechanism to the helmet a message that is based upon the input; wherein the second processing system receives, via the second wireless communication mechanism of the helmet, the message; and wherein, responsive to receipt of the message, the second processing system causes the display mechanism to display the message. Other embodiments are disclosed.
AT&T Global Network Services Czech Republic s.r.o. (Czech Republic)
AT&T Mobility II LLC (USA)
Inventor
Hao, Shuai
Andrei, Alexandru Cristian
Perez, Hector
Coates, Jr., Donald
Ge, Zihui
Hicks, Alvin
Tipton, Jason
Abstract
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Aspects of the subject disclosure may include, for example, obtaining indications of a respective priority level of each cell of a plurality of cells in respect of supporting Category M (CATM) communication services, determining, at a first point in time, that CATM is active in a first cell of the plurality of cells, resulting in a first determination, determining, based on the first determination, that a utilization of resources of the first cell is greater than a first threshold, resulting in a second determination, and activating, based on the second determination, CATM in at least a second cell of the plurality of cells. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
A method includes detecting that a first satellite of a non-terrestrial network is moving out of a field of view of a user endpoint device that is currently connected to the non-terrestrial network, estimating a time at which a second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, selecting, in response to the time at which the second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, an uplink power for the user endpoint device, and sending, to the user endpoint device, an instruction to transmit at the uplink power that is selected.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 52/40 - TPC being performed in particular situations during macro-diversity or soft handoff
66.
Data-driven artificial intelligence (AI) for communication networks
Aspects of the subject disclosure may include, for example, obtaining first data from a first component of a disaggregated wireless communication network; obtaining second data from a second component of the disaggregated wireless communication network; formatting the first data and the second data for use in a generative artificial intelligence (AI) process, wherein the formatting results in formatted data; applying the formatted data to the generative AI process, wherein the generative AI process results in one or more first commands for the first component of the disaggregated wireless communication network; and transmitting the one or more first commands to the first component of the disaggregated wireless communication network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining, by a processing system including a processor, network data associated with a communication network; generating, by the processing system, Quality of Service (QOS) information by applying machine learning to the network data; and providing, by the processing system, the QoS information to a Policy Control Function (PCF) that selects or generates a first UE Route Selection Policy (URSP) rule according to the QoS information and provides the first URSP to an end user device, where the first URSP rule is implemented to provide a communication service to the end user device utilizing an application via the communication network. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device that receives data from a machine-type communication (MTC) device located at a premises, determines an identifier for the MTC device; compares the identifier with a list of identifiers; and, responsive to determining that the MTC device is a listed device, transmits the data to a first network element remote from the premises. The device and the first network element do not receive data from devices at the premises generating human traffic communications (HTC). The first network element transmits the data to a second network element for aggregation and subsequent transmission to a cloud data facility comprising cloud storage. A data path from the device to the first network element, from the first network element to the second network element, and from the second network element to the cloud data facility forms a secure data path. Other embodiments are disclosed.
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
A streaming orchestrator may monitor the quality of video being delivered to a home or other building. If the streaming orchestrator determines that additional performance is needed, it may create an additional User Plane Gateway in the virtual “white box” environment residing in the customer premises. The streaming orchestrator may instruct gNodeBs to continue to route traffic back to the central core functions or to route traffic to local user plane gateways which transmit video streams to the Internet via localized high-speed connections.
A method performed by a processing system including at least one processor includes calculating a quantum network relative performance metric for a current configuration of a hybrid quantum-classical telecommunications network, identifying a proposed new configuration for the hybrid quantum-classical telecommunications network, calculating the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network, and implementing the proposed new configuration in the hybrid quantum-classical telecommunications network when the quantum network relative performance metric for the proposed new the hybrid quantum-classical telecommunications network is greater than the quantum network relative performance metric for the current configuration of the hybrid quantum-classical telecommunications network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
Generating a core instance via a first access network device of a first access network, wherein the core instance facilitates operation of a second access network via a second access network device of the second access network is disclosed. Generally, implementing a core network can be highly resource intensive, e.g., high labor, equipment, and monetary costs. The level of resources that are conventionally committed in developing a core instance can be a significant barrier for many small or medium sized entities. The disclosed subject matter discloses a configuration component that can generate a core instance that can be performed at a remotely located access network. In an embodiment, a remotely implemented core instance can be updatable. Further, in response to a remotely implemented core instance failing to perform, a monitoring component can facilitate a failover operation.
A content filtering system and method includes receiving in a network device in a network from a user device, a user selected set of rules identifying a set of URLs to be blocked. The set of rules are loaded into the network device. The network device receives from the user device a request to access a specified URL. A determination is made at the network device whether the specified URL is in the user selected set of rules. If the specified URL is in the user selected set of rules, then the specified URL is blocked.
Aspects of the subject disclosure may include, for example, a system that manages reuse of mobile subscriber identity information. Further aspects may include mobile subscriber identity information used in a device having multiple device profiles indexed, directly or indirectly, by multiple ki (e.g. shared secret keys). Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device in which a cloud connection stack and a security transport stack are each partially or entirely implemented for execution in a modem (e.g., a cellular modem) or a SIM component (e.g., an IoT SAFE SIM applet) of the device, rather than on the device's own OS and processor. Some or all of the application layer protocols (e.g., MQTT, CoAP, LwM2M, etc.) in the security transport stack may be implemented (or consolidated) for execution by the modem or SIM component. Some or all of the functionality of the cloud connection stack (e.g., bootstrapping and messaging/telemetry) may additionally, or alternatively, be implemented (or consolidated) for execution by the modem or SIM component. Other embodiments are disclosed.
An example method performed by a processing system includes receiving a request from a first user to render an extended reality environment, wherein the request includes a definition of a first policy that governs user behavior within the extended reality environment, rendering the extended reality environment by presenting content contributed by at least one user in the extended reality environment, monitoring the extended reality environment to ensure that the rendering results in a compliance of the extended reality environment with the first policy, detecting that a portion of the content contributed by at least one other user of the extended reality environment results in the extended reality environment failing to comply with the first policy, and modifying a presentation of the portion of content in the extended reality environment in response to the detecting, wherein the modifying results in the compliance of the extended reality environment with the first policy.
Aspects of the subject disclosure may include, for example, receiving, over a communication network, a first message utilizing a first messaging application from a first communication device associated with a first user and identifying a recipient of the first message as a second user associated with a second communication device. Further embodiments can include determining that the second user utilizes a second message application to exchange a first group of messages via the second communication device resulting in a first determination, and transmitting, over the communication network, the first message to the second communication device utilizing the second messaging application based on the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.
Mobile telecommunications network access point configuration and fiber routing configuration for customer premises equipment is disclosed. A customer premises component (CPE) can comprise a customer premises mobile broadband to steerable fiber component (CPC) comprising a baseband control unit, a user-plane function component, and a fiber path selection component that can enable configuration of a cellular frontend facing a user equipment (UE) and configuration of a fiber backend facing other endpoint devices. The CPC can receive information pertinent to the configuring the frontend/backend from a network management component, a carrier network component, and internet component, etc. The CPC can automatically adapt configuration of the frontend/backend to selectively enable traffic to flow between the UE and another endpoint device.
H04B 10/2575 - Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
79.
LOCATION AWARE ASSIGNMENT OF RESOURCES FOR PUSH TO TRANSFER (PTT) COMMUNICATION SYSTEMS IN A FIFTH GENERATION (5G) NETWORK OR OTHER NEXT GENERATION WIRELESS COMMUNICATION SYSTEM
The technologies described herein are generally directed to facilitating operation of system that can include a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. In embodiments, the operations can include receiving, from a source user equipment, a first request to communicate to a destination group of user equipment via a multi-cast connection. Further operations can include identifying respective service areas of ones of the destination group, comprising a service area of a destination user equipment of the destination group. In some embodiments, operations can include generating a second request to initiate the multi-cast connection, the second request comprising the destination group of user equipment with the respective service areas, wherein the respective service area of the destination user equipment is for selection, by second network equipment based on the service area, a gateway group of base station equipment.
Techniques for integrating a device platform in a core network or MEC environment, and managing data communications associated with devices are presented. The device platform, integrated with the core network or MEC environment, can comprise a communication management component (CMC) that can manage communication of data associated with devices connected to the core network. CMC can receive data and metadata from a device, analyze the data and metadata, and, based on the analyzing and data management criteria, determine whether any, all, or a portion of the data is to be communicated to a second device associated with the core network or associated communication network. CMC can be trained, using machine learning, to learn to identify device types, communication protocols, and data payload formats of devices. Based on the analyzing and the training, CMC can determine the device type, communication protocol, and data payload format associated with the device.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A framework for dynamic network resource allocation and energy saving based on the real-time environment, radio network information, and machine learning (ML) can be utilized via a radio access network (RAN) intelligent controller (RIC). Real-time and predicted network utilization can facilitate resource and energy savings by leveraging the RIC platform. For example, a network information base (NIB) in the RIC platform can collects RAN and user equipment (UE) resource related information in real time and provides the abstraction of the access network in the real time. ML can predict real-time information about the UEs at time t based on data analytics and real time radio resource needs. The RIC can then instruct the network to reduce or increase resources.
The technologies described herein are generally directed to providing, based on a paging message, radio resources to facilitate a transition to active mode by idle user equipment in a fifth generation (5G) network or other next generation networks. An example method can include identifying an idle mode activation message. The method can further include, based on the activation message, predicting that the user device is going to request an active connection. Further, the method can include prioritizing allocation of antenna resources to the user device over different user devices in an idle state, based on a prediction that the user device will transition to an active state before the different user devices. Further, the method can include, based on the prioritizing, directing a base station to cause a beamformed signal to a predicted location of the user device to accept the active connection.
H04B 7/02 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Adjusting a network path between a user equipment and a network edge cloud instance is disclosed. The adjustment of the network path can be based on performance of the network path. The performance of the network path can be ranked, based on performance, against other network paths. In an embodiment, the other network paths can be between the user equipment and the network edge cloud instance. Additionally, the other network paths can be between the user equipment and another network edge cloud instance that can be located remotely from the network edge cloud instance. In an embodiment, a recommendation can be provided to a cloud service provider to enable the cloud service provider to adjust a characteristic of an application or service performed by a network edge cloud instance. The disclosed subject matter can provide advantages over conventional cloud instances that are typically supported on a device located distant from a network device operated by a network provider.
A new scalable approach to conflict-free deployment of changes across networks. The conflict rules or constraints may be modeled using policies and algorithms to determine an optimized schedule for change deployment.
H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/085 - Retrieval of network configurationTracking network configuration history
H04L 41/0873 - Checking configuration conflicts between network elements
H04L 41/12 - Discovery or management of network topologies
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
An application provided by a subscriber identity module of a cellular endpoint device may obtain a notification of a network rejection from a first cellular network and may select at least one update to at least one operational parameter of the subscriber identity module, in response to the notification of the network rejection, where the selecting is according to a selection logic of the application. The application provided by the subscriber identity module may then apply the at least one update to the at least one operational parameter of the subscriber identity module, in accordance with the selecting, and may generate a refresh instruction to the subscriber identity module.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
H04W 76/18 - Management of setup rejection or failure
A system for delaying or inhibiting data is provided in order to shorten the time required for a reselection process from a first communication protocol to a second communication protocol. Reselection from the first communication protocol to the second communication protocol (e.g., 3G to 4G) requires a period of time without data transfers to allow the reselection to complete. The system delays or inhibits data transfers on the mobile device until the reselection process completes or the mobile device is idle for a predetermined length of time. In an embodiment, the system can buffer outgoing data and then send the data once the reselection has completed. In other embodiments, the system can drop packet sessions or ignore incoming packet pages. In another embodiment, the system can delay or inhibit data based on the priority of the data.
Aspects of the subject disclosure may include, for example, a network device that comprises a processing system including a processor and a memory storing instructions that, when executed by the processing system, facilitate performance of operations. The operations include obtaining timing advance data regarding a communication device served by the network; the timing advance data is collected by a network element coupled to the network device, and the network element communicates with the communication device using control-plane signaling. The timing advance data is processed using location data regarding the network element to determine a geolocation of the communication device. The geolocation is stored at a storage device; the network device and storage device are included in a secure portion of the network. The geolocation is provided to equipment of a network customer accessing the secure portion of the network via a secure interface. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, transmitting a first identifier associated with a processing system to a communication device, transmitting first data to the communication device, obtaining, from the communication device and based on the transmitting of the first identifier and the first data, a first directive, wherein the first directive directs the processing system to utilize a first radio access technology for a first communication session, and utilizing, based on the first directive, the first radio access technology for the first communication session. Other embodiments are disclosed.
Architectures and techniques are presented that can provide point-to-point analysis to generate an improved signal strength prediction (SSP) based on, e.g., earth surface image data processing and analysis to draw conclusions of line of sight (LOS) along the propagation path between a BTS or another AP transmitter and CPE receiver. For example, USGS image data and/or elevation data of locations are identified to correspond to signal propagation between the transmitter and receiver can be analyzed for LOS signal quality at a fixed location, in addition to the statistical model prediction of the RF signal quality. As a result, foliage or terrain that obstructs the LOS can be identified and utilized to improve SSP by eliminating the additional pathloss due to LOS obstructions. Such can provide a significant improvement to SSP results that are conventionally predicted by statistical models rather than a point-to-point analysis.
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
H04B 17/309 - Measuring or estimating channel quality parameters
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04W 16/20 - Network planning tools for indoor coverage or short range network deployment
H03J 1/00 - Details of adjusting, driving, indicating, or mechanical control arrangements for resonant circuits in general
H04B 1/10 - Means associated with receiver for limiting or suppressing noise or interference
H04B 10/112 - Line-of-sight transmission over an extended range
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
90.
DYNAMICALLY LAYERED BEAMFORMED SIGNALS FOR FIFTH GENERATION (5G) WIRELESS COMMUNICATION SYSTEMS OR OTHER NEXT GENERATION WIRELESS COMMUNICATION SYSTEMS
The technologies described herein are generally directed to using dynamically layered beamformed control signals in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, identifying a group of different directions radiating from beamforming antenna equipment of base station equipment. The method can further include facilitating transmitting a first beamformed signal according to a first direction of the group of different directions. Further, the method can include facilitating transmitting a second beamformed signal according to a second direction of the group of different directions, with the second direction being selected based on a sequence of directions, and where transmitting beamformed signals to the group of different directions is based on the sequence of directions can facilitate establishment of wireless coverage for a corresponding geographic area.
H04B 7/0408 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas using two or more beams, i.e. beam diversity
Aspects of the subject disclosure may include, for example, a device that has a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of performing a packet analysis of protocol data unit (PDU) headers of inbound Internet and non-Internet traffic; determining whether the PDU headers identify the presence of a quantum payload and/or via deep packet inspection; detecting a presence of attack vectors in the quantum payload responsive to a determination that the PDU headers identify the presence of the quantum payload, wherein the attack vectors originate from a quantum computer, and wherein the attack vectors are cryptanalytically relevant; generating an alert responsive to detecting the presence of the attack vectors; and isolating compromised network elements, sets of elements, and/or other network components and/or subsystems, and route traffic around the compromised network elements, sets of elements, and/or other network components and/or subsystems. Other embodiments are disclosed.
A method for managing multi-vendor fifth generation/sixth generation and next-generation hybrid quantum-classical networks includes determining a proposed network compute cloud configuration for a hybrid quantum-classical telecommunications network supported by a plurality of cloud environments, determining a protocol that is required to implement the proposed network compute cloud configuration, based on a topology of the hybrid quantum-classical telecommunications network, and delegating a quantum function of the proposed network compute cloud configuration among the plurality of cloud environments, using the protocol.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
Aspects of the subject disclosure may include, for example, receiving information about an augmented reality (AR) environment which includes a plurality of objects and a user participating in the AR environment, the user viewing the AR environment through a user equipment, receiving context information for the AR environment, identifying a diminished reality (DR) object of the plurality of objects, wherein the identifying is responsive to the context information, modifying the AR environment to render the DR object invisible to the user viewing the AR environment through user equipment, monitoring movement of one or more objects of the AR environment including the DR object, and modifying visibility of the DR object to the user viewing the AR environment through user equipment as a notification of a possible collision between the user and the DR object, wherein the modifying is responsive to detecting a risk of collision. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.
th generation (6G) ubiquitous wireless communications network is provided. The framework includes obtaining first information associated with a first condition of a terrestrial radio network from a terrestrial controller that collects the first information from the terrestrial radio networks; determining second information associated with a resource of a satellite network, where a defined application is alternatively executable at the mobile device via any of a group of networks, the group comprising the satellite network and the terrestrial radio networks, and determining whether to re-assign the defined application from the terrestrial radio network to the satellite network based on a result of evaluating at least the first condition.
A smart communications hub can enable management of driverless and/or autonomous vehicles. Separating current wireless data from driverless vehicle sensor data can allow for quicker resolutions involving driverless vehicles. The smart communications hub can communicate to other groups such as driverless vehicle providers, service providers, vehicle management, law enforcement, etc. The smart communications hub can also process requests from both mobile applications and micro-service applications.
G07C 5/00 - Registering or indicating the working of vehicles
B60T 7/16 - Brake-action initiating means for automatic initiationBrake-action initiating means for initiation not subject to will of driver or passenger operated by remote control, i.e. initiating means not mounted on vehicle
B60T 8/88 - Arrangements for adjusting wheel-braking force to meet varying vehicular or ground-surface conditions, e.g. limiting or varying distribution of braking force responsive to a speed condition, e.g. acceleration or deceleration with failure responsive means, i.e. means for detecting and indicating faulty operation of the speed responsive control means
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04N 5/765 - Interface circuits between an apparatus for recording and another apparatus
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
97.
Performance-driven network parameter changes in a communication network
A processing system may obtain a data set with records of network parameter changes, each record including at least one network parameter change and at least one attribute associated with a first aspect of a communication network, and a corresponding network performance indicator change. A first record may include a plurality of network parameter change groups. The processing system may next perform a de-confusion process by identifying a second record comprising a single network parameter change group, determining that a corresponding network performance indicator change is different from that of the at least the first record, and updating the data set to replace the first record with at least two replacement records. The processing system may apply at least one of the network parameter change groups to a second aspect of the communication network based upon a decision output of a classifier that is trained using the updated data set.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 24/02 - Arrangements for optimising operational condition
Aspects of the subject disclosure may include, for example, a process that formulates an inference that a first group of mobile devices are at ground level, and obtains, for the first group of mobile devices, positions and barometric pressure readings. Ground heights with respect to a common reference height are determined for the first group of mobile devices, and reference barometric pressures are calculated for the first group of mobile devices, at the common reference height according to the barometric pressure readings and the determined ground heights. At least a portion of the reference barometric pressures are combined to obtain a reference barometric pressure. Other embodiments are disclosed.
G01C 5/06 - Measuring heightMeasuring distances transverse to line of sightLevelling between separated pointsSurveyors' levels by using barometric means
G01D 21/02 - Measuring two or more variables by means not covered by a single other subclass
G06F 17/18 - Complex mathematical operations for evaluating statistical data
99.
Method and apparatus for detecting nuisance traffic events based on network and wireless phone number
A processing system may determine a nuisance traffic event. The processing system may receive from a first entity a request to determine a status of a wireless user endpoint device associated with a wireless phone number, wherein the status comprises a determination as to a validity of a subject communication associated with the wireless phone number, perform a presence analysis of the wireless user endpoint device based on the wireless phone number, and respond to the request by providing an indication as to the validity of the subject communication associated with the wireless phone number back to the first entity.
A processing system may determine a nuisance traffic event. The processing system may receive from a first entity a request to determine a status of the wireless user endpoint device associated with a wireless phone number, wherein the status comprises a determination as to a validity of a subject communication associated with the wireless phone number, perform a presence analysis of the wireless user endpoint device, and respond to the request by providing an indication as to the validity of the subject communication associated with the wireless phone number back to the first entity.