A system for detecting and profiling endpoints of a computer network is provided. The system includes a first computing device including at least one processor in communication with at least one memory device. The first computing device is in communication with a computer network. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to receive a plurality of packets transmitted to the computer network, determine an identity of a first end point device associated with the plurality of packets, determine a behavior pattern for the first end point device based on the plurality of packets, and generate a synthetic profile for the first end point device based on the identity and the behavior pattern.
A network device for maintaining a communication network is provided. The network device includes a transceiver configured for operable communication with at least one device. The network device also includes a processor including a memory configured to store computer-executable instructions. When executed by the processor the instructions cause the network device to store a plurality of settings for operation of the communication network, monitor message traffic to and from one or more devices on the communication network, generate a report based on the monitored message traffic, transmit, to a user via a user device, the report, receive, from the user via the user device, an update to one or more settings of the plurality of settings for operation of the communication network, monitor additional message traffic, and filter one or more messages of the additional message traffic based on the updated plurality of settings.
Communication systems and methods using a hybrid-switch dynamic bandwidth allocation (DBA) are provided. A predetermined switch threshold is calculated for each data subcarrier of a downstream optical signal. The downstream optical signal is transmitted by an optical line terminal (OLT) to a plurality of optical network units (ONUs) disposed remotely from the OLT. A status report is received from each ONU of the plurality of ONUs and a current load is calculated for each data subcarrier of the one or more data subcarriers based on the status report from each ONU. The current load is determined to meet or not meet the predetermined switch threshold. A first DBA algorithm is selected when the current load does not meet the predetermined switch threshold and a second DBA algorithm is selected when the current load meets the predetermined switch threshold. The selected DBA algorithm is then executed.
A system for micro-segmented networking is provided. A system controller is programmed to a) store a plurality of micro-segmented network accounts and a plurality of subscriber accounts, b) receive a request from a user device to activate a first micro-segmented network associated with a first subscriber account, c) authenticate the first subscriber account based on the subscriber information, d) activate the first micro-segmented network, including a plurality of device slots for a plurality of devices, e) transmit, to the user device, first device slot authentication information for a first device slot of the plurality of device slots; f) receive, from a first device connecting to the wireless network, the first device slot authentication information; g) authenticate the first device slot authentication information; and h) in response to authenticating the first device slot authentication information, connect the first device to the first micro-segmented network.
A coherent optical injection locking (COIL) apparatus generates multiple optical source outputs from a single optical source generated by a parent laser. The COIL apparatus includes a plurality of optical source generators each having a child laser, of lesser performance than the parent laser, that is injection locked to the single optical source. The optical source generators may have one or both of a shared configuration and a cascaded configuration that replicates the single optical source, or a single wavelength of the single optical source when it is a comb source.
H04B 10/80 - Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups , e.g. optical power feeding or optical transmission through water
H04J 14/02 - Wavelength-division multiplex systems
6.
Systems and method for network connectivity management
A system for micro-segmented networking is provided. A system controller is programmed to a) store a plurality of micro-segmented network accounts and a plurality of subscriber accounts, b) receive a request from a user device to activate a first micro-segmented network associated with a first subscriber account, c) authenticate the first subscriber account based on the subscriber information, d) activate the first micro-segmented network, including a plurality of device slots for a plurality of devices, e) transmit, to the user device, first device slot authentication information for a first device slot of the plurality of device slots; f) receive, from a first device connecting to the wireless network, the first device slot authentication information; g) authenticate the first device slot authentication information; and h) in response to authenticating the first device slot authentication information, connect the first device to the first micro-segmented network.
A method operable with a first communication network for supporting a user equipment (UE) device having at least a first identity associated with the first communication network and a second identity associated with a second communication network. The method includes (a) exchanging data with the UE device via a first access communication link, the first access communication link being an access communication link of the first communication network, (b) exchanging data with the UE device via a second access communication link and an interface between the first and second communication networks, the second access communication link being an access communication link of the second communication network, (c) performing access traffic steering, switching, and splitting (ATSSS) across at least the first and second communication links, at least partially using a proxy server associated with the first communication network.
A method for generating an optical frequency comb includes generating a first optical frequency comb spanning a first optical bandwidth and including a first plurality of frequency tones spaced by a free-spectral range. The method also includes generating an additional optical frequency comb from a first frequency tone of the first plurality of frequency tones.
In some implementations, a network onboarding system may receive, over a first connectivity protocol, a uniform resource identifier (URI) for an IoT device. The network onboarding system may authenticate, over the first connectivity protocol, the IoT device based on the URI. The network onboarding system may exchange, with the IoT device, over the first connectivity protocol, a set of IoT device credentials with a set of onboarding credentials for an IoT network. The network onboarding system may configure a notify message that includes the IoT device credentials for transmission over a second connectivity protocol. The network onboarding system may perform, by the network onboarding system, a filtered discovery of the IoT device over the second connectivity protocol. The network onboarding system may onboard, over the second connectivity protocol, the IoT device onto the IoT network.
A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
H04L 61/503 - Internet protocol [IP] addresses using an authentication, authorisation and accounting [AAA] protocol, e.g. remote authentication dial-in user service [RADIUS] or Diameter
11.
Systems and methods for advanced image-based privacy preservation and protection
A system is provided. The system includes at least one processor in communication with at least one memory device that includes instructions that cause the at least one processor to: a) receive an image including a plurality of objects; b) scan the image to identify one or more privacy objects in the plurality of objects in the image, wherein each privacy object of the one or more privacy objects includes private information; c) determine a number of degrees of freedom for each privacy object of the one or more privacy objects; d) generate a replacement object based upon the number of degrees of freedom for the corresponding privacy object, wherein the replacement object resembles the privacy object with private information removed; e) replace the privacy object with the replacement object in the image; and f) generate a modified image based upon the image and the one or more replacement objects.
A method for wireline data transmission includes (1) at a parent network node, generating first communication signals within a first frequency range, the first communication signals complying with a wireless data transmission protocol, (2) shifting frequency of the first communication signals from being within the first frequency range to being within a second frequency range, and (3) after shifting frequency of the first communication signals, sending the first communication signals from the parent network node to a first child network node via a first wireline communication link communicatively coupling the parent network node and the first child network node.
A method operable by a wireless access point for managing beacons in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless communication network includes (a) generating unencrypted first broadcast beacons, the unencrypted first broadcast beacons including a first Basic Service Set IDentifier (BSSID) identifying a first basic service set (BSS), (b) wirelessly transmitting the unencrypted first broadcast beacons to at least a first client of the IEEE 802.11 wireless communication network, (c) determining that the first client of the IEEE 802.11 wireless communication network has associated with the first BSS, (d) in response to determining that the first client of the IEEE 802.11 wireless communication network has associated with the first BSS, encrypting unencrypted first unicast beacons to obtain encrypted first unicast beacons, and (f) wirelessly transmitting the encrypted first unicast beacons to the first client of the IEEE 802.11 wireless communication network.
A method for multiple repeater aggregation includes (a) receiving, at a first node of a wireless communication network, wireless communication signals from a second node of the wireless communication network via a plurality of wireless communication paths, where each of the wireless communication paths includes a respective radio frequency (RF) repeater, and (b) selecting one of the plurality of wireless communication paths for use in transferring data between the first node of the wireless communication network and the second node of the wireless communication network, at least partially based on measured conditions of the plurality of wireless communication paths.
Systems and methods for scoring language model outputs using a scoring model are provided. At least one input information and at least one output from a language model may be received as input by a scoring language model. The scoring language model may be configured to score the at least one output based on the at least one input information to yield an output score. A user interface may output the output score and the output from the language model.
A method of processing a protocol data unit (PDU) set for a data network includes steps of (a) receiving a first PDU packet of the PDU set, (b) receiving, subsequent to reception of the first PDU packet, a second PDU packet of the PDU set, (c) determining, after receiving the first and second PDU packets, a congestion status of the data network for the PDU set, (d) controlling, based on the determined congestion status, a handling state of the second PDU packet to match a handling state of the first PDU packet, and (e) transmitting the first PDU packet and the controlled second PDU packet to a destination receiver of the data network.
A method of processing a protocol data unit (PDU) set for a data network includes steps of (a) receiving a first PDU packet of the PDU set, (b) receiving, subsequent to reception of the first PDU packet, a second PDU packet of the PDU set, (c) determining, after receiving the first and second PDU packets, a congestion status of the data network for the PDU set, (d) controlling, based on the determined congestion status, a handling state of the second PDU packet to match a handling state of the first PDU packet, and (e) transmitting the first PDU packet and the controlled second PDU packet to a destination receiver of the data network.
A network-as-a-platform (NaaP) ecosystem includes a network exposure layer (NEL). The NEL includes a plurality of federated application programming interfaces (APIs) having at least a first federated API and a second federated API different from the first federated API. The NaaP ecosystem further includes a first network in operable communication with the NaaP ecosystem through the first federated API of the NEL, and a second network, different from the first network, in operable communication with the NaaP ecosystem through the second federated API of the NEL. The NEL enables the second network access to at least one capability of the first network.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
A network resiliency architecture including a first optical splitter, a second optical splitter, and an optical switch. The first optical splitter including a hub-side splitter-port A01 that optically couples to a first optical line terminal, a node-side splitter-port A02 optically coupled to the hub-side splitter-port A01, and a node-side splitter-port A03 optically coupled to the hub-side splitter-port A01. The second optical splitter including a hub-side splitter-port B01 that optically couples to a second optical line terminal, a node-side splitter-port B02 optically coupled to the hub-side splitter-port B01, and a node-side splitter-port B03 optically coupled to the hub-side splitter-port B01. The optical switch including (a) four input switch-ports each optically coupled to a respective one of the splitter-ports A02, A03, B02, and B03, (b) a first output switch-port that optically couples to a first aggregation node of an optical network, and (c) a second output switch-port that optically couples to a second aggregation node of an optical network.
Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or otherwise enable access to services requiring authentication credentials, certificates, tokens or other information. The authentication may utilize Digital Transmission Content Protection (DTCP) certificates, Diffie-Hellman (DH) parameters or other information available to the authenticating devices, optionally without requiring device requesting authentication to obtain an X.509 certificate.
A method for mitigating delay in availability of data in a communication network includes predicting an amount of data to egress a first communication device; modifying the predicted amount of data to egress the first communication device according to a data delay profile, to generate a first signal representing anticipated upcoming data transmission by the first communication device, where the data delay profile represents delay in availability of data at the first communication device; transmitting the first signal from the first communication device to the second communication device; generating one or more Grants at the second communication device at least partially in accordance with the first signal, each Grant authorizing the first communication device to transfer data via the network; and transmitting the one or more Grants from the second communication device to the first communication device.
An injection locked transmitter for an optical communication network includes a master seed laser source input substantially confined to a single longitudinal mode, an input data stream, and a laser injected modulator including at least one slave laser having a resonator frequency that is injection locked to a frequency of the single longitudinal mode of the master seed laser source. The laser injected modulator is configured to receive the master seed laser source input and the input data stream, and output a laser modulated data stream.
Transport layer security (TLS) for the Internet and Sixth Generation (6G) Communications is described herein. A first network node encapsulates a transport layer security (TLS) ClientHello message, a client key share, and one or more other TLS extensions in a first hypertext transfer protocol (HTTP) POST request message. Then, the first network node sends, to a second network node, the first HTTP POST request message. The second network node forwards the first HTTP POST request message to a third network node. The third network node encapsulates a TLS ServerHello message, a server key share, a TLS Server Finished message, and one or more other TLS server generated messages in a first HTTP 200 OK status response message. The third network node sends the first HTTP 200 OK status response message to the second network node, which forwards the message to the first network node.
A method for selecting a wireless communication network for use by a user equipment device that is moving includes (a) determining that the user equipment device is connected to each of a first wireless communication network and a second wireless communication network and (b) selecting, at least partially based on speed of movement of the user equipment device, one of the first wireless communication network and the second wireless communication network for use by the user equipment device for data transmission. The first wireless communication network is, for example, one of a community Wi-Fi wireless communication network and a community Third Generation Partnership Project (3GPP) wireless communication network. The second wireless communication network is, for example, one of a cellular wireless communication network and a satellite wireless communication network.
Systems and methods for quantifying network quality using a scoring model are provided. At least one measurement is received by an analysis agent and inputted into a scoring model. The scoring model comprises a machine learning model configured to receive the at least one measurement, input the at least one measurement into a plurality of functions, weight the output of each function by a corresponding weight of a plurality of weights, and combine the weighted output to generate an end user score. The end user score is compared to a predetermined threshold.
Systems and methods for quantifying network quality using a scoring model are provided. At least one measurement is received by an analysis agent and inputted into a scoring model. The scoring model comprises a machine learning model configured to receive the at least one measurement, input the at least one measurement into a plurality of functions, weight the output of each function by a corresponding weight of a plurality of weights, and combine the weighted output to generate an end user score. The end user score is compared to a predetermined threshold.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
27.
SYSTEMS, METHODS AND APPARATUS FOR HANDLING A UE SUPPORTING DUALSTEER AND MULTI-SUBSCRIBER IDENTITY MODULE (MUSIM) FEATURES
Methods, systems and apparatus for session management for handling a DualSteer multi-subscriber identity module (MUSIM) device, such as a UE, are provided herein. In an example, the UE transmits, to a first network node, first information indicating the UE supports at least one MUSIM feature and at least one DualSteer feature. The UE receives, from the first network node, second information indicating that the first network node and a second network node support the MUSIM feature and the DualSteer feature. The UE transmits, to the first network node, based on the second information, data using the at least one MUSIM feature and the at least one DualSteer feature. Additionally or alternatively, the UE is a MUSIM and Dualsteer UE, the first network node is a next generation radio access network (NG-RAN) node, and the second network node includes an Access and Mobility Management Function (AMF).
A method for variable time division duplex (TDD) data allocation in a communication network including a donor wireless communication node and a plurality of child wireless communication nodes. The method includes (a) determining a highest traffic child wireless communication node of the plurality of child wireless communication nodes, the highest traffic child wireless communication node having a highest data transmission requirement of the plurality of child wireless communication nodes, and (b) allocating data in first TDD data frames to be transmitted between the donor wireless communication node and a first child wireless communication node of the plurality of child wireless communication nodes according to a first data frame allocation, the first data frame allocation including allocating an on-demand portion of the first TDD data frames to data associated with the highest traffic child wireless communication node.
A method for evaluating a wireless communication environment includes (1) causing each of a first wireless base station and a second wireless base station to operate in a respective coordination operating mode where each of the first and second wireless base stations supports wireless communication using a common wireless communication channel, and (2) receiving first environmental data from the first wireless base station, the first environmental data representing one or more characteristics of the common wireless communication channel from a perspective of the first wireless base station.
A network server is provided. The network server includes at least one processor in communication with at least one memory device. The network server is programmed to receive an access request originating from a user device, perform an authentication process for connecting with the user device, transmit, to the user device, a request message for a media access control (MAC) address of the user device, receive, from the user device, a response message including the MAC address of the user device, and determine whether to grant the access request based on the MAC address of the user device.
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
H04L 101/622 - Layer-2 addresses, e.g. medium access control [MAC] addresses
Methods and apparatus for session management for a Fifth Generation (5G) roaming solution using PRotocol for N32 INterconnect Security (PRINS) are provided herein. A first roaming intermediary (RI) Proxy receives a first hypertext transfer protocol secure (HTTPS) request, including a first JavaScript Object Notation (JSON) Web Encryption (JWE) token. The first RI Proxy reconstructs a first hypertext transfer protocol (HTTP) request based on the JWE token, and forwards the first HTTP request to a first RI application. The first RI Proxy receives a second HTTP request from the first RI application. The first RI Proxy creates a first JSON patch based on the first HTTP request and the second HTTP request. The first RI Proxy protects the first JSON patch with JSON Web Signature (JWS) to create a first JWS token. The first RI Proxy sends a second HTTPS request, including the first JWE token and the first JWS token.
Session management for a Fifth Generation (5G) roaming solution using PRotocol for N32 INterconnect Security (PRINS) with roaming intermediaries is described herein. A first network node establishes a transport layer security (TLS) connection with a second network node, wherein the TLS connection is established using hypertext transfer protocol secure (HTTPS) as a uniform resource identifier (URI). The first network node creates a security negotiation request message, including a fully qualified domain name (FQDN) of the second network node. The first network node protects information elements (IEs) in the security negotiation request message with a Javascript Object Notation (JSON) Web Signature (JWS) token, wherein the JWS token uses a digital signature and includes a public key certificate of the first network node. The first network node sends over TLS, to the second network node, an HTTPS request, including the security negotiation request message and the JWS token.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04W 84/04 - Large scale networksDeep hierarchical networks
33.
SYSTEMS AND METHODS FOR FREE SPACE OPTICAL INJECTION LOCKING
An optical emission array includes an optical input portion configured to provide a parent laser source for the optical emission array, and an optical output portion including a plurality of child laser emitters. Each child laser emitter of the plurality of child laser emitters is injection-locked to the parent laser source. The optical emission array further includes at least two optical distribution branches (i) disposed between the optical input portion and the optical output portion, and (ii) optically connecting at least two child laser emitters of the plurality of child laser emitters, respectively, to the parent laser source.
A network device for maintaining a communication network is provided. The network device includes a transceiver configured for operable communication with at least one device. The network device also includes a processor including a memory configured to store computer-executable instructions. When executed by the processor the instructions cause the network device to store a plurality of settings for operation of the communication network, monitor message traffic to and from one or more devices on the communication network, generate a report based on the monitored message traffic, transmit, to a user via a user device, the report, receive, from the user via the user device, an update to one or more settings of the plurality of settings for operation of the communication network, monitor additional message traffic, and filter one or more messages of the additional message traffic based on the updated plurality of settings.
A system and method for optimizing the end-to-end latency transfer rates over an air interface employing a Multi-hop Relays (MHR). The present system and method provides fast signaling process when no Downlink/Uplink Bandwidth allocation changes are employed, thereby bypassing PHY/MAC/IP Stack processing. The solution is intended for the new generation of 5G millimeter band multi-hop relays.
A system for detecting and profiling endpoints of a computer network is provided. The system includes a first computing device including at least one processor in communication with at least one memory device. The first computing device is in communication with a computer network. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to receive a plurality of packets transmitted to the computer network, determine an identity of a first end point device associated with the plurality of packets, determine a behavior pattern for the first end point device based on the plurality of packets, and generate a synthetic profile for the first end point device based on the identity and the behavior pattern.
Systems and methods for providing adaptive time and frequency division multiplexing in coherent passive optical networks are provided. The systems include an OLT configured to transmit a downstream optical signal to a plurality of ONUs disposed remotely from the OLT. The downstream optical signal includes at least a first data subcarrier, a second data subcarrier, and a communication subcarrier each disposed in a frequency domain. The first data subcarrier has a first modulation format and a first baud rate within a first channel bandwidth and the second data subcarrier has a second modulation format and a second baud rate within a second channel bandwidth. The communication subcarrier includes at least one of OAM management data and information for control of a media access control (MAC) layer.
A multi-carrier transmission system configured to enable variable modulation order reception is contemplated. The system may be configured to facilitate delivery of high-speed data (HSD) over frequency division duplexing (FDD) and/or time division duplexing (TDD) infrastructures to a plurality of receiving devices. Signaling used to facilitate delivery of the HSD may be selectively and dynamically modulated according to performance capabilities of the receiving devices for a given transmission interval.
A method of processing a protocol data unit (PDU) set for a data network includes steps of (a) receiving a first PDU packet of the PDU set, (b) receiving, subsequent to reception of the first PDU packet, a second PDU packet of the PDU set, (c) determining, after receiving the first and second PDU packets, a congestion status of the data network for the PDU set, (d) controlling, based on the determined congestion status, a handling state of the second PDU packet to match a handling state of the first PDU packet, and (e) transmitting the first PDU packet and the controlled second PDU packet to a destination receiver of the data network.
A coherent optical injection locking (COIL) apparatus generates multiple optical source outputs from a single optical source generated by a parent laser. The COIL apparatus includes a plurality of optical source generators each having a child laser, of lesser performance than the parent laser, that is injection locked to the single optical source. The optical source generators may have one or both of a shared configuration and a cascaded configuration that replicates the single optical source, or a single wavelength of the single optical source when it is a comb source.
H04B 10/80 - Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups , e.g. optical power feeding or optical transmission through water
A profile optimizing method is provided for a downstream channel transmission of active subcarriers to user devices. The method includes steps of receiving channel measurement data from each user device for each subcarrier, calculating a maximum bit-loading value for each user device per subcarrier, grouping the user devices into a plurality of clusters based on a proximity of the maximum bit-loading values of a first user device to those of a second user device within the particular cluster, assigning each user device within the particular cluster to a single cluster profile. A plurality of single cluster profiles for the plurality of clusters forms a set of cluster profiles. The method further includes steps of determining a channel capacity ratio for the set of cluster profiles, and combining at least two single profiles of the set of cluster profiles into a coalesced profile pair.
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 41/0893 - Assignment of logical groups to network elements
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
42.
Systems and methods for channel occupancy time sharing and subchannel interlacing
A method is provided for initiating a sidelink operation between a first wireless device and a second wireless device in an unlicensed spectrum. The method includes steps of (a) receiving, at the first wireless device, first configuration parameters of a sidelink bandwidth part (BWP) for the sidelink operation, including a channel occupancy time (COT) signal for a COT sharing, (b) obtaining, after the step of receiving, second configuration parameters for a transmission sidelink resource pool, including at least one priority value for the COT sharing, (c) determining (i) a sidelink transmission of the sidelink operation from the first configuration parameters, and (ii) a priority level of the sidelink transmission from the second configuration parameters, (d) decoding a sidelink control information (SCI) to indicate an offset value and a COT duration for the COT sharing, and (e) transmitting the sidelink transmission and the SCI to the second wireless device.
Predictive management of a network buffer is contemplated. The network buffer maybe predictively managed to control packet drop based at least in part on predicted sojourn time. The predicted sojourn time may be determined to predict time needed from an arriving packet to travel through a queue of the network buffer.
H04L 47/32 - Flow controlCongestion control by discarding or delaying data units, e.g. packets or frames
G02B 6/293 - Optical coupling means having data bus means, i.e. plural waveguides interconnected and providing an inherently bidirectional system by mixing and splitting signals with wavelength selective means
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 1/1829 - Arrangements specially adapted for the receiver end
H04L 47/62 - Queue scheduling characterised by scheduling criteria
H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data
H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
H04N 21/647 - Control signaling between network components and server or clientsNetwork processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load or bridging between two different networks, e.g. between IP and wireless
A method for supporting a plurality of passwords in a communication network includes (a) receiving a client authentication message generated by a network client wishing to connect to the communication network, (b) computing a respective password authentication message for at least one password of a plurality of passwords stored in a password database to generate a set of one or more password authentication messages, each password of the plurality of passwords being a password for the communication network, (c) identifying a password authentication message of the set of one or more password authentication messages that matches the client authentication message, and (d) associating, with the network client, metadata corresponding to a password of the password database used to compute the password authentication message that matches the client authentication message.
Methods, systems, and apparatuses for subband full duplex (SBFD) operation within a time division duplex (TDD) carrier are provided. A base station determines a cell-specific SBFD configuration indicative of one or more SBFD subbands such that one or more SBFD symbols do not overlap with any legacy uplink (UL) symbols as indicated by a TDD downlink (DL)/UL configuration new radio (NR). The base station transmits the cell-specific SBFD configuration to an adjacent base station via Xn signaling for coordinated scheduling. The base station transmits the cell-specific SBFD configuration to a plurality of UEs. The base station schedules one or more SBFD-enabled UEs from the plurality of UEs within the one or more SBFD subbands and performs simultaneous uplink and downlink operations on the one or more SBFD subbands.
A security apparatus for a local network is in communication with an external electronic communication system and a first electronic device. The apparatus includes a memory device configured to store computer-executable instructions, and a processor in operable communication with the memory device. The processor is configured to implement the stored computer-executable instructions to cause the apparatus to determine a complexity score for the first electronic device, establish a behavioral pattern for the first electronic device operating within the local network, calculate a confidence metric for the first electronic device based on the determined complexity score and the established behavioral pattern, and control access of the first electronic device to the external electronic network according to the calculated confidence metric.
Methods and apparatus for session management for a DualSteer device are provided herein. In some implementations, a method may include receiving a session establishment request from a UE registered in a first PLMN and connected to a first 3GPP access network and a non-3GPP access network simultaneously. In addition, the method may include sending, from the first PLMN, a PDU session create request to a second PLMN. The method may include creating, at the second PLMN a MA PDU policy association establishment session in response to the PDU session create request, the MA PDU policy association establishment session based on configured rules for accessing two 3GPP access networks simultaneously. The method may include sending, from the second PLMN, a PDU session create response to the first PLMN. Also, the method may include sending, from the first PLMN to the UE, a PDU session request and a reconfiguration message.
A radio system includes a feed network, an edge wavelength switching system (EWSS), a photodetector, and a broadband lens-based antenna subsystem. The feed network aggregates a plurality of unmodulated optical carriers and modulated optical carriers for delivery to an optical link. The EWSS receives the plurality of unmodulated optical carriers and modulated optical carriers from the optical link, and selects a first unmodulated carrier and a first modulated carrier as a first selected optical carrier pair. The photodetector receives the first selected carrier pair from the EWSS and generates a first electrical signal from an optical beat of the first unmodulated carrier with the first modulated carrier. The broadband lens-based antenna subsystem receives the first electrical signal from the photodetector, propagates the received first electrical signal through a lens body, and outputs a first directional wireless beam signal containing signal data from the first modulated carrier.
A method for automatic redundant connections includes (1) receiving a first notification message indicating a problem with a primary wide area network (WAN) communication link serving a local area network and (2) in response to receiving the first notification message, establishing a first backup WAN communication link to serve the LAN, using a WAN communication link of a first user equipment device connected to the LAN. The WAN communication link of the first user equipment device is, for example, a wireless communication link.
A method is provided for initiating a handover of a wireless device from a first node to a second node in a communication network. The method includes steps of (a) obtaining, at a first time, a (i) speed, (ii) direction, and (iii) first location of the wireless device, (b) determining, relative to the first location, a first signal strength of the second node and a second, higher signal strength of a third node different from the second node, (c) estimating, based on the obtained (i) first location, (ii) speed, and (iii) direction, a second location for the wireless device at a second, subsequent time, (d) confirming that the second location is within a transmission range of the second node, and (e) preempting the handover to the third node by performing, prior to the second time, the handover directly from the first node to the second node.
A method operable by a first wireless communication device for protecting channel state information (CSI) includes (1) commencing an authentication process to authenticate a second wireless communication device, (2) inhibiting generation of CSI representing an RF channel between the first wireless communication device and the second wireless communication device, (3) after authentication of the second wireless communication device is complete, commencing an authorization process to authorize the second wireless communication device, and (4) after authorizing of the second wireless communication device is complete, enabling generation of CSI representing the RF channel between the first wireless communication device and the second wireless communication device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
52.
METHODS AND SYSTEMS FOR IDENTIFYING A FEATURE IN A COMMUNICATION NETWORK
A method for identifying a feature in a communication network includes (a) receiving, at a first termination device of the communication network, a message specifying an assignment of first network resources of the communication network to the first termination device, (b) sending, from the first termination device, one or more transmitted signals into infrastructure of the communication network at one or more times specified by the assignment of the first network resources, the one or more transmitted signals being within one or more frequency ranges specified by the assignment of the first network resources, and (c) capturing, at the first termination device, one or more reflection signals from the infrastructure of the communication network resulting from reflection of the one or more transmitted signals by one or more features of the infrastructure of the communication network.
Various systems, apparatuses, and methods for dynamically adapting one or more access traffic steering, switching, and splitting (ATSSS) policies based on a power headroom (PHR) of a user equipment (UE) are provided. A method performed by a base station is provided. The base station receives the PHR from the UE. The base station determines a power headroom of the UE based on the received PHR. When the determined power headroom falls below a threshold power headroom for a predefined duration, the base station determines that the UE enters a power-limited state. The base station transmits, to a core network (CN), a first indication that the UE is in the power-limited state. After transmitting the first indication, the base station receives a first set of updated ATSSS policies from the CN. The base station transmits the first set of updated ATSSS policies to the UE.
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
A method for variable time division duplex (TDD) data allocation in a communication network including a donor wireless communication node and a plurality of child wireless communication nodes. The method includes (a) determining a highest traffic child wireless communication node of the plurality of child wireless communication nodes, the highest traffic child wireless communication node having a highest data transmission requirement of the plurality of child wireless communication nodes, and (b) allocating data in first TDD data frames to be transmitted between the donor wireless communication node and a first child wireless communication node of the plurality of child wireless communication nodes according to a first data frame allocation, the first data frame allocation including allocating an on-demand portion of the first TDD data frames to data associated with the highest traffic child wireless communication node.
A method for multiple repeater aggregation includes (a) receiving, at a first node of a wireless communication network, wireless communication signals from a second node of the wireless communication network via a plurality of wireless communication paths, where each of the wireless communication paths includes a respective radio frequency (RF) repeater, and (b) selecting one of the plurality of wireless communication paths for use in transferring data between the first node of the wireless communication network and the second node of the wireless communication network, at least partially based on measured conditions of the plurality of wireless communication paths.
A method of processing a protocol data unit (PDU) set for a data network includes steps of (a) receiving a first PDU packet of the PDU set, (b) receiving, subsequent to reception of the first PDU packet, a second PDU packet of the PDU set, (c) determining, after receiving the first and second PDU packets, a congestion status of the data network for the PDU set, (d) controlling, based on the determined congestion status, a handling state of the second PDU packet to match a handling state of the first PDU packet, and (e) transmitting the first PDU packet and the controlled second PDU packet to a destination receiver of the data network.
A client-side electronic device includes a receiver, a processor, and a memory. The receiver communicates with a message server over a communication medium of a communication network. The memory stores computer-executable instructions, which, when executed by the processor, cause the device to receive, from the message server, a broadcast message, a timestamp associated with the broadcast message, and a first digital signature of the broadcast message and a second digital signature of the timestamp. The executed instruction further cause the device to verify an integrity of the broadcast message based the first or second digital signatures, determine a freshness of the broadcast message based on the received timestamp, calculate a trust state of the broadcast message based on the integrity verification and the freshness determination, and store the broadcast message in the memory along with the calculated trust state.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.
An optical emission array includes an optical input portion configured to provide a parent laser source for the optical emission array, and an optical output portion including a plurality of child laser emitters. Each child laser emitter of the plurality of child laser emitters is injection-locked to the parent laser source. The optical emission array further includes at least two optical distribution branches (i) disposed between the optical input portion and the optical output portion, and (ii) optically connecting at least two child laser emitters of the plurality of child laser emitters, respectively, to the parent laser source.
A method for maintaining data session continuity includes (1) receiving, at a controller, information on a first data session for a user equipment (UE) device, the first data session being supported by a first communication network, and the UE device being authenticated with each of the first communication network and a second communication network; (2) determining, at the controller, that the first data session should be switched from the first communication network to the second communication network; and (3) in response to determining that the first data session should be switched from the first communication network to the second communication network, sending a request to the UE device to switch the first data session to the second communication network.
Methods and apparatus for session management for a DualSteer device are provided herein. A user equipment (UE) transmits first information indicating that the UE requests access to two Third Generation Partnership Project (3GPP) access networks simultaneously and that the UE supports access to two 3GPP access networks simultaneously. Further, the UE receives second information indicating rules for accessing the two 3GPP access networks simultaneously. Moreover, the UE transmits data using a multi-access (MA) protocol data unit (PDU) session based on the rules for accessing the two 3GPP access networks simultaneously, where the MA PDU session is established on a first 3GPP access network and a second 3GPP access network. Additionally or alternatively, the first information is included in a PDU session establishment request message. Additionally or alternatively, the second information is included in a PDU session establishment accept message. Additionally or alternatively, the UE is a DualSteer UE.
Various systems, apparatuses, and methods for identifying one or more non-third generation partnership project (non-3GPP) devices and for providing differentiated quality of service (QoS) for the one or more non-3GPP devices are provided. A residential gateway (RG) may be connected to the one or more non-3GPP devices. The RG may receive a request for differentiated QoS for a non-3GPP device of the one or more non-3GPP devices. The RG may bind, based on the request for the differentiated QoS, a non-3GPP device identifier to the non-3GPP device. The RG may transmit, to a core network, at least one of: a protocol data unit (PDU) session modification request or a PDU session establishment request. The RG maps a traffic stream associated with the first non-3GPP device to a PDU session and a QoS flow identifier (QFI) indicative of differentiated QoS.
A redundancy link includes a first optical splitter and a second optical splitter. The first optical splitter includes (i) a first hub-side port that optically couples to a first optical line terminal, a first hub-side failover-mode port, (iii) a first plurality of node-side splitter-ports each optically coupled to the first hub-side port and the first hub-side failover-mode port, (iii) a first failover-mode port coupled to the first hub-side port. The second optical splitter includes (i) a second hub-side port that optically couples to a second optical line terminal, a second hub-side failover-mode port optically coupled to the first failover-mode port, (iii) a second plurality of node-side splitter-ports each optically coupled to the second hub-side port and the second hub-side failover-mode port, (iii) a second failover-mode port coupled to the second hub-side port.
A method for reducing communication network performance degradation using in-band telemetry data includes (a) adding in-band telemetry data to one or more data structures flowing through a network element of a communication network, (b) updating a telemetry table according to first telemetry data that is based on the in-band telemetry data, (c) selecting one of a plurality of paths in the communication network at least partially based on data in the telemetry table, and (d) causing a data structure to be routed through the selected one of the plurality of paths in the communication network.
A network server is provided. The network server includes at least one processor in communication with at least one memory device. The network server is programmed to receive an access request originating from a user device, perform an authentication process for connecting with the user device, transmit, to the user device, a request message for a media access control (MAC) address of the user device, receive, from the user device, a response message including the MAC address of the user device, and determine whether to grant the access request based on the MAC address of the user device.
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
A method of converged IP address allocation between a plurality of networks using different radio access technologies (RATs) and a common IP address pool includes receiving a request for an IP address from a mobile device that has authenticated with any network of the plurality of networks, the dynamic IP address for use during an IP session, forwarding the request for a dynamic IP address to a DHCP/DN-AAA server, receiving an allocated dynamic IP address from the DHCP/DN-AAA server, updating subscriber data for the mobile device with the allocated dynamic IP address, and using the allocated dynamic IP address when the mobile device authenticates to a different network of the plurality of networks before releasing the IP session.
An optical emission array includes an optical input portion configured to provide a parent laser source for the optical emission array, and an optical output portion including a plurality of child laser emitters. Each child laser emitter of the plurality of child laser emitters is injection-locked to the parent laser source. The optical emission array further includes at least two optical distribution branches (i) disposed between the optical input portion and the optical output portion, and (ii) optically connecting at least two child laser emitters of the plurality of child laser emitters, respectively, to the parent laser source.
A method of processing a protocol data unit (PDU) set for a data network includes steps of (a) receiving a first PDU packet of the PDU set, (b) receiving, subsequent to reception of the first PDU packet, a second PDU packet of the PDU set, (c) determining, after receiving the first and second PDU packets, a congestion status of the data network for the PDU set, (d) controlling, based on the determined congestion status, a handling state of the second PDU packet to match a handling state of the first PDU packet, and (e) transmitting the first PDU packet and the controlled second PDU packet to a destination receiver of the data network.
An optical full-field transmitter (OFFT) includes a plurality of optical circulators and a polarization beam combiner. The plurality of optical circulators are fabricated on a silicon-on-insulator (SOI) substrate, where each of the optical circulators has (a) a first port that optically couples to a high-quality optical source, (b) a second port that optically couples to a child laser configured to receive amplitude modulation data, and (c) a third port optically coupled to a phase modulator that (i) is configured to receive a phase modulation data and (ii) includes an output port that outputs amplitude and phase modulated light. The polarization beam combiner receives the amplitude and phase modulated light from each of the optical circulators and outputs combined amplitude and phase modulated light.
Systems and methods disclosed herein provide an inter-node interface for communication between client nodes, such as modems, in a local communication network (LCN), where local data does not pass through a network hub or mobile core. To improve signal strength, SINR and handoff speeds in the LCN, the disclosed systems and methods also enable a client node within the LCN to self-direct simultaneous transmission of a common data packet by a plurality of client nodes, without employing components of the Xhaul transport system for coordination.
A profile optimizing method is provided for a downstream channel transmission of active subcarriers to user devices. The method includes steps of receiving channel measurement data from each user device for each subcarrier, calculating a maximum bit-loading value for each user device per subcarrier, grouping the user devices into a plurality of clusters based on a proximity of the maximum bit-loading values of a first user device to those of a second user device within the particular cluster, assigning each user device within the particular cluster to a single cluster profile. A plurality of single cluster profiles for the plurality of clusters forms a set of cluster profiles. The method further includes steps of determining a channel capacity ratio for the set of cluster profiles, and combining at least two single profiles of the set of cluster profiles into a coalesced profile pair.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
72.
Communication network gateways and associated methods
A method operable by a communication network gateway for providing communication services includes (a) supporting respective communication links with a plurality of communication service providers, (b) supporting a plurality of virtual local area networks (VLANs), (c) associating each virtual local area network (VLAN) with a respective communication service provider of the plurality of communication service providers, and (d) routing data between each VLAN and the respective communication link of the respective communication service provider associated with the VLAN.
A communication network includes a coherent optics transmitter, a coherent optics receiver, an optical transport medium operably coupling the coherent optics transmitter to the coherent optics receiver, and a coherent optics interface. The coherent optics interface includes a lineside interface portion, a clientside interface portion, and a control interface portion.
Various methods and systems of the present disclosure provide a protocol data unit (PDU) set based quality of service (QoS) handling in a wireline access. To support the PDU Set based QoS handling in the wireline access, one or more PDU Set QoS parameters and/or PDU Set information may be provided to one or more wireline nodes (e.g., a wireline gateway access function (W-AGF) and/or a residential gateway (RG) etc.). When the W-AGF receives one or more N2 requests associated with one or more PDU session resources, the W-AGF maps one or more QoS profiles received from 5G core (5GC) to a wireline access user plane (W-UP) QoS level. The W-AGF sets up one or more W-UP resources based on the W-UP QoS level for a PDU session. Further, various methods and systems of the present disclosure also provide low latency, low loss, and scalable throughput (L4S) enabled wireline access.
A method for synchronizing a data frame and data symbols in a communication system includes generating a training sequence including a serial sequence of data symbols that are conjugate symmetric, inserting the training sequence in a transmitter-side data frame, converting constituent data symbols of the transmitter-side data frame to communication signals, transmitting the communication signals from a transmitter to a receiver, converting the communication signals to a stream of received data symbols, detecting presence of the training sequence in the stream of received data symbols, and identifying a position of a received data frame from the presence of the training sequence.
A system for micro-segmented networking is provided. A system controller is programmed to a) store a plurality of micro-segmented network accounts and a plurality of subscriber accounts, b) receive a request from a user device to activate a first micro-segmented network associated with a first subscriber account, c) authenticate the first subscriber account based on the subscriber information, d) activate the first micro-segmented network, including a plurality of device slots for a plurality of devices, e) transmit, to the user device, first device slot authentication information for a first device slot of the plurality of device slots; f) receive, from a first device connecting to the wireless network, the first device slot authentication information; g) authenticate the first device slot authentication information; and h) in response to authenticating the first device slot authentication information, connect the first device to the first micro-segmented network.
A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.
H04L 41/12 - Discovery or management of network topologies
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04W 12/043 - Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
H04W 12/069 - Authentication using certificates or pre-shared keys
H04W 12/086 - Access security using security domains
A radio system includes a feed network, an edge wavelength switching system (EWSS), a photodetector, and a broadband lens-based antenna subsystem. The feed network aggregates a plurality of unmodulated optical carriers and modulated optical carriers for delivery to an optical link. The EWSS receives the plurality of unmodulated optical carriers and modulated optical carriers from the optical link, and selects a first unmodulated carrier and a first modulated carrier as a first selected optical carrier pair. The photodetector receives the first selected carrier pair from the EWSS, and generates a first electrical signal from an optical beat of the first unmodulated carrier with the first modulated carrier. The broadband lens-based antenna subsystem receives the first electrical signal from the photodetector, propagates the received first electrical signal through a lens body, and outputs a first directional wireless beam signal containing signal data from the first modulated carrier.
A mesh network may be established between a plurality of access points to facilitate load balancing for one or more of the access points. The mesh network may define a plurality of communication routes through the access points having capabilities sufficient to facilitate or mimic communications underperforming or being unavailable at the access point requesting load balancing.
G06N 10/00 - Quantum computing, i.e. information processing based on quantum-mechanical phenomena
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
81.
MULTI-ACCESS GATEWAY WITH INTELLIGENT CONVERGENCE (MAGIC)
Multi-access gateways with intelligent convergence (MAGIC gateways) for use on client premises intelligently distribute user equipment network traffic to/from a plurality of Internet service providers (ISPs), without any change on the ISP network side. Use of a MAGIC gateway improves network reliability by providing redundancy and distributing traffic to those ISPs that provide the best service parameters for the type of traffic being transmitted.
A system for managing a core network is provided. The system includes a first computing device including at least one processor in communication with at least one memory device. The first computing device is in communication with a core network. The at least one memory device stores a plurality of instructions, which when executed by the at least one processor cause the at least one processor to store a plurality of historical data associated with the core network, receive current state data from the core network, compare the plurality of historical data with the current state data to determine at least one future state of the core network, and adjust the operation of the core network based on the at least one future state.
H04L 45/00 - Routing or path finding of packets in data switching networks
H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/149 - Network analysis or design for prediction of maintenance
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
A client-side electronic device includes a receiver, a processor, and a memory. The receiver communicates with a message server over a communication medium of a communication network. The memory stores computer-executable instructions, which, when executed by the processor, cause the device to receive, from the message server, a broadcast message, a timestamp associated with the broadcast message, and a first digital signature of the broadcast message and a second digital signature of the timestamp. The executed instruction further cause the device to verify an integrity of the broadcast message based the first or second digital signatures, determine a freshness of the broadcast message based on the received timestamp, calculate a trust state of the broadcast message based on the integrity verification and the freshness determination, and store the broadcast message in the memory along with the calculated trust state.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
84.
HYBRID TELECOMMUNICATION AND SENSING SYSTEMS AND METHODS
A fiber-optic network that uses as a hybrid telecommunication and sensing system when telecommunication signals and probe signals are transmitted across a shared fiber strand in either a co-propagated or counter-propagated direction is disclosed. Probe signals generated by a sensing termination system and/or by one or more end devices are used to analyze conditions affecting network hardware and/or events occurring within the fiber distribution area.
H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
85.
Systems and methods for protecting cellular network messages
A client-side electronic device includes a receiver, a processor, and a memory. The receiver communicates with a message server over a communication medium of a communication network. The memory stores computer-executable instructions, which, when executed by the processor, cause the device to receive, from the message server, a broadcast message, a timestamp associated with the broadcast message, and a first digital signature of the broadcast message and a second digital signature of the timestamp. The executed instruction further cause the device to verify an integrity of the broadcast message based the first or second digital signatures, determine a freshness of the broadcast message based on the received timestamp, calculate a trust state of the broadcast message based on the integrity verification and the freshness determination, and store the broadcast message in the memory along with the calculated trust state.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Edge analytics and other processes for assessing performance of network elements operating at an edge or other remote access point of a service provider network is contemplated. The edge analytics may be facilitated with edge devices connected, embedded or otherwise associated with the network elements collecting data, metrics or other information reflective of the performance thereof.
A method is provided for displaying an immersive video content according to eye movement of a viewer includes the steps of detecting, using an eye tracking device, a field of view of at least one eye of the viewer, transmitting eye tracking coordinates from the detected field of view to an eye tracking processor, identifying a region on a video display corresponding to the transmitted eye tracking processor, adapting the immersive video content from a video storage device at a first resolution for a first portion of the immersive video content and a second resolution for a second portion of the immersive video content, the first resolution being higher than the second resolution, displaying the first portion of the immersive video content on the video display within a zone, and displaying the second portion of the immersive video content on the video display outside of the zone.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
G06V 40/18 - Eye characteristics, e.g. of the iris
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/647 - Control signaling between network components and server or clientsNetwork processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load or bridging between two different networks, e.g. between IP and wireless
An optical emission array includes an optical input portion configured to provide a parent laser source for the optical emission array, and an optical output portion including a plurality of child laser emitters. Each child laser emitter of the plurality of child laser emitters is injection-locked to the parent laser source. The optical emission array further includes at least two optical distribution branches (i) disposed between the optical input portion and the optical output portion, and (ii) optically connecting at least two child laser emitters of the plurality of child laser emitters, respectively, to the parent laser source.
A system for dynamic trust-based network architectures is provided. The system includes a computer device programmed to: a) store plurality of records for a plurality of network elements, wherein each record of the plurality of records includes a current status of the corresponding network element of the plurality of network elements; b) receive a request for a set of network elements for data transmission; c) scan the plurality of records for a plurality of available network elements for the request; d) select a first set of network elements to meet the request from the plurality of network elements based upon the current status of each of the plurality of available network elements; e) generate a response to the request based upon the first set of network elements; f) receive a confirmation of the response; and g) configure the first set of network elements to complete the data transmission.
A system for ongoing multifactor authentication is provided. The system includes a computer device including at least one processor in communication with at least one memory device. The at least one memory device includes computer instructions that cause the at least one processor to a) instruct a computer device to conduct a multifactor authentication of a user; calculate an authentication level for the user based upon the multifactor authentication of the user; b) continually monitor one or more actions of the user to determine additional authentication data; c) update the authentication level for the user based upon the additional authentication data; d) receive a request from the user to access a first content; e) access an authentication profile for the first content; f) compare the authentication profile to the updated authentication level for the user; and g) determine whether to grant access to the first content based upon the comparison.
A server device is provided for authenticating client devices on a communication network. The server device includes a transceiver configured for operable communication with at least one client of the communication network, and a processor including a memory configured to store computer-executable instructions. When executed by the processor, the instructions cause the server device to receive an authentication request from a client device, generate a seed for a first key for the client device if the client device authenticates, transmit the seed for the first key to the client device, receive a hash of the first key from the client device, and validate the first key based on the hash of the first key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A wireless communication network includes a plurality of first electronic devices configured for wireless communication, at least one second electronic device configured for wireless communication, and at least one access point configured to wirelessly receive client data from, and transmit network data to, the plurality of first electronic devices and the at least one second electronic device. The wireless communication network further includes a virtual private wireless communication sub-network that includes the plurality of first electronic devices and excludes the at least one second electronic device. The virtual private wireless communication sub-network is configured to enable each of the plurality of first electronic devices to automatically connect with the wireless communication network.
An optical network communication system utilizes a CPON. The system includes an OLT and an ONU. The OLT includes an OLT transmitter for transmitting a downstream signal, and an OLT receiver for detecting an upstream signal. The downstream signal includes a first tone centered at a first frequency, a second tone centered at a second frequency, and first and second downstream subcarriers distributed proximate the first frequency. The upstream optical signal includes first and second upstream subcarriers distributed proximate the second frequency. The ONU includes an ONU receiver for detecting the first and second downstream subcarriers using the first optical tone to generate an LO signal for coherent detection, and an ONU transmitter configured to generate the first and second upstream subcarriers using the second optical tone. The first and second tones, downstream subcarriers, and upstream subcarriers do not overlap in the frequency domain
A first coherent transceiver for a CPON includes a MAC layer for enabling dual-mode operation of the first coherent transceiver, a software management and control module for communicating with a second transceiver over an ODN communication channel, a coherent DSP in communication with the software management and control module and configured to process a digital signal from the MAC layer, and an optics infrastructure configured to transmit and receive analog data signals over the ODN to and from the second transceiver, respectively. The analog data signals include a communication subcarrier and a data subcarrier. The digital data signal includes a first data portion with control information from the communication subcarrier, and a second data portion with primary information from the data subcarrier. The coherent DSP further dynamically reconfigures digital data signal processing between first and second operational modes based on a transport type of the data channel subcarrier.
A CPON includes an OLT for transmitting a downstream signal to a plurality of remote ONUs. The downstream signal includes a first data subcarrier and a second subcarrier adjacent the first subcarrier, and a first communication subcarrier between the first and second subcarriers. The CPON further includes a first ONU having a first ONU receiver for receiving the first data subcarrier from the downstream optical signal within a first channel bandwidth, and a first ONU transmitter for transmitting a first upstream signal to the OLT within the first channel bandwidth. The CPON further includes a second ONU having a second ONU receiver for receiving the second data subcarrier from the downstream optical signal within a second channel bandwidth, and a second ONU transmitter for transmitting a second upstream signal to the OLT within the second channel bandwidth. The first communication subcarrier includes OAM management data and/or MAC layer control information.
A passive optical tap includes a first wavelength division multiplexer (WDM), a second WDM, a first optical splitter, and a second optical splitter. The first wavelength division multiplexer (WDM) has a first plurality of single-channel ports. The second WDM has a second plurality of single-channel ports. The first optical splitter has a first combined-power port optically coupled to a first one of the first plurality of single-channel ports and a first split-power port optically coupled to a first one of the second plurality of single-channel ports. The second optical splitter has a second combined-power port optically coupled to a second one of the second plurality of single-channel ports and a second split-power port optically coupled to a second one of the first plurality of single-channel ports.
Systems and methods for securing network communications between a first device and a second device over a service-based architecture, include receiving, at the first device, an access request including: a request to use a service of the service-based architecture, an authentication public key certificate associated with the second device or a proxy device therefore, a unique identifier of the second device, and a digital signature using the private key associated with the authentication public key certificate. The first device may verify the authentication public key certificate and generate an encrypted access response including an access token that allows access to the service, which is then transmitted back to the second device for further use in accessing the service-based architecture.
A server device is provided for protecting personal information. The server device includes a transceiver configured for operable communication with at least one client over a communication network, and a processor including a memory configured to store computer-executable instructions. When executed by the processor, the instructions cause the server device to store a database including one or more fields of personally identifiable information (PII), generate a query for the database to request access a first field of the one or more fields of PII, wherein the query includes a use for the requested field of PII, query the database to determine if the use for the requested field of PII is valid, and when the use for the request field of PII is valid, provide access to the requested field of PII data.
Network communication systems and methods implementing micro network subsystems for securely delivering personal electronic information across wired and/or wireless media are disclosed. Software-defined networking (SDN) is used to segment a provider network into a plurality of personal micro networks each established for an object that is cryptographically bound to or cryptographically associated with a living being. When multiple providers implementing different workflows and binding different objects to the same person are connected to the communication system, an interoperable network database stores the information and compiles, searches, and distributes the information to/from multiple providers.
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 10/65 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records stored on portable record carriers, e.g. on smartcards, RFID tags or CD
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
The present disclosure generally relates to apparatus, software and methods for detecting anomalous elements in data. For example, the data can be any time series, such as but not limited to radio frequency data, temperature data, stock data, or production data. Each type of data may be susceptible to repeating phenomena that produce recognizable features of anomalous elements. In some embodiments, the features can be characterized as known patterns and used to train a machine learning model via supervised learning to recognize those features in a new data series.