Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a query for 5G Session Management Functions (SMFs) to handle a connection request, wherein the query includes a slice ID and data network name; determining a list of SMFs that each have a blockchain ID immutably recorded on a blockchain, wherein the blockchain ID is authorized to provide service to the slice ID; and sending, responsive to the query, the list of SMFs. Other embodiments are disclosed.
The concepts and technologies disclosed herein are directed to alarm correlation and ticketing for reconfigurable optical add/drop multiplexer (“ROADM”) networks. According to one aspect disclosed herein, a ROADM controller can create, based upon data associated with a plurality of ROADM network elements operating in a ROADM network, a graph of the plurality ROADM network elements. The ROADM controller can retrieve a plurality of alarms from at least a portion the plurality of ROADM network elements, associate the plurality of alarms with at least the portion of the plurality of ROADM network elements, and associate a direction of each alarm with a corresponding service direction. The ROADM controller can eliminate any alarms with a time stamp outside of a same time window. The ROADM controller can then determine that any remaining alarms are associated with a root cause of a failure within the ROADM network.
The described technology is generally directed towards network slicing for private cellular networks (PCNs). Network slicing can be leveraged as described herein to meet security requirements and/or other policies applicable to PCNs. Network slices implemented according to this disclosure can comprise a private network slice, a public network slice, and a public safety network slice. User equipment can be provisioned with slice identifiers for the network slices, and applications at the user equipment can specify an appropriate slice identifier for their network communications. Network equipment can be configured to route application traffic to a specified slice and to allocate network resources according to the specified slice, as well as to implement security and other policies according to the specified slice.
AT&T Communications Services India Private Limited (India)
Inventor
Pandey, Mritunjay
Kapoor, Subhash
Rivera, Lynn
Paira, Saurav
Abstract
Aspects of the subject disclosure may include, for example, identifying network elements of a wavelength division multiplexing (WDM) domain of an optical waveguide communication system that includes a group of optical-add-drop multiplexor (OADM) devices. Operations are observed for the WDM domain configured to deliver communication services configured for simultaneously transporting independent signals across a network of single optical waveguides. A demand for optical waveguide communication services is determined and the WDM network is configured according to the optical fiber communication link requirement and according to the observations. The configured WDM network includes at least one OADM device of the group of OADM devices configured to provide a WDM cross-frequency network path of the configured WDM network. Other embodiments are disclosed.
A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.
Estimation of network latency based on aggregated performance data is disclosed. End-to-end latency between endpoints can comprise protocol-induced latency, access network-induced, core-network latency, and network-distance-based latency. Network latency, e.g., network-distance-based latency, also referred to as topological latency, can correspond to communication path length between endpoints. Crowdsourcing of communication path performance information can enable estimation of topological latency, and derivatives thereof, such as topological distance. Crowdsourcing can be the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, e.g., collection of performance information. The disclosure illustrates estimation of protocol-induced latency, access network-induced, and core-network latency, such that they can be compensated for in end-to-end latency information, thereby enabling estimation of topological latency that can be employed in determining, initiating, etc., a network response operation that can affect change in a network.
H04L 43/067 - Generation of reports using time frame reporting
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Aspects of the subject disclosure may include, for example, receiving information defining a high-capacity event in a mobility network, receiving information defining a network location of the high-capacity event in the mobility network, automatically configuring one or more network components of the mobility network according to a set of high-capacity parameters, the one or more network components associated with the network location of the high-capacity event, limiting access to the mobile network to specific users according to the high-capacity parameters, and after the high-capacity event, automatically configuring the one or more network components of the mobile network according to a set of reversion parameters. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes collecting a set of data from a plurality of sensors that is monitoring a system, wherein the plurality of sensors includes sensors of a plurality of different modalities, detecting an instance of out-of-distribution data in the set of data by providing the set of data as an input to a machine learning model that generates as an output an indicator that the instance of out-of-distribution data is out-of-distribution with respect to the set of data, identifying a root cause for the instance of out-of-distribution data, and initiating an action to remediate the root cause of the instance of out-of-distribution data.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
9.
MAC ADDRESSES CAPTURING VIRTUAL-TO-PHYSICAL ASSOCIATIONS WITHIN VIRTUAL ENVIRONMENTS
Aspects of the subject disclosure may include, for example, identifying a request to initiate a virtual machine including a virtual network interface on a physical host processing system that includes a physical network interface. A location reference to a physical location of the physical network interface is determined and an adapted media access control (MAC) address is adapted to incorporate the location reference according to an association between the virtual network interface and the physical network interface. The adapted MAC address is further associated with the virtual network interface of the virtual machine, such that the physical location of the physical network interface is identifiable from within an environment of the virtual machine via the adapted MAC address. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, co-locating network functions in virtual machines and/or containers in public clouds. A session border controller (SBC) may be combined with one or more voice and/or message services network functions. A virtual image or container runtime including co-located network functions may be provided to a public cloud service provider, and virtual machines or containers having co-located network functions may be instantiated as needed. Other embodiments are disclosed.
A processing system of an autonomous aerial vehicle including at least one processor may determine informational data to present for at least one person, capture at least a first image via at least one imaging sensor of the autonomous aerial vehicle in a vicinity of the at least one person and determine a first position and a first orientation of the at least one person. The processing system may then identify, based upon the first position and the first orientation of the at least one person, a plurality of candidate projection areas, each candidate projection area comprising a contiguous area within the at least the first image that is deemed to be visible to the at least one person, select one of the plurality of candidate projection areas as a projection zone, and project the informational data on the projection zone via a projector.
The disclosed technology is directed towards routing, by a mobile network operator, a message to a messaging hub associated with a partner carrier or to the partner carrier itself. In response to receiving a message to reroute, a data store (e.g., an ENUM database) is queried to attempt to obtain information corresponding to the routing. For example, when the query response includes a regular expression that specifies a domain, the domain is evaluated against a data structure of respective messaging hubs associated with respective domains. If the returned domain is matched such that an associated messaging hub is identified, the message is routed to the identified messaging hub; otherwise a mobile network partner carrier is determined based on the telephone number of the message recipient, and the message is routed to the determined partner carrier.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.
Aspects of the subject disclosure may include, for example, receiving a handover request from a user equipment (UE) device in a mobility network, wherein the handover request identifies a target cell for handing over radio communication with the UE device from a source cell, wherein the identifying is based on the handover request, determining a usage level of the UE device, wherein the usage level comprises one of performance-sensitive traffic and performance-tolerant traffic, selecting an alternative target cell for the handover request, wherein the selecting is responsive to determining a performance-sensitive traffic usage level of the UE device, and initiating a handover operation between the source cell and the alternative target cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include receiving a first data set related to a first International Mobile Subscriber Identifier (IMSI) from a wireless core system, tidying the first data set by building a bandwidth matrix representing each bandwidth usage value with respect to a selected time-stamp and one or more flow IDs associated with the first IMSI, repeating the receiving and tidying operations with respect to a plurality of data sets related to remaining IMSIs, and generating data visualization displaying the bandwidth usage value of the first IMSI and the remaining IMSIs. The first IMSI and the remaining IMSIs are associated with a selected network slice ID. Other embodiments are disclosed.
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
17.
METHODS, SYSTEMS, AND DEVICES FOR RECOMMENDING MITIGATION OF INTERNET OF THINGS (IOT) CYBER THREATS USING GENERATIVE ARTIFICIAL INTELLIGENCE
Aspects of the subject disclosure may include, for example, obtaining a group of threat research reports, obtaining a group of indicators of compromise (IOCs), and monitoring a network of Internet of Things (IoT) devices. Further embodiments can include determining a group of possible malware on the network based on the monitoring of the network, and generating a network security recommendation based on the group of threat research reports based on the group of threat research reports, the group of IOCs, and the group of possible malware. Other embodiments are disclosed.
A processing system including at least one processor may apply an input vector to a location-based services recommendation module implemented by the processing system, where the location-based services recommendation module includes at least one location-based service prediction model, and where the input vector includes first characteristics associated with a first cell site of a cellular network. The processing system may obtain an output of the location-based services recommendation module in response to the applying of the input vector, the output including a first plurality of values for a plurality of configurable settings of at least a first network element associated with the first cell site. The processing system may then configure the at least the first network element associated with the first cell site to apply at least one of the first plurality of values for at least one of the plurality of configurable settings.
A method performed by a processing system including at least one processor includes detecting a presence of a plurality of user devices in a cell of a mobile network that deploys a carrier that supports beamforming, disabling, in response to the detecting the presence of the plurality of user devices, carrier aggregation in the cell for a first subset of the plurality of user devices that supports multi-user multiple input, multiple output communications, and activating, after disabling the carrier aggregation, multi user multiple input, multiple output communications for the first subset of the plurality of user devices.
Aspects of the subject disclosure may include, for example, a method that includes receiving, by a processing system, an uplink signal at a radio unit (RU) communicating over a fronthaul interface with a distributed unit (DU) of a communication network; receiving a demodulated reference signal (DMRS) configuration at the RU; performing a beamforming procedure at the RU for one or more beams generated at the RU; and determining, in accordance with an option selected by the DU, whether to perform an equalization procedure for the uplink signal at the RU resulting in equalized user data. In accordance with the equalization procedure being performed at the RU, equalization for the uplink signal is not performed at the DU. Other embodiments are disclosed.
AT&T Global Network Services Czech Republic s.r.o. (Czech Republic)
AT&T Mobility II LLC (USA)
Inventor
Hao, Shuai
Andrei, Alexandru Cristian
Perez, Hector
Coates, Jr., Donald
Ge, Zihui
Hicks, Alvin
Tipton, Jason
Abstract
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Aspects of the subject disclosure may include, for example, a system, comprising: a message-sending device comprising a first processing system including a first processor, wherein the message-sending device further comprises a first wireless communication mechanism, wherein the first processing system is configured to receive an input command, wherein the input command is provided by a person who is coaching a player, wherein the person who is coaching the player is located on a sideline of a field, and wherein the player is on the field; and a helmet worn by the player, wherein the helmet comprises a second processing system including a second processor, wherein the helmet further comprises a second wireless communication mechanism, and wherein the helmet further comprises a display mechanism positioned in a line of sight of at least one eye of the player; wherein the first processing system determines whether a play clock associated with a current play has been running for a threshold amount of time, resulting in a determination; wherein, responsive to the determination being that the play clock associated with the current play has not been running for the threshold amount of time, the first processing system transmits via the first wireless communication mechanism to the helmet a message that is based upon the input; wherein the second processing system receives, via the second wireless communication mechanism of the helmet, the message; and wherein, responsive to receipt of the message, the second processing system causes the display mechanism to display the message. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a natural language statement of an optimization problem that is to be solved, analyzing the natural language statement to select a template included within a plurality of templates, generating a definition for the optimization problem using the template, constructing a model in accordance with the definition, resulting in a constructed model, and validating the constructed model, resulting in a validated model. Other embodiments are disclosed.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
G06F 40/40 - Processing or translation of natural language
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
24.
ACCESS TO CLOUD-DISTRIBUTED APPLICATIONS VIA ACCESS CREDENTIAL LOCKER SERVICE
A processing system may obtain a request from a user device to activate an access credential locker for use in accessing at least one enterprise system of an enterprise via the processing system, the request comprising a token that identifies the access credential locker, obtain a first key from the user device, transmit, to the enterprise, a request for a second key, obtain the second key from the enterprise in response to the request, apply the first key and the second key to the access credential locker, the access credential locker being encrypted in accordance with the first and second keys and being decrypted via the applying of the first and second keys, and establish a communication session between the user device and the at least one enterprise system via the processing system using at least one access credential that is stored in the decrypted access credential locker.
G06F 21/45 - Structures or tools for the administration of authentication
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a first performance characteristic of first base station equipment, wherein the first base station equipment is actively communicating with a user equipment via a first network connection. The method can further include, based on the first performance characteristic being in a condition in relation to a first threshold, determining, by the system, to execute a handover of the user equipment to a second network connection with second base station equipment, resulting in a handover determination. Further, the method can include, based on the handover determination, facilitating, by the system, executing the handover of the user equipment to the second network connection.
Aspects of the subject disclosure may include, for example, a device that facilitates obtaining a plurality of prompts from a selected subject matter domain of a database configured to measure an effectiveness of a generative large language model (LLM) to distinguish variances between each prompt of the plurality of prompts; supplying the plurality of prompts to the LLM; receiving respective responses to each of the prompts from the LLM; transforming each of the prompts and respective responses to each of the prompts into an embedding space; determining, by applying domain-based metrics to the embedding space, a quality measurement of each respective response to produce a plurality of quality measurements; and generating, according to the plurality of quality measurements, a performance of the LLM. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining, for a network node, one or more neighbor network nodes relative to the network node; determining, for each of the one or more neighbor network nodes, whether support is provided for a particular type of end-user device; and generating, for the network node, a neighbor cell relation table, wherein the neighbor cell relation table includes the one or more neighbor network nodes, and wherein the neighbor cell relation table further includes for at least one of the neighbor network nodes an indication that support is provided for the particular type of end-user device. Other embodiments are disclosed.
A method includes monitoring a condition of a mobile device while the mobile device is connected to a terrestrial network, determining that the condition satisfies a trigger for switching to a non-terrestrial network, and sending, in response to the determining, a first instruction to the mobile device, where the first instruction causes the mobile device to disconnect from the terrestrial network and to connect to a non-terrestrial network.
Aspects of the subject disclosure may include, for example, a device, having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: collecting data traffic of one or more network devices of a user, wherein the data traffic is associated with multiple channels of interactions; building a channel-specific user signature and a cross-channel user signature of normal usage for the user based on the data traffic collected; detecting a change in a characteristic of the data traffic, wherein the change indicates fraudulent activity based on the channel-specific user signature and the cross-channel user signature; and issuing an alert of the fraudulent activity based on the change. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving a series of values from a data stream generated by one or more equipment in a communications network; creating a first window of values received before a first point in time and a second window of values received on or after the first point in time; comparing a distribution of values in the first window and values in the second window to compute a distance at the first point in time; repeating the creating and comparing at subsequent points in time after the first point in time, thereby generating a series of distances; computing a z-score for a first distance in the series of distances; generating an alert responsive to the z-score exceeding a threshold; and storing the alert in a log of alerts. Other embodiments are disclosed.
The disclosed technology is directed towards preventing a handover of a Wi-Fi call to a Fifth Generation (5G) standalone cellular network. In one alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device. In another alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device and the mobile device is connected to a Wi-Fi network, which facilitates camping on a 5G standalone network when the mobile device is not connected to a Wi-Fi network. In yet another alternative, a 5G standalone usage setting is disabled on a mobile device when an evolved packet data gateway (ePDG) tunnel is set up on the mobile device, which similarly facilitates camping on a 5G standalone network when the ePDG tunnel is torn down.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first user profile associated with a first user, the first user profile comprising a first privacy rule; obtaining a second user profile associated with a second user, the second user profile comprising a second privacy rule; determining which of the first privacy rule or the second privacy rule is more restrictive; setting for a first extended reality (XR) communication session a third privacy rule, the third privacy rule being set to the first privacy rule in a first case that the first privacy rule has been determined to be more restrictive than the second privacy rule and the third privacy rule being set to the second privacy rule in a second case that the second privacy rule has been determined to be more restrictive than the first privacy rule; creating the first XR communication session, the first XR communication session comprising one or more environments, the one or more environments supporting the first user and the second user; and facilitating communications via the one or more environments, the communications being between a first communication device used by the first user and a second communication device used by the second user, the communications being enforced to comply with the third privacy rule. Other embodiments are disclosed.
H04L 65/1069 - Session establishment or de-establishment
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
34.
MANAGING ENERGY CONSUMPTION IN A TRAFFIC-AWARE MANNER
A method for managing energy consumption in a traffic-aware manner includes monitoring a level of network traffic in a wireless network to which a plurality of user devices is connected, detecting, based on the monitoring, that a current level of traffic in the wireless network has exceeded a predefined threshold level of traffic, selecting, in response to the detecting, a subset of the plurality of user devices to put into an energy saving mode, and sending, to each user device in the subset, a signaling message, where the signaling message instructs the each user device to mute, for a defined number of symbols, at least one of: a transmit capability of the each user device or a receive capability of the each user device.
A method includes detecting that a first satellite of a non-terrestrial network is moving out of a field of view of a user endpoint device that is currently connected to the non-terrestrial network, estimating a time at which a second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, selecting, in response to the time at which the second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, an uplink power for the user endpoint device, and sending, to the user endpoint device, an instruction to transmit at the uplink power that is selected.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 52/40 - TPC being performed in particular situations during macro-diversity or soft handoff
A processing system including at least one processor of an endpoint device may obtain performance information of a plurality of wireless access networks in a vicinity of the endpoint device and receive a service request from a first process in operation on the endpoint device. The processing system may then select in response to the service request, a first wireless access network of the plurality of wireless access networks for the first process based upon the performance information of the plurality of wireless access networks and establish a communication session for the first process via the first wireless access network.
A processing system including at least one processor may detect an outage associated with at least one network element, apply at least one attribute of the at least one network element as at least a first input of a plurality of inputs to a machine learning model that is implemented by the processing system to obtain an output of the machine learning model indicative of an alarm smoothing interval, and present, in accordance with the alarm smoothing interval, an alarm indicative of the outage associated with the at least one network element.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
38.
METHOD FOR MOBILE SERVICE CHAINING VIA HYBRID NETWORK RESOURCES SWITCHING
A method includes receiving a request for a communication session from a user device, identifying a first resource from a plurality of resources, wherein the first resource is associated with a first service control layer for a radio access network and wherein the plurality of resources includes at least one virtual network function (VNF), identifying a second resource from the plurality of resources, wherein the second resource is associated with a second service control layer for LTE core functions, identifying a third resource from the plurality of resources, wherein the third resource is associated with a third service control layer for content delivery, allocating a virtual machine to be used to instantiate the at least one VNF, instantiating the at least one VNF and establishing the communication session by facilitating communications between the first service control layer, the second service control layer and the third service control layer.
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first count of resource blocks in a first cell in which the device is located, obtaining a second indication of a second count of resource blocks allocated to the device, obtaining a third indication of a reference signal received power (RSRP) value for the device, obtaining a fourth indication of a received signal strength indicator (RSSI) value for the device, computing a first reference signal received quality (RSRQ) value for the device based on the first indication, the second indication, the third indication, and the fourth indication, and transmitting a fifth indication of the first RSRQ value. Other embodiments are disclosed.
A processing system of a radio access network may obtain an attach request from a user equipment to the radio access network, identify a first cellular core network of a first mobile network operator associated with the user equipment from among a plurality of cellular core networks of a plurality of mobile network operators in communication with the radio access network, generate a first record that includes an identifier of the user equipment, at least one quality class indicator, and at least one radio access network resource utilization metric for a utilization of the radio access network by the user equipment associated with the at least one quality class indicator, and transmit the first record to at least one of: the first cellular core network of the first mobile network operator or a second cellular core network of a second mobile network operator of the plurality of network operators.
A network processing system obtains a viewport of a client device for volumetric video and a two-dimensional (2D) subframe of a frame of volumetric video is obtained associated with the viewport. Viewports may be obtained from the client device or be predicted. 2D subframes and reduced resolution versions of frames can be transmitted to the client device. A client device may request volumetric video from the network processing system and provides a viewport to the network processing system. The client device may obtain from the network processing system reduced resolution versions of volumetric video frames and 2D subframes in accordance with the viewport. The client device may determine whether a current viewport matches the viewport associated with the obtained 2D subframe and provides a display based on either that subframe (upon a match) or a 2D perspective of the reduced resolution frame associated with the current viewport (if no match).
A distributed denial of service (“DDoS”) attack profiler can determine a plurality of DDoS attack properties associated with a DDoS attack that utilizes an Internet of Things (“IoT”) device operating in communication with a home gateway. The DDoS attack profiler can create a DDoS attack profile and can provide a DDoS attack report based upon the DDoS attack profile to a correlator. An IoT device profiler can determine a plurality of IoT device properties and can create, based upon the plurality of IoT device properties, an IoT device profile. The IoT device profiler can create an anomaly report that identifies an anomaly associated with the IoT device. The correlator can correlate the DDoS attack report with the anomaly report to determine if a match exists. In response to determining that the match exists, the home gateway system can store the bot match record in a bot match repository.
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.
A processing system including at least one processor may identify a network zone with excess capacity, the network zone comprising a plurality of network components of a telecommunication network, transmit an invitation to a set of entities to utilize the network zone to obtain at least one network service at a geographic location of the network zone, configure at least one network component of the plurality of network components in accordance with an anticipated network demand from the set of entities, and provide the at least one network service to at least one entity of the set of entities via the network zone when the at least one entity is present at the geographic location of the network zone.
The system allows real time collection and processing of massive data from many network elements. It has an elastic architecture that scales horizontally to support different network sizes. The system in a uniform data format for downstream consumption. It employs a pub/sub data distribution mechanism that supports multiple concurrent downstream subscribers efficiently in real-time.
Aspects of the subject disclosure may include, for example, detecting a plurality uplink data packets on a network, the plurality of uplink data packets conveying application protocol messages from an application on a mobile device to an application server providing a service to the application on the mobile device over the network; providing data packets of the plurality uplink data packets to a machine learning model, the machine learning model trained to identify respective application protocol messages from the data packets; receiving from the machine learning model an indication that a start video download application protocol message has been identified by the machine learning model, the start video download application protocol message requesting initiation of a video download to the application on the mobile device from the application server; detecting a plurality of downlink data packets on the network, the plurality of downlink data packets conveying video content data to the mobile device in response to the start video download application protocol message; comparing a watch time for displaying the video content data on the mobile device by the application and a download data time; and determining a stall event has occurred based on the comparing. Other embodiments are disclosed.
H04N 21/41 - Structure of clientStructure of client peripherals
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
The described technology is generally directed towards a cellular network area optimizer. The area optimizer observes cellular network conditions at multiple radio access network (RAN) nodes within a target area. Based on observed conditions, the area optimizer applies a set of parameter values at the multiple RAN nodes. The set of parameter values enhances the overall throughput, while maintaining or improving connection retainability and accessibility, of the multiple RAN nodes under the observed conditions. The area optimizer learns different sets of parameter values to apply in response to different observed conditions by making parameter value adjustments and observing the effect of the adjustments on overall throughput of the RAN nodes in the target area.
Aspects of the subject disclosure may include, for example, identifying a first message composed by a first user on a first user equipment that is directed to a second user of a second user equipment, identifying a preference of the second user, determining that a first content of the first message composed by the first user departs from the preference of the second user in an amount greater than a threshold, and providing, based on the determining, guidance to the first user for modifying the first content to generate second content that more closely aligns to the preference of the second user. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining first data associated with a plurality of user equipment devices that are communicating with at least one access point of a wireless terrestrial network, wherein the first data indicates a respective location of each user equipment device, a respective in-use wireless frequency that each user equipment device is using for communicating with the at least one access point, and one or more respective potential wireless frequencies that each user equipment device is capable of using for wireless communication; obtaining second data associated with a satellite access point of a wireless non-terrestrial network, wherein the second data indicates a current location of the satellite access point, a future predicted location of the satellite access point, and one or more wireless satellite frequencies that will be available for use by the satellite access point when at the future predicted location in order to communicate with one or more of the user equipment devices; and selecting, based upon the first and second data, at least one user equipment device of the plurality of user equipment devices to offload its data communication to the satellite access point. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, combining a plurality of machine learning (ML) models to form a composite model, the plurality of ML models including a first ML model trained on first local data received at a first network location and added models including a second ML model through an nth ML model, respective added models of the added models each being respectively trained on respective training data at a respective network location remote from the first network location; receiving input data at the first network location; providing the input data to the composite model; receiving, from the composite model, a conclusion about a status of the input data; receiving an indication to update one or more models of the plurality of ML models; and updating the one or more models according to the indication. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, establishing a communication session utilizing a first radio access technology (RAT), obtaining data associated with a performance of the communication session via the first RAT, analyzing the data to determine that the performance of the communication session may be enhanced utilizing a second RAT that is different from the first RAT, resulting in a first determination, and based on the first determination, causing the communication session to utilize the second RAT. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.
Aspects of the subject disclosure may include, for example, determining a self-interference channel response of a transceiver of a mobile base station having a transmitter and a receiver. The self-interference channel response spans multiple sub-bands of a predetermined mobile cellular frequency channel. A first sub-band of the multiple sub-bands is identified according to the self-interference channel response and, an estimate is determined, at the receiver, of a first coupled transmit power level of the transmitter when operating within the first sub-band. A receiver sensitivity is adjusted according to the first coupled transmit power level to obtain an adjustment adapted to increase receiver sensitivity, while restricting operation of the receiver to a substantially linear region. The adjustment allows a transmission within the first sub-band and a reception within a second sub-band of the plurality of sub-bands to occur simultaneously at the mobile base station. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first report comprising first data, obtaining a second report comprising second data, analyzing at least the first data and the second data to identify characteristics of an environment where a communication device is located, based at least in part on the characteristics, determining whether dual connectivity is appropriate for providing a communication service to the communication device, resulting in a determination of dual connectivity, and selectively enabling or disabling dual connectivity in respect of the communication device based on the determination of dual connectivity. Other embodiments are disclosed.
Providing and using a digital asset delivery service can include obtaining a digital asset delivery request that identifies a digital asset that is to be provided to a recipient device, the recipient device, and delivery requirements associated with providing the digital asset to the recipient device. A data source and a network resource via which the data source is to provide the digital asset to the recipient device can be determined, where the data source and the network resource are capable of satisfying the delivery requirements. A ledger that includes instructions for constructing the digital asset at the recipient device can be provided to the recipient device. Delivery of the digital asset to the recipient device by the data source can be triggered, and delivery of the digital asset to the recipient device by the data source can be tracked using a token.
Facilitating management of secondary cell group failures in advanced networks (e.g., 5G and beyond) is provided herein. Operations of a method can comprise determining, by a system comprising a processor, that a first secondary cell group procedure attempt is unsuccessful. Further, the method can comprise facilitating, by the system, a second secondary cell group procedure attempt based on expiration of a delay timer and based on a determination that a retry attempt threshold level is not exceeded.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
An example method performed by a processing system includes obtaining a light detecting and ranging point cloud of a building, where the point cloud includes a plurality of points, and where each point is associated with a set of (x,y,z) coordinates. A first point of the plurality of points is assigned to a subset of the plurality of points that is associated with the building, where the subset includes points whose (x,y) coordinates fall within a footprint of the building. The first point is grouped into a first cluster according to at least one of: a (z) coordinate of the first point and a gradient to which the first point belongs. A first prism formed by the first cluster is constructed. A model of the building is stored as a plurality of connected prisms, where the plurality of connected prisms includes the first prism.
G01S 17/42 - Simultaneous measurement of distance and other coordinates
G01S 17/89 - Lidar systems, specially adapted for specific applications for mapping or imaging
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
Aspects of the subject disclosure may include, for example, obtaining and aggregating first image content of an equipment site resulting in first aggregated image content, and providing the first aggregated image content to communication devices that render it on a respective display. Further embodiments include identifying first equipment from first user-generated input, and adjusting the first aggregated image content with a first equipment image resulting in second aggregated image content. Additional embodiments include identifying second equipment from second user-generated input, and adjusting the second aggregated image content with a second equipment image resulting in third aggregated image content. Also, embodiments include determining that installation of the second equipment does not satisfy an installation threshold in response to analyzing the third aggregated image content, and providing a notification to the communication devices indicating the installation of the second equipment does not satisfy the installation threshold. Other embodiments are disclosed.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a patternLocating or processing of specific regions to guide the detection or recognition
A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.
METHODS, SYSTEMS, AND DEVICES FOR GENERATING A MULTI-USER (MU) MULTIPLE-INPUT-MULTIPLE-OUTPUT (MIMO) GROUP BASED ON BEAM IDENTIFIERS OF COMMUNICATION DEVICES
Aspects of the subject disclosure may include, for example, obtaining a first beam identifier associated with a first communication device, obtaining a second beam identifier associated with a second communication device, and generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including the first communication device and the second communication device based on the first beam identifier and the second beam identifier. Other embodiments are disclosed.
SYSTEMS AND METHODS FOR DETECTING NON-TERRESTRIAL CELLS AND MANAGING PHYSICAL CELL IDENTITY COLLISION AND NEIGHBORING LIST INTEGRITY IN A HETEROGENEOUS TERRESTRIAL AND SATELLITE WIRELESS COMMUNICATION NETWORKS
Aspects of the subject disclosure may include, for example, a method including receiving first neighbor cell information from a first user equipment (UE) operating in a first terrestrial service cell, where the first neighbor cell information includes a first physical cell identification (PCI) of a first neighbor cell and a cell type indicator detected by the first user equipment. The method further includes generating a database that cross-references the first PCI, the cell type indicator and a location of the first UE and analyzing a correlation among the first PCI, the cell type indicator and the location of the first UE to identify anomalies indicative of a non-terrestrial neighbor cell. No handover or neighbor list updates may take place for the non-terrestrial neighbor cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting data traffic from a wireless device located in a customer premise, determining from characteristics of the data traffic whether to route the data traffic to a public network external to the customer premise or route the data traffic to a local network in the customer premise, responsive to determining to route the data traffic to the local network in the customer premise, performing a measurement on the data traffic, and detecting from the measurement that the data traffic requires mitigation action. Other embodiments are disclosed.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 45/00 - Routing or path finding of packets in data switching networks
A processing system may identify a plurality of message contents within a plurality of reported messages, where each is reported as an unwanted message, determine, for each message content, a respective count comprising a number of occurrences the message content within the plurality of reported messages, identify a set of message contents within the plurality of message contents for which associated counts of the plurality of counts exceeds a first threshold, identify a source phone number that is a source of a first set of messages within the plurality of reported messages containing one or more message contents of the set of message contents, and where a number of reporting entities associated with the first set of messages exceeds at least a second threshold, and perform at least one remedial action in a communication network in response to the identifying of the source phone number.
Devices, computer-readable media and methods are disclosed for dynamic capacity scaling for whitebox core networks. In one example, a method includes monitoring network traffic traversing a whitebox core network of a communications service provider, detecting a level of network traffic on a first link in the whitebox core network is greater than a threshold level of network traffic, and re-routing, in response to the detecting, at least one tunnel in the whitebox core network from the first link to a second link in the whitebox core network.
Aspects of the subject disclosure may include, for example, generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including a first group of communication devices. The MU-MIMO group is associated with a base station. Further embodiments can include determining a first group data streams associated with the MU-MIMO group that is transmitted from the base station to the first group of communication devices, and determining a wireless signal associated with each data stream of the first group of data streams resulting in a first group wireless signals. Additional embodiments can include determining a power associated with each wireless signal of the first group of wireless signals is less than a power threshold resulting in a first determination, and increasing the power associated with each wireless signal of the first group of wireless signals based on the first determination resulting in a first group of amplified wireless signals. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a mobile device, with a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including: initializing a wireless fidelity (Wi-Fi) radio; checking whether a Wi-Fi connection with a Wi-Fi access point is available; establishing a secure session with a border gateway via the Wi-Fi connection responsive to the checking; and facilitating a user of the mobile device with a switch function for control of user sessions, wherein the switch function does not affect the secure session or the Wi-Fi radio. Other embodiments are disclosed.
In one example, the present disclosure describes a device, computer-readable medium, and method for implementing programmable security specifications in home routers. For instance, in one example, a method performed by a processing system including at least one processor includes monitoring network traffic flowing into and out of a home network that is connected to a core network via a gateway device, constructing a model of network traffic flowing into and out of the home network, based on the monitoring, detecting an anomaly in the model of the network traffic, generating a rule based on the anomaly, where the rule specifies an action to be taken when a match condition related to the anomaly is detected, and deploying the rule on the gateway device.
Aspects of the subject disclosure may include, for example, obtaining for a first path carrying first network traffic a corresponding first alternate path; obtaining for a second path carrying second network traffic a corresponding second alternate path, at least a first portion of the first alternate path being the same as at least a second portion of the second alternate path; responsive to a first detected failure on the first path, causing communication of first re-directed network traffic via the first alternate path instead of via the first path; responsive to a second detected failure on the second path, detecting whether total traffic, including the first re-directed network traffic, on the first portion of the first alternate path meets a threshold; responsive to the detected meeting of the threshold, obtaining for the second path a corresponding back-up alternate path; and causing communication of second re-directed network traffic via the back-up alternative path instead of via the second path. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a reference data set comprising a plurality of reference data records, wherein the reference data set is associated with a cloud infrastructure, and wherein each of the reference data records comprises a reference network name associated with one of a plurality of reference networks that is configured within the cloud infrastructure and a corresponding reference Virtual Local Area Network (VLAN) identifier for the one of the plurality of reference networks that is configured within the cloud infrastructure; obtaining an input data set comprising a plurality of input data records, wherein the input data set is associated with the cloud infrastructure, and wherein each of the input data records comprises a network name associated with one of a plurality of networks that is being considered for configuration within the cloud infrastructure and a corresponding VLAN identifier for the one of the plurality of networks that is being considered for configuration within the cloud infrastructure; analyzing the reference data records and the input data records in order to identify a set of one or more errors; and tagging one or more records in the input data set with each corresponding occurrence of each error. Other embodiments are disclosed.
Aspects of detecting and mitigating denial of service (“DoS”) attacks over home gateway network address translation (“NAT”) are disclosed herein. According to one aspect disclosed herein, a home gateway system can detect that a NAT table is overpopulated. In response to detecting that the NAT table is overpopulated, the home gateway system can determine a mitigation action to be performed. The home gateway system can then perform the mitigation action in an attempt to mitigate an effect of the NAT table overpopulation.
A method and system for centralized control of user devices is disclosed. The method for centralized control of user devices via universal IP services registrar includes receiving a request to register a user device for a plurality of services, registering the user device for the plurality of services by creating a user settings profile for the user for each of the plurality of services, receiving data from the plurality of registered services, and transmitting received data to the user device in accordance with the user profile.
Aspects of the subject disclosure may include, for example, performing a first analysis in respect of a first carrier, the first carrier operative in accordance with a frequency included in a frequency range from 24.25 GHz to 52.60 GHz, inclusive, determining, based on the performing of the first analysis, that a first user equipment (UE) is to be paired with at least one other UE as part of a multi-user multiple-input multiple-output (MU-MIMO) topology in the first carrier, resulting in a first determination, and subjecting the first UE to the MU-MIMO in the first carrier in accordance with the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining training from wireless devices, where the wireless devices collect the training data that indicates first operational parameters and operational errors at the wireless devices; analyzing the training data to generate pre-failure thresholds according to the first operational parameters and the operational errors; receiving operational data from a particular wireless device, where the particular wireless device collects the operational data that indicates second operational parameters at the particular wireless device; analyzing the operational data according to the pre-failure thresholds resulting in a pre-failure analysis; and providing an alarm when the pre-failure analysis indicates that one or more of the second operational parameters violates one or more of the pre-failure thresholds, where the alarm is generated prior to a failure of the particular wireless devices that is predictable based on the second operational parameters. Other embodiments are disclosed.
Systems, methods, and apparatuses provide a scalable framework for analyzing queuing and transient congestion in network switches. The system reports which flows contributed to the queue buildup and enables direct per-packet action in the data plane to prevent transient congestion. The system may be configured to analyze queuing in legacy network switches.
Aspects of the subject disclosure may include, for example, accessing a heuristic rule associated with network data that is collectible by end user devices; determining a dynamic variable according to the heuristic rule; converting the dynamic variable to a value; adjusting, according to the value, a number of the end user devices that are to transmit the network data to a network device. Other embodiments are disclosed.
In a 5G network, control unit (CU) can be connected to a radio access network controller (RC). In response to receiving measurement data from the CU, the RC can process the measurement data to determine polices and procedures related to radio resource management, and/or radio resource control, which can then be utilized to manage mobility, dual-connectivity, carrier aggregation, and/or integrated access and backhaul topology formation and routing. The measurement data provided by the CU can be provided directly to the RC without processing of the measurement data by the CU.
A processing system including at least one processor may capture a video of a preparation area for a consumable item, may identify at least one item in the video, the at least one item comprising at least one of: at least one ingredient of the consumable item, or at least one tool for preparing the consumable item, and may identify annotation content for the at least one item. The processing system may then modify the video to generate a modified video that includes a visual marker associated with the annotation content and present the modified video via a device associated with a user to be served the consumable item.
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 40/169 - Annotation, e.g. comment data or footnotes
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
Aspects of the subject disclosure may include, for example, identifying a first position of a first user, identifying a first context associated with the first user, determining, based on the first position and the first context, at least a first action that is recommended to be taken, and providing at least one output that provides an indication of the at least a first action. Other embodiments are disclosed.
The disclosed technology relates to detection of attention exhibited by a second user to a first user's avatar in a virtual reality environment. A first user's avatar activity and the second user's activity are evaluated to determine the second user's (e.g., via another avatar) attention level directed towards first user's avatar. Information can be sent to notify the first user that the second user's attention level has satisfied attention-level criterion data. For example, if the second user is viewing and/or is within audio range of the first user for too long of a time or too frequently, then the first user can be notified and/or other action taken. Remedial action is available for negative attention, such blocking the second user from experiencing the first user in the environment. Detection of attention for positive purposes is available, such as to reward an influencer whose avatar is receiving significant attention from followers.
G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06T 19/00 - Manipulating 3D models or images for computer graphics
81.
SYSTEM AND METHOD FOR CREATING AND USING FLOATING VIRTUAL MACHINES
A system includes a plurality of interconnected hardware platforms, wherein the plurality of hardware platforms are configured to run a software defined network, a plurality of virtual machines configured to be instantiated on the software defined network, and a plurality of floating management layers, each of the floating management layers associated with one of the plurality of virtual machines. Each floating management layer includes coupling the associated virtual machine to one of the plurality of hardware platforms, monitoring performance of the associated virtual machine, detecting a trigger, based on the trigger, determining whether to move the virtual machine to a second of the plurality of hardware platforms, and moving the virtual machine.
Aspects of the subject disclosure may include, for example, a network communication device that includes a backhaul link circuit and a Wi-Fi access point to provide broadband services to a service provider's broadband customers and to provide mobility services to the service provider's mobility customers. This network communication device is installed outside of a dwelling unit in order to simplify the installation procedure and avoid property disruption. An extender device registered to a broadband customer user account may associate to the access point for seamless service. User equipment (UE) of the service provider's mobility customers may associate to the access point to receive Wi-Fi roaming services. Other embodiments are disclosed.
Methods, systems, and apparatuses, for real-time operation control, among other things. There may be adjustments to a first device in which a first network service operates. The adjustment to the device may include moving a second network service of the first device to a second device. The first network service and the second network service may be associated with virtual machines.
H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0893 - Assignment of logical groups to network elements
H04L 43/062 - Generation of reports related to network traffic
H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
Aspects of the subject disclosure may include, for example, determining, by a wireless router or a wireless access point (WAP) associated with a fixed network connection, that a network condition is satisfied, based on the determining that the network condition is satisfied, detecting for available networks operating in licensed spectrum and available networks operating in unlicensed spectrum, responsive to the detecting, identifying a first available network operating in licensed spectrum and a second available network operating in unlicensed spectrum, and aggregating, in one or more link aggregation groups, a first connection established with the first available network and a second connection established with the second available network, thereby augmenting a network capacity of the fixed network connection. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining a Reference Signal Received Power (RSRP) and a Signal to Noise Ratio (SNR) for a plurality of carriers at a user equipment (UE) device, the plurality of carriers transmitted by a source group of cells including a source primary cell (PCell) and one or more source secondary cells (SCells) associated with the source PCell, and initiating a handover of communication with the UE device from the source group of cells to a target group of cells, wherein the target group of cells includes a target PCell and one or more target SCells, wherein the initiating the handover is responsive to the RSRP exceeding a predetermined RSRP threshold and the SNR exceeding a predetermined SNR threshold. Other embodiments are disclosed.
The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.
Aspects of the subject disclosure may include, for example, a device in which a processing system of a remote entry system selects a first circuit from a plurality of circuits of a key remote from the device; wirelessly transmits a first challenge signal to the key, the first challenge signal specifying the first circuit; and wirelessly receives a first response signal from the key, the first response signal having a first response signal power level and a first response signal delay with respect to the first challenge signal. The processing system analyzes the first response signal by comparing the first response signal power level and the first response signal delay respectively with a predetermined first signal power and predetermined first time delay associated with the first circuit; and, in accordance with the comparing, determines whether to enable the entry system. Other embodiments are disclosed.
The disclosed technology is generally directed towards monitoring electronic communications to detect content in a communication that is attempting to influence the user in some way. A user can specify influential intent preference data, such as which electronic communications services/applications to monitor for such influential intent content, and the types of the influential intent to monitor for, e.g., political influence types, advertisement influence types, and so on. A user also can specify remedial or other actions to take upon detection, e.g., block such content, alert on detecting such content and so on. An electronic influence manager server and/or application program can perform the monitoring and/or take the actions. Also described is reporting on the communications with influential intent, user actions with respect thereto. Reputation data can also be collected and used with respect to sources of communications with influential intent.
Aspects of the subject disclosure may include, for example, pairing a first user equipment (UE) and a second UE as part of a multi-user multiple-input multiple-output (MU-MIMO) topology in a first cell, resulting in a first pairing, and pairing the first UE with a third UE as part of a MU-MIMO topology in a second cell, resulting in a second pairing, wherein the second pairing is independent of the first pairing and the second cell is different from the first cell. Other embodiments are disclosed.
Local weather information such as a nationwide emergency network for first responders can enable first responders to communicate nationally with a single network, linking to suppliers, utilities, and weather information. The system disclosed herein can provide data to first responders and data from first responders can provide insights into local conditions that can be utilized by edge data centers. Adding first responder data can improve the processing speed of moving of edge-based applications out of threatened data centers. Because this movement can also have an impact on low latency applications, identifying the closest edge sites without an impact can keep the applications operating.
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04W 40/02 - Communication route or path selection, e.g. power-based or shortest path routing
H04W 40/20 - Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
The disclosed technology is directed towards creating a media content presentation for playback, based on user specified input criteria and playback instructions. A user specifies input criteria related to media source data. The media source data is accessed, and further based on the input criterion, matching segments (e.g., scenes and audio) are determined from metadata information that describes the segments; the media playback content is generated from the matching segments. A user may also specify criteria/instructions that describe how to play the matching segments, such as in linear order, or based on relative relevance such as scene impactfulness. A matching scene can be repeated, and/or augmented with annotation data. For any matching scene or transition between two matching scenes, specified playback speed and audio volume can be specified and applied. As part of generation, the media content presentation can be fit to a specified time constraint.
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
G06V 20/40 - ScenesScene-specific elements in video content
H04N 21/485 - End-user interface for client configuration
92.
Controlling Access To Datasets Described In A Cryptographically Signed Record
In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Facilitating web page spectroscopy in a communications network is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise receiving first data that describes a first communication packet flow and second data that describes a second communication packet flow. The operations can also comprise training a model based on the first data and the second data, as a result of which the model is trained to detect respective behaviors represented by the first data and the second. Further, the operations can comprise extracting a common parameter from third data that describes a third communication packet flow and fourth data that describes a fourth communication packet flow based on the model.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
A processing system of a carrier transport vehicle including at least one processor may obtain a notification of a luggage item to be placed in a stowage bin of the carrier transport vehicle, the notification including an identifier of the luggage item, detect, via the identifier of the luggage item, that the luggage item is proximate to the stowage bin, where the identifier of the luggage item is obtained via a wireless signal from the luggage item, and present at least one visual indicator associated with the stowage bin, in response to the detecting that the luggage item is proximate to the stowage bin.
H04B 5/77 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
B64D 11/00 - Passenger or crew accommodationFlight-deck installations not otherwise provided for
G08B 5/36 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources
H04B 5/72 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication
95.
NETWORK OPTIMIZATION FOR HYBRID QUANTUM-CLASSICAL NETWORKS
A method performed by a processing system including at least one processor includes calculating a quantum network relative performance metric for a current configuration of a hybrid quantum-classical telecommunications network, identifying a proposed new configuration for the hybrid quantum-classical telecommunications network, calculating the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network, and implementing the proposed new configuration in the hybrid quantum-classical telecommunications network when the quantum network relative performance metric for the proposed new the hybrid quantum-classical telecommunications network is greater than the quantum network relative performance metric for the current configuration of the hybrid quantum-classical telecommunications network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
Aspects of the subject disclosure may include, for example, a radio device that has first and second subscriber identity modules; radio resources; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a first communications network connection associated with the first subscriber identity module; establishing a second communications network connection associated with the second subscriber identity module; determining a communications activity on the first communications network connection; pausing or suspending activities of the second communications network connection; and blocking use of the radio resources by the second communications network connection. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a machine-readable medium with executable instructions that facilitate performance of operations by a processor including receiving a registration for a trajectory of a satellite; estimating a zone of occupancy at a future time for the satellite; determining an interference of the satellite from the zone of occupancy at the future time; determining a deconfliction for minimizing or eliminating the interference; and sending the deconfliction to a controller of the satellite. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving, from a computing device, a validation request for validating an individual associated with a mobile device equipped with an authentication app communicatively coupled with an authentication system, obtaining request data from a user validation system, enabling, using the request data, the computing device to communicate with the user validation system to facilitate the validation, wherein the validation involves the user validation system triggering the authentication system to provide access information to the computing device, the authentication system authenticating the individual/mobile device, the authentication system providing, to the user validation system, identification information of the individual based on the authenticating, and the user validation system determining a validation result based on data relating to the identification information. Aspects also include obtaining the validation result from the user validation system and causing the validation result to be presented. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: receiving a path of a threat vehicle; calculating a closest approach distance based on a current position of a drone and the path of the threat vehicle; determining that the closest approach distance is within a threshold; and sending a command to the drone to descend to a safe altitude. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example: receiving, from a first mobile communication device of a first user, first information associated with a computer-readable indicia that has been scanned by the first mobile communication device, wherein the computer-readable indicia had been displayed by a second mobile communication device of a second user at a time of being scanned by the first mobile communication device; responsive to receiving of the first information, obtaining from one or more first databases first characterizing data that is descriptive of one or more characteristics of the second user; and sending to the first mobile communication device the first characterizing data, wherein the sending facilitates a presentation by the first mobile communication device of the one or more characteristics of the second user. Other embodiments are disclosed.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism