Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a query for 5G Session Management Functions (SMFs) to handle a connection request, wherein the query includes a slice ID and data network name; determining a list of SMFs that each have a blockchain ID immutably recorded on a blockchain, wherein the blockchain ID is authorized to provide service to the slice ID; and sending, responsive to the query, the list of SMFs. Other embodiments are disclosed.
The concepts and technologies disclosed herein are directed to alarm correlation and ticketing for reconfigurable optical add/drop multiplexer (“ROADM”) networks. According to one aspect disclosed herein, a ROADM controller can create, based upon data associated with a plurality of ROADM network elements operating in a ROADM network, a graph of the plurality ROADM network elements. The ROADM controller can retrieve a plurality of alarms from at least a portion the plurality of ROADM network elements, associate the plurality of alarms with at least the portion of the plurality of ROADM network elements, and associate a direction of each alarm with a corresponding service direction. The ROADM controller can eliminate any alarms with a time stamp outside of a same time window. The ROADM controller can then determine that any remaining alarms are associated with a root cause of a failure within the ROADM network.
The described technology is generally directed towards network slicing for private cellular networks (PCNs). Network slicing can be leveraged as described herein to meet security requirements and/or other policies applicable to PCNs. Network slices implemented according to this disclosure can comprise a private network slice, a public network slice, and a public safety network slice. User equipment can be provisioned with slice identifiers for the network slices, and applications at the user equipment can specify an appropriate slice identifier for their network communications. Network equipment can be configured to route application traffic to a specified slice and to allocate network resources according to the specified slice, as well as to implement security and other policies according to the specified slice.
AT&T Communications Services India Private Limited (Inde)
Inventeur(s)
Pandey, Mritunjay
Kapoor, Subhash
Rivera, Lynn
Paira, Saurav
Abrégé
Aspects of the subject disclosure may include, for example, identifying network elements of a wavelength division multiplexing (WDM) domain of an optical waveguide communication system that includes a group of optical-add-drop multiplexor (OADM) devices. Operations are observed for the WDM domain configured to deliver communication services configured for simultaneously transporting independent signals across a network of single optical waveguides. A demand for optical waveguide communication services is determined and the WDM network is configured according to the optical fiber communication link requirement and according to the observations. The configured WDM network includes at least one OADM device of the group of OADM devices configured to provide a WDM cross-frequency network path of the configured WDM network. Other embodiments are disclosed.
A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.
Estimation of network latency based on aggregated performance data is disclosed. End-to-end latency between endpoints can comprise protocol-induced latency, access network-induced, core-network latency, and network-distance-based latency. Network latency, e.g., network-distance-based latency, also referred to as topological latency, can correspond to communication path length between endpoints. Crowdsourcing of communication path performance information can enable estimation of topological latency, and derivatives thereof, such as topological distance. Crowdsourcing can be the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, e.g., collection of performance information. The disclosure illustrates estimation of protocol-induced latency, access network-induced, and core-network latency, such that they can be compensated for in end-to-end latency information, thereby enabling estimation of topological latency that can be employed in determining, initiating, etc., a network response operation that can affect change in a network.
H04L 43/067 - Génération de rapports en utilisant des rapports de délai
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
Aspects of the subject disclosure may include, for example, receiving information defining a high-capacity event in a mobility network, receiving information defining a network location of the high-capacity event in the mobility network, automatically configuring one or more network components of the mobility network according to a set of high-capacity parameters, the one or more network components associated with the network location of the high-capacity event, limiting access to the mobile network to specific users according to the high-capacity parameters, and after the high-capacity event, automatically configuring the one or more network components of the mobile network according to a set of reversion parameters. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes collecting a set of data from a plurality of sensors that is monitoring a system, wherein the plurality of sensors includes sensors of a plurality of different modalities, detecting an instance of out-of-distribution data in the set of data by providing the set of data as an input to a machine learning model that generates as an output an indicator that the instance of out-of-distribution data is out-of-distribution with respect to the set of data, identifying a root cause for the instance of out-of-distribution data, and initiating an action to remediate the root cause of the instance of out-of-distribution data.
H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04W 4/38 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour la collecte d’informations de capteurs
9.
MAC ADDRESSES CAPTURING VIRTUAL-TO-PHYSICAL ASSOCIATIONS WITHIN VIRTUAL ENVIRONMENTS
Aspects of the subject disclosure may include, for example, identifying a request to initiate a virtual machine including a virtual network interface on a physical host processing system that includes a physical network interface. A location reference to a physical location of the physical network interface is determined and an adapted media access control (MAC) address is adapted to incorporate the location reference according to an association between the virtual network interface and the physical network interface. The adapted MAC address is further associated with the virtual network interface of the virtual machine, such that the physical location of the physical network interface is identifiable from within an environment of the virtual machine via the adapted MAC address. Other embodiments are disclosed.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
10.
METHOD OF CO-LOCATING SESSION BORDER CONTROLLER (SBC) AND VOICE/MESSAGE FUNCTIONS IN PUBLIC CLOUD
Aspects of the subject disclosure may include, for example, co-locating network functions in virtual machines and/or containers in public clouds. A session border controller (SBC) may be combined with one or more voice and/or message services network functions. A virtual image or container runtime including co-located network functions may be provided to a public cloud service provider, and virtual machines or containers having co-located network functions may be instantiated as needed. Other embodiments are disclosed.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 51/58 - Adaptation des messages pour la communication sans fil
11.
AUTONOMOUS AERIAL VEHICLE PROJECTION ZONE SELECTION
A processing system of an autonomous aerial vehicle including at least one processor may determine informational data to present for at least one person, capture at least a first image via at least one imaging sensor of the autonomous aerial vehicle in a vicinity of the at least one person and determine a first position and a first orientation of the at least one person. The processing system may then identify, based upon the first position and the first orientation of the at least one person, a plurality of candidate projection areas, each candidate projection area comprising a contiguous area within the at least the first image that is deemed to be visible to the at least one person, select one of the plurality of candidate projection areas as a projection zone, and project the informational data on the projection zone via a projector.
B64U 101/30 - Véhicules aériens sans pilote spécialement adaptés à des utilisations ou à des applications spécifiques à l’imagerie, à la photographie ou à la vidéographie
G05D 1/689 - Interaction avec des charges utiles ou des entités externes dirigeant des charges utiles vers des cibles fixes ou en mouvement
The disclosed technology is directed towards routing, by a mobile network operator, a message to a messaging hub associated with a partner carrier or to the partner carrier itself. In response to receiving a message to reroute, a data store (e.g., an ENUM database) is queried to attempt to obtain information corresponding to the routing. For example, when the query response includes a regular expression that specifies a domain, the domain is evaluated against a data structure of respective messaging hubs associated with respective domains. If the returned domain is matched such that an associated messaging hub is identified, the message is routed to the identified messaging hub; otherwise a mobile network partner carrier is determined based on the telephone number of the message recipient, and the message is routed to the determined partner carrier.
Architectures and techniques are presented that can leverage network equipment (e.g., broadband provider equipment, cellular provider equipment) in order to provide enhanced guidance to a target location. This enhanced guidance can supplement existing mapping or navigation equipment. Such can be advantageous for public safety answering point entities and first responder entities as well as, potentially, for service technicians or delivery. When an entity (e.g., first responder) is dispatched to a particular location, an associated residential gateway (RG) or other device can be identified, and an associated SSID determined. This SSID can be provided to the entity seeking that particular location so that SSID scans can operate similar to a transponder or homing beacon. The SSID might also be configured specially for this purpose. Additionally, the state of a device attached to the RG can be altered to further aid in locating, such as blinking porch lights or audible indicia.
The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.
Aspects of the subject disclosure may include, for example, receiving a handover request from a user equipment (UE) device in a mobility network, wherein the handover request identifies a target cell for handing over radio communication with the UE device from a source cell, wherein the identifying is based on the handover request, determining a usage level of the UE device, wherein the usage level comprises one of performance-sensitive traffic and performance-tolerant traffic, selecting an alternative target cell for the handover request, wherein the selecting is responsive to determining a performance-sensitive traffic usage level of the UE device, and initiating a handover operation between the source cell and the alternative target cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include receiving a first data set related to a first International Mobile Subscriber Identifier (IMSI) from a wireless core system, tidying the first data set by building a bandwidth matrix representing each bandwidth usage value with respect to a selected time-stamp and one or more flow IDs associated with the first IMSI, repeating the receiving and tidying operations with respect to a plurality of data sets related to remaining IMSIs, and generating data visualization displaying the bandwidth usage value of the first IMSI and the remaining IMSIs. The first IMSI and the remaining IMSIs are associated with a selected network slice ID. Other embodiments are disclosed.
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
17.
METHODS, SYSTEMS, AND DEVICES FOR RECOMMENDING MITIGATION OF INTERNET OF THINGS (IOT) CYBER THREATS USING GENERATIVE ARTIFICIAL INTELLIGENCE
Aspects of the subject disclosure may include, for example, obtaining a group of threat research reports, obtaining a group of indicators of compromise (IOCs), and monitoring a network of Internet of Things (IoT) devices. Further embodiments can include determining a group of possible malware on the network based on the monitoring of the network, and generating a network security recommendation based on the group of threat research reports based on the group of threat research reports, the group of IOCs, and the group of possible malware. Other embodiments are disclosed.
A processing system including at least one processor may apply an input vector to a location-based services recommendation module implemented by the processing system, where the location-based services recommendation module includes at least one location-based service prediction model, and where the input vector includes first characteristics associated with a first cell site of a cellular network. The processing system may obtain an output of the location-based services recommendation module in response to the applying of the input vector, the output including a first plurality of values for a plurality of configurable settings of at least a first network element associated with the first cell site. The processing system may then configure the at least the first network element associated with the first cell site to apply at least one of the first plurality of values for at least one of the plurality of configurable settings.
A method performed by a processing system including at least one processor includes detecting a presence of a plurality of user devices in a cell of a mobile network that deploys a carrier that supports beamforming, disabling, in response to the detecting the presence of the plurality of user devices, carrier aggregation in the cell for a first subset of the plurality of user devices that supports multi-user multiple input, multiple output communications, and activating, after disabling the carrier aggregation, multi user multiple input, multiple output communications for the first subset of the plurality of user devices.
Aspects of the subject disclosure may include, for example, a method that includes receiving, by a processing system, an uplink signal at a radio unit (RU) communicating over a fronthaul interface with a distributed unit (DU) of a communication network; receiving a demodulated reference signal (DMRS) configuration at the RU; performing a beamforming procedure at the RU for one or more beams generated at the RU; and determining, in accordance with an option selected by the DU, whether to perform an equalization procedure for the uplink signal at the RU resulting in equalized user data. In accordance with the equalization procedure being performed at the RU, equalization for the uplink signal is not performed at the DU. Other embodiments are disclosed.
AT&T Global Network Services Czech Republic s.r.o. (République tchèque)
AT&T Mobility II LLC (USA)
Inventeur(s)
Hao, Shuai
Andrei, Alexandru Cristian
Perez, Hector
Coates, Jr., Donald
Ge, Zihui
Hicks, Alvin
Tipton, Jason
Abrégé
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Aspects of the subject disclosure may include, for example, a system, comprising: a message-sending device comprising a first processing system including a first processor, wherein the message-sending device further comprises a first wireless communication mechanism, wherein the first processing system is configured to receive an input command, wherein the input command is provided by a person who is coaching a player, wherein the person who is coaching the player is located on a sideline of a field, and wherein the player is on the field; and a helmet worn by the player, wherein the helmet comprises a second processing system including a second processor, wherein the helmet further comprises a second wireless communication mechanism, and wherein the helmet further comprises a display mechanism positioned in a line of sight of at least one eye of the player; wherein the first processing system determines whether a play clock associated with a current play has been running for a threshold amount of time, resulting in a determination; wherein, responsive to the determination being that the play clock associated with the current play has not been running for the threshold amount of time, the first processing system transmits via the first wireless communication mechanism to the helmet a message that is based upon the input; wherein the second processing system receives, via the second wireless communication mechanism of the helmet, the message; and wherein, responsive to receipt of the message, the second processing system causes the display mechanism to display the message. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a natural language statement of an optimization problem that is to be solved, analyzing the natural language statement to select a template included within a plurality of templates, generating a definition for the optimization problem using the template, constructing a model in accordance with the definition, resulting in a constructed model, and validating the constructed model, resulting in a validated model. Other embodiments are disclosed.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité
G06F 40/40 - Traitement ou traduction du langage naturel
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
24.
ACCESS TO CLOUD-DISTRIBUTED APPLICATIONS VIA ACCESS CREDENTIAL LOCKER SERVICE
A processing system may obtain a request from a user device to activate an access credential locker for use in accessing at least one enterprise system of an enterprise via the processing system, the request comprising a token that identifies the access credential locker, obtain a first key from the user device, transmit, to the enterprise, a request for a second key, obtain the second key from the enterprise in response to the request, apply the first key and the second key to the access credential locker, the access credential locker being encrypted in accordance with the first and second keys and being decrypted via the applying of the first and second keys, and establish a communication session between the user device and the at least one enterprise system via the processing system using at least one access credential that is stored in the decrypted access credential locker.
G06F 21/45 - Structures ou outils d’administration de l’authentification
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, for a network application, identifying, by a system comprising a processor, a first performance characteristic of first base station equipment, wherein the first base station equipment is actively communicating with a user equipment via a first network connection. The method can further include, based on the first performance characteristic being in a condition in relation to a first threshold, determining, by the system, to execute a handover of the user equipment to a second network connection with second base station equipment, resulting in a handover determination. Further, the method can include, based on the handover determination, facilitating, by the system, executing the handover of the user equipment to the second network connection.
Aspects of the subject disclosure may include, for example, a device that facilitates obtaining a plurality of prompts from a selected subject matter domain of a database configured to measure an effectiveness of a generative large language model (LLM) to distinguish variances between each prompt of the plurality of prompts; supplying the plurality of prompts to the LLM; receiving respective responses to each of the prompts from the LLM; transforming each of the prompts and respective responses to each of the prompts into an embedding space; determining, by applying domain-based metrics to the embedding space, a quality measurement of each respective response to produce a plurality of quality measurements; and generating, according to the plurality of quality measurements, a performance of the LLM. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining, for a network node, one or more neighbor network nodes relative to the network node; determining, for each of the one or more neighbor network nodes, whether support is provided for a particular type of end-user device; and generating, for the network node, a neighbor cell relation table, wherein the neighbor cell relation table includes the one or more neighbor network nodes, and wherein the neighbor cell relation table further includes for at least one of the neighbor network nodes an indication that support is provided for the particular type of end-user device. Other embodiments are disclosed.
A method includes monitoring a condition of a mobile device while the mobile device is connected to a terrestrial network, determining that the condition satisfies a trigger for switching to a non-terrestrial network, and sending, in response to the determining, a first instruction to the mobile device, where the first instruction causes the mobile device to disconnect from the terrestrial network and to connect to a non-terrestrial network.
Aspects of the subject disclosure may include, for example, a device, having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: collecting data traffic of one or more network devices of a user, wherein the data traffic is associated with multiple channels of interactions; building a channel-specific user signature and a cross-channel user signature of normal usage for the user based on the data traffic collected; detecting a change in a characteristic of the data traffic, wherein the change indicates fraudulent activity based on the channel-specific user signature and the cross-channel user signature; and issuing an alert of the fraudulent activity based on the change. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: receiving a series of values from a data stream generated by one or more equipment in a communications network; creating a first window of values received before a first point in time and a second window of values received on or after the first point in time; comparing a distribution of values in the first window and values in the second window to compute a distance at the first point in time; repeating the creating and comparing at subsequent points in time after the first point in time, thereby generating a series of distances; computing a z-score for a first distance in the series of distances; generating an alert responsive to the z-score exceeding a threshold; and storing the alert in a log of alerts. Other embodiments are disclosed.
The disclosed technology is directed towards preventing a handover of a Wi-Fi call to a Fifth Generation (5G) standalone cellular network. In one alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device. In another alternative, a 5G standalone usage setting is disabled on a mobile device when Wi-Fi calling is enabled on the mobile device and the mobile device is connected to a Wi-Fi network, which facilitates camping on a 5G standalone network when the mobile device is not connected to a Wi-Fi network. In yet another alternative, a 5G standalone usage setting is disabled on a mobile device when an evolved packet data gateway (ePDG) tunnel is set up on the mobile device, which similarly facilitates camping on a 5G standalone network when the ePDG tunnel is torn down.
Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving a smart contract for tracking a position of a mobile device from a quantum blockchain; issuing a token uniquely identifying location data for the position of the mobile device; receiving location data including the token from the mobile device, wherein the position of the mobile device is determined by displacement from an initial position using a quantum accelerometer; verifying the location data using the token; and storing the location data in the quantum blockchain. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first user profile associated with a first user, the first user profile comprising a first privacy rule; obtaining a second user profile associated with a second user, the second user profile comprising a second privacy rule; determining which of the first privacy rule or the second privacy rule is more restrictive; setting for a first extended reality (XR) communication session a third privacy rule, the third privacy rule being set to the first privacy rule in a first case that the first privacy rule has been determined to be more restrictive than the second privacy rule and the third privacy rule being set to the second privacy rule in a second case that the second privacy rule has been determined to be more restrictive than the first privacy rule; creating the first XR communication session, the first XR communication session comprising one or more environments, the one or more environments supporting the first user and the second user; and facilitating communications via the one or more environments, the communications being between a first communication device used by the first user and a second communication device used by the second user, the communications being enforced to comply with the third privacy rule. Other embodiments are disclosed.
H04L 65/1069 - Établissement ou terminaison d'une session
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
34.
MANAGING ENERGY CONSUMPTION IN A TRAFFIC-AWARE MANNER
A method for managing energy consumption in a traffic-aware manner includes monitoring a level of network traffic in a wireless network to which a plurality of user devices is connected, detecting, based on the monitoring, that a current level of traffic in the wireless network has exceeded a predefined threshold level of traffic, selecting, in response to the detecting, a subset of the plurality of user devices to put into an energy saving mode, and sending, to each user device in the subset, a signaling message, where the signaling message instructs the each user device to mute, for a defined number of symbols, at least one of: a transmit capability of the each user device or a receive capability of the each user device.
A method includes detecting that a first satellite of a non-terrestrial network is moving out of a field of view of a user endpoint device that is currently connected to the non-terrestrial network, estimating a time at which a second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, selecting, in response to the time at which the second satellite of the non-terrestrial network is expected to enter the field of view of the user endpoint device, an uplink power for the user endpoint device, and sending, to the user endpoint device, an instruction to transmit at the uplink power that is selected.
H04W 52/28 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le profil utilisateur, p. ex. la vitesse, la priorité ou l'état du réseau, p. ex. en attente, libre ou absence de transmission
H04W 52/40 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué dans des situations particulières en macrodiversité ou en transfert progressif
A processing system including at least one processor of an endpoint device may obtain performance information of a plurality of wireless access networks in a vicinity of the endpoint device and receive a service request from a first process in operation on the endpoint device. The processing system may then select in response to the service request, a first wireless access network of the plurality of wireless access networks for the first process based upon the performance information of the plurality of wireless access networks and establish a communication session for the first process via the first wireless access network.
A processing system including at least one processor may detect an outage associated with at least one network element, apply at least one attribute of the at least one network element as at least a first input of a plurality of inputs to a machine learning model that is implemented by the processing system to obtain an output of the machine learning model indicative of an alarm smoothing interval, and present, in accordance with the alarm smoothing interval, an alarm indicative of the outage associated with the at least one network element.
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
38.
METHOD FOR MOBILE SERVICE CHAINING VIA HYBRID NETWORK RESOURCES SWITCHING
A method includes receiving a request for a communication session from a user device, identifying a first resource from a plurality of resources, wherein the first resource is associated with a first service control layer for a radio access network and wherein the plurality of resources includes at least one virtual network function (VNF), identifying a second resource from the plurality of resources, wherein the second resource is associated with a second service control layer for LTE core functions, identifying a third resource from the plurality of resources, wherein the third resource is associated with a third service control layer for content delivery, allocating a virtual machine to be used to instantiate the at least one VNF, instantiating the at least one VNF and establishing the communication session by facilitating communications between the first service control layer, the second service control layer and the third service control layer.
H04W 28/16 - Gestion centrale des ressourcesNégociation de ressources ou de paramètres de communication, p. ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
39.
APPARATUSES AND METHODS TO BALANCE LOAD IN COMMUNICATION NETWORKS BASED ON AN ALLOCATION OF RESOURCES TO COMMUNICATION DEVICES
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first count of resource blocks in a first cell in which the device is located, obtaining a second indication of a second count of resource blocks allocated to the device, obtaining a third indication of a reference signal received power (RSRP) value for the device, obtaining a fourth indication of a received signal strength indicator (RSSI) value for the device, computing a first reference signal received quality (RSRQ) value for the device based on the first indication, the second indication, the third indication, and the fourth indication, and transmitting a fifth indication of the first RSRQ value. Other embodiments are disclosed.
A processing system of a radio access network may obtain an attach request from a user equipment to the radio access network, identify a first cellular core network of a first mobile network operator associated with the user equipment from among a plurality of cellular core networks of a plurality of mobile network operators in communication with the radio access network, generate a first record that includes an identifier of the user equipment, at least one quality class indicator, and at least one radio access network resource utilization metric for a utilization of the radio access network by the user equipment associated with the at least one quality class indicator, and transmit the first record to at least one of: the first cellular core network of the first mobile network operator or a second cellular core network of a second mobile network operator of the plurality of network operators.
A network processing system obtains a viewport of a client device for volumetric video and a two-dimensional (2D) subframe of a frame of volumetric video is obtained associated with the viewport. Viewports may be obtained from the client device or be predicted. 2D subframes and reduced resolution versions of frames can be transmitted to the client device. A client device may request volumetric video from the network processing system and provides a viewport to the network processing system. The client device may obtain from the network processing system reduced resolution versions of volumetric video frames and 2D subframes in accordance with the viewport. The client device may determine whether a current viewport matches the viewport associated with the obtained 2D subframe and provides a display based on either that subframe (upon a match) or a 2D perspective of the reduced resolution frame associated with the current viewport (if no match).
A distributed denial of service (“DDoS”) attack profiler can determine a plurality of DDoS attack properties associated with a DDoS attack that utilizes an Internet of Things (“IoT”) device operating in communication with a home gateway. The DDoS attack profiler can create a DDoS attack profile and can provide a DDoS attack report based upon the DDoS attack profile to a correlator. An IoT device profiler can determine a plurality of IoT device properties and can create, based upon the plurality of IoT device properties, an IoT device profile. The IoT device profiler can create an anomaly report that identifies an anomaly associated with the IoT device. The correlator can correlate the DDoS attack report with the anomaly report to determine if a match exists. In response to determining that the match exists, the home gateway system can store the bot match record in a bot match repository.
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.
A processing system including at least one processor may identify a network zone with excess capacity, the network zone comprising a plurality of network components of a telecommunication network, transmit an invitation to a set of entities to utilize the network zone to obtain at least one network service at a geographic location of the network zone, configure at least one network component of the plurality of network components in accordance with an anticipated network demand from the set of entities, and provide the at least one network service to at least one entity of the set of entities via the network zone when the at least one entity is present at the geographic location of the network zone.
G08G 1/0968 - Systèmes impliquant la transmission d'indications de navigation au véhicule
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons
H04W 28/02 - Gestion du trafic, p. ex. régulation de flux ou d'encombrement
The system allows real time collection and processing of massive data from many network elements. It has an elastic architecture that scales horizontally to support different network sizes. The system in a uniform data format for downstream consumption. It employs a pub/sub data distribution mechanism that supports multiple concurrent downstream subscribers efficiently in real-time.
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
47.
SYSTEM AND METHOD FOR DETERMINATION AND RECONSTRUCTION OF VIDEO AND ENTERTAINMENT SESSIONS IN PACKET DATA NETWORKS
Aspects of the subject disclosure may include, for example, detecting a plurality uplink data packets on a network, the plurality of uplink data packets conveying application protocol messages from an application on a mobile device to an application server providing a service to the application on the mobile device over the network; providing data packets of the plurality uplink data packets to a machine learning model, the machine learning model trained to identify respective application protocol messages from the data packets; receiving from the machine learning model an indication that a start video download application protocol message has been identified by the machine learning model, the start video download application protocol message requesting initiation of a video download to the application on the mobile device from the application server; detecting a plurality of downlink data packets on the network, the plurality of downlink data packets conveying video content data to the mobile device in response to the start video download application protocol message; comparing a watch time for displaying the video content data on the mobile device by the application and a download data time; and determining a stall event has occurred based on the comparing. Other embodiments are disclosed.
H04N 21/41 - Structure de clientStructure de périphérique de client
H04N 21/25 - Opérations de gestion réalisées par le serveur pour faciliter la distribution de contenu ou administrer des données liées aux utilisateurs finaux ou aux dispositifs clients, p. ex. authentification des utilisateurs finaux ou des dispositifs clients ou apprentissage des préférences des utilisateurs pour recommander des films
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
H04N 21/61 - Structure physique de réseauTraitement de signal
The described technology is generally directed towards a cellular network area optimizer. The area optimizer observes cellular network conditions at multiple radio access network (RAN) nodes within a target area. Based on observed conditions, the area optimizer applies a set of parameter values at the multiple RAN nodes. The set of parameter values enhances the overall throughput, while maintaining or improving connection retainability and accessibility, of the multiple RAN nodes under the observed conditions. The area optimizer learns different sets of parameter values to apply in response to different observed conditions by making parameter value adjustments and observing the effect of the adjustments on overall throughput of the RAN nodes in the target area.
Aspects of the subject disclosure may include, for example, identifying a first message composed by a first user on a first user equipment that is directed to a second user of a second user equipment, identifying a preference of the second user, determining that a first content of the first message composed by the first user departs from the preference of the second user in an amount greater than a threshold, and providing, based on the determining, guidance to the first user for modifying the first content to generate second content that more closely aligns to the preference of the second user. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining first data associated with a plurality of user equipment devices that are communicating with at least one access point of a wireless terrestrial network, wherein the first data indicates a respective location of each user equipment device, a respective in-use wireless frequency that each user equipment device is using for communicating with the at least one access point, and one or more respective potential wireless frequencies that each user equipment device is capable of using for wireless communication; obtaining second data associated with a satellite access point of a wireless non-terrestrial network, wherein the second data indicates a current location of the satellite access point, a future predicted location of the satellite access point, and one or more wireless satellite frequencies that will be available for use by the satellite access point when at the future predicted location in order to communicate with one or more of the user equipment devices; and selecting, based upon the first and second data, at least one user equipment device of the plurality of user equipment devices to offload its data communication to the satellite access point. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, combining a plurality of machine learning (ML) models to form a composite model, the plurality of ML models including a first ML model trained on first local data received at a first network location and added models including a second ML model through an nth ML model, respective added models of the added models each being respectively trained on respective training data at a respective network location remote from the first network location; receiving input data at the first network location; providing the input data to the composite model; receiving, from the composite model, a conclusion about a status of the input data; receiving an indication to update one or more models of the plurality of ML models; and updating the one or more models according to the indication. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, establishing a communication session utilizing a first radio access technology (RAT), obtaining data associated with a performance of the communication session via the first RAT, analyzing the data to determine that the performance of the communication session may be enhanced utilizing a second RAT that is different from the first RAT, resulting in a first determination, and based on the first determination, causing the communication session to utilize the second RAT. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.
Aspects of the subject disclosure may include, for example, determining a self-interference channel response of a transceiver of a mobile base station having a transmitter and a receiver. The self-interference channel response spans multiple sub-bands of a predetermined mobile cellular frequency channel. A first sub-band of the multiple sub-bands is identified according to the self-interference channel response and, an estimate is determined, at the receiver, of a first coupled transmit power level of the transmitter when operating within the first sub-band. A receiver sensitivity is adjusted according to the first coupled transmit power level to obtain an adjustment adapted to increase receiver sensitivity, while restricting operation of the receiver to a substantially linear region. The adjustment allows a transmission within the first sub-band and a reception within a second sub-band of the plurality of sub-bands to occur simultaneously at the mobile base station. Other embodiments are disclosed.
H04W 52/24 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le rapport signal sur parasite [SIR Signal to Interference Ratio] ou d'autres paramètres de trajet sans fil
H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
H04L 5/14 - Fonctionnement à double voie utilisant le même type de signal, c.-à-d. duplex
H04W 72/0446 - Ressources du domaine temporel, p. ex. créneaux ou trames
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
55.
APPARATUSES AND METHODS FOR FACILITATING NETWORK CONNECTIVITY BASED ON IDENTIFIED CONDITIONS
Aspects of the subject disclosure may include, for example, obtaining a first report comprising first data, obtaining a second report comprising second data, analyzing at least the first data and the second data to identify characteristics of an environment where a communication device is located, based at least in part on the characteristics, determining whether dual connectivity is appropriate for providing a communication service to the communication device, resulting in a determination of dual connectivity, and selectively enabling or disabling dual connectivity in respect of the communication device based on the determination of dual connectivity. Other embodiments are disclosed.
Providing and using a digital asset delivery service can include obtaining a digital asset delivery request that identifies a digital asset that is to be provided to a recipient device, the recipient device, and delivery requirements associated with providing the digital asset to the recipient device. A data source and a network resource via which the data source is to provide the digital asset to the recipient device can be determined, where the data source and the network resource are capable of satisfying the delivery requirements. A ledger that includes instructions for constructing the digital asset at the recipient device can be provided to the recipient device. Delivery of the digital asset to the recipient device by the data source can be triggered, and delivery of the digital asset to the recipient device by the data source can be tracked using a token.
Facilitating management of secondary cell group failures in advanced networks (e.g., 5G and beyond) is provided herein. Operations of a method can comprise determining, by a system comprising a processor, that a first secondary cell group procedure attempt is unsuccessful. Further, the method can comprise facilitating, by the system, a second secondary cell group procedure attempt based on expiration of a delay timer and based on a determination that a retry attempt threshold level is not exceeded.
H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
An example method performed by a processing system includes obtaining a light detecting and ranging point cloud of a building, where the point cloud includes a plurality of points, and where each point is associated with a set of (x,y,z) coordinates. A first point of the plurality of points is assigned to a subset of the plurality of points that is associated with the building, where the subset includes points whose (x,y) coordinates fall within a footprint of the building. The first point is grouped into a first cluster according to at least one of: a (z) coordinate of the first point and a gradient to which the first point belongs. A first prism formed by the first cluster is constructed. A model of the building is stored as a plurality of connected prisms, where the plurality of connected prisms includes the first prism.
G01S 17/42 - Mesure simultanée de la distance et d'autres coordonnées
G01S 17/89 - Systèmes lidar, spécialement adaptés pour des applications spécifiques pour la cartographie ou l'imagerie
G06V 10/762 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant le regroupement, p. ex. de visages similaires sur les réseaux sociaux
Aspects of the subject disclosure may include, for example, obtaining and aggregating first image content of an equipment site resulting in first aggregated image content, and providing the first aggregated image content to communication devices that render it on a respective display. Further embodiments include identifying first equipment from first user-generated input, and adjusting the first aggregated image content with a first equipment image resulting in second aggregated image content. Additional embodiments include identifying second equipment from second user-generated input, and adjusting the second aggregated image content with a second equipment image resulting in third aggregated image content. Also, embodiments include determining that installation of the second equipment does not satisfy an installation threshold in response to analyzing the third aggregated image content, and providing a notification to the communication devices indicating the installation of the second equipment does not satisfy the installation threshold. Other embodiments are disclosed.
G06V 10/22 - Prétraitement de l’image par la sélection d’une région spécifique contenant ou référençant une formeLocalisation ou traitement de régions spécifiques visant à guider la détection ou la reconnaissance
G06V 20/00 - ScènesÉléments spécifiques à la scène
60.
SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTION
A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.
METHODS, SYSTEMS, AND DEVICES FOR GENERATING A MULTI-USER (MU) MULTIPLE-INPUT-MULTIPLE-OUTPUT (MIMO) GROUP BASED ON BEAM IDENTIFIERS OF COMMUNICATION DEVICES
Aspects of the subject disclosure may include, for example, obtaining a first beam identifier associated with a first communication device, obtaining a second beam identifier associated with a second communication device, and generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including the first communication device and the second communication device based on the first beam identifier and the second beam identifier. Other embodiments are disclosed.
SYSTEMS AND METHODS FOR DETECTING NON-TERRESTRIAL CELLS AND MANAGING PHYSICAL CELL IDENTITY COLLISION AND NEIGHBORING LIST INTEGRITY IN A HETEROGENEOUS TERRESTRIAL AND SATELLITE WIRELESS COMMUNICATION NETWORKS
Aspects of the subject disclosure may include, for example, a method including receiving first neighbor cell information from a first user equipment (UE) operating in a first terrestrial service cell, where the first neighbor cell information includes a first physical cell identification (PCI) of a first neighbor cell and a cell type indicator detected by the first user equipment. The method further includes generating a database that cross-references the first PCI, the cell type indicator and a location of the first UE and analyzing a correlation among the first PCI, the cell type indicator and the location of the first UE to identify anomalies indicative of a non-terrestrial neighbor cell. No handover or neighbor list updates may take place for the non-terrestrial neighbor cell. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, detecting data traffic from a wireless device located in a customer premise, determining from characteristics of the data traffic whether to route the data traffic to a public network external to the customer premise or route the data traffic to a local network in the customer premise, responsive to determining to route the data traffic to the local network in the customer premise, performing a measurement on the data traffic, and detecting from the measurement that the data traffic requires mitigation action. Other embodiments are disclosed.
H04L 41/5067 - Mesures de la qualité du service [QoS] centrées sur le client
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
A processing system may identify a plurality of message contents within a plurality of reported messages, where each is reported as an unwanted message, determine, for each message content, a respective count comprising a number of occurrences the message content within the plurality of reported messages, identify a set of message contents within the plurality of message contents for which associated counts of the plurality of counts exceeds a first threshold, identify a source phone number that is a source of a first set of messages within the plurality of reported messages containing one or more message contents of the set of message contents, and where a number of reporting entities associated with the first set of messages exceeds at least a second threshold, and perform at least one remedial action in a communication network in response to the identifying of the source phone number.
H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p. ex. messagerie instantanée [IM]
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p. ex. des poussées de notifications des messages reçus
65.
DYNAMIC CAPACITY SCALING FOR WHITEBOX CORE NETWORKS
Devices, computer-readable media and methods are disclosed for dynamic capacity scaling for whitebox core networks. In one example, a method includes monitoring network traffic traversing a whitebox core network of a communications service provider, detecting a level of network traffic on a first link in the whitebox core network is greater than a threshold level of network traffic, and re-routing, in response to the detecting, at least one tunnel in the whitebox core network from the first link to a second link in the whitebox core network.
Aspects of the subject disclosure may include, for example, generating a multi-user (MU) multiple-input-multiple-output (MIMO) group including a first group of communication devices. The MU-MIMO group is associated with a base station. Further embodiments can include determining a first group data streams associated with the MU-MIMO group that is transmitted from the base station to the first group of communication devices, and determining a wireless signal associated with each data stream of the first group of data streams resulting in a first group wireless signals. Additional embodiments can include determining a power associated with each wireless signal of the first group of wireless signals is less than a power threshold resulting in a first determination, and increasing the power associated with each wireless signal of the first group of wireless signals based on the first determination resulting in a first group of amplified wireless signals. Other embodiments are disclosed.
H04W 52/34 - Gestion du TPC, c.-à-d. partage de la quantité limitée de puissance entre les utilisateurs ou les canaux ou encore les types de données, p. ex. charge des cellules
H04W 52/42 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué dans des situations particulières dans des systèmes à diversité de temps, d'espace, de fréquence ou de polarisation
67.
SYSTEM AND METHOD FOR ASSOCIATING WI-FI WITH SPECIFIC SERVICES
Aspects of the subject disclosure may include, for example, a mobile device, with a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including: initializing a wireless fidelity (Wi-Fi) radio; checking whether a Wi-Fi connection with a Wi-Fi access point is available; establishing a secure session with a border gateway via the Wi-Fi connection responsive to the checking; and facilitating a user of the mobile device with a switch function for control of user sessions, wherein the switch function does not affect the secure session or the Wi-Fi radio. Other embodiments are disclosed.
In one example, the present disclosure describes a device, computer-readable medium, and method for implementing programmable security specifications in home routers. For instance, in one example, a method performed by a processing system including at least one processor includes monitoring network traffic flowing into and out of a home network that is connected to a core network via a gateway device, constructing a model of network traffic flowing into and out of the home network, based on the monitoring, detecting an anomaly in the model of the network traffic, generating a rule based on the anomaly, where the rule specifies an action to be taken when a match condition related to the anomaly is detected, and deploying the rule on the gateway device.
Aspects of the subject disclosure may include, for example, obtaining for a first path carrying first network traffic a corresponding first alternate path; obtaining for a second path carrying second network traffic a corresponding second alternate path, at least a first portion of the first alternate path being the same as at least a second portion of the second alternate path; responsive to a first detected failure on the first path, causing communication of first re-directed network traffic via the first alternate path instead of via the first path; responsive to a second detected failure on the second path, detecting whether total traffic, including the first re-directed network traffic, on the first portion of the first alternate path meets a threshold; responsive to the detected meeting of the threshold, obtaining for the second path a corresponding back-up alternate path; and causing communication of second re-directed network traffic via the back-up alternative path instead of via the second path. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a reference data set comprising a plurality of reference data records, wherein the reference data set is associated with a cloud infrastructure, and wherein each of the reference data records comprises a reference network name associated with one of a plurality of reference networks that is configured within the cloud infrastructure and a corresponding reference Virtual Local Area Network (VLAN) identifier for the one of the plurality of reference networks that is configured within the cloud infrastructure; obtaining an input data set comprising a plurality of input data records, wherein the input data set is associated with the cloud infrastructure, and wherein each of the input data records comprises a network name associated with one of a plurality of networks that is being considered for configuration within the cloud infrastructure and a corresponding VLAN identifier for the one of the plurality of networks that is being considered for configuration within the cloud infrastructure; analyzing the reference data records and the input data records in order to identify a set of one or more errors; and tagging one or more records in the input data set with each corresponding occurrence of each error. Other embodiments are disclosed.
Aspects of detecting and mitigating denial of service (“DoS”) attacks over home gateway network address translation (“NAT”) are disclosed herein. According to one aspect disclosed herein, a home gateway system can detect that a NAT table is overpopulated. In response to detecting that the NAT table is overpopulated, the home gateway system can determine a mitigation action to be performed. The home gateway system can then perform the mitigation action in an attempt to mitigate an effect of the NAT table overpopulation.
A method and system for centralized control of user devices is disclosed. The method for centralized control of user devices via universal IP services registrar includes receiving a request to register a user device for a plurality of services, registering the user device for the plurality of services by creating a user settings profile for the user for each of the plurality of services, receiving data from the plurality of registered services, and transmitting received data to the user device in accordance with the user profile.
H04L 67/025 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
Aspects of the subject disclosure may include, for example, performing a first analysis in respect of a first carrier, the first carrier operative in accordance with a frequency included in a frequency range from 24.25 GHz to 52.60 GHz, inclusive, determining, based on the performing of the first analysis, that a first user equipment (UE) is to be paired with at least one other UE as part of a multi-user multiple-input multiple-output (MU-MIMO) topology in the first carrier, resulting in a first determination, and subjecting the first UE to the MU-MIMO in the first carrier in accordance with the first determination. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining training from wireless devices, where the wireless devices collect the training data that indicates first operational parameters and operational errors at the wireless devices; analyzing the training data to generate pre-failure thresholds according to the first operational parameters and the operational errors; receiving operational data from a particular wireless device, where the particular wireless device collects the operational data that indicates second operational parameters at the particular wireless device; analyzing the operational data according to the pre-failure thresholds resulting in a pre-failure analysis; and providing an alarm when the pre-failure analysis indicates that one or more of the second operational parameters violates one or more of the pre-failure thresholds, where the alarm is generated prior to a failure of the particular wireless devices that is predictable based on the second operational parameters. Other embodiments are disclosed.
Systems, methods, and apparatuses provide a scalable framework for analyzing queuing and transient congestion in network switches. The system reports which flows contributed to the queue buildup and enables direct per-packet action in the data plane to prevent transient congestion. The system may be configured to analyze queuing in legacy network switches.
Aspects of the subject disclosure may include, for example, accessing a heuristic rule associated with network data that is collectible by end user devices; determining a dynamic variable according to the heuristic rule; converting the dynamic variable to a value; adjusting, according to the value, a number of the end user devices that are to transmit the network data to a network device. Other embodiments are disclosed.
In a 5G network, control unit (CU) can be connected to a radio access network controller (RC). In response to receiving measurement data from the CU, the RC can process the measurement data to determine polices and procedures related to radio resource management, and/or radio resource control, which can then be utilized to manage mobility, dual-connectivity, carrier aggregation, and/or integrated access and backhaul topology formation and routing. The measurement data provided by the CU can be provided directly to the RC without processing of the measurement data by the CU.
A processing system including at least one processor may capture a video of a preparation area for a consumable item, may identify at least one item in the video, the at least one item comprising at least one of: at least one ingredient of the consumable item, or at least one tool for preparing the consumable item, and may identify annotation content for the at least one item. The processing system may then modify the video to generate a modified video that includes a visual marker associated with the annotation content and present the modified video via a device associated with a user to be served the consumable item.
G06V 20/20 - ScènesÉléments spécifiques à la scène dans les scènes de réalité augmentée
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 40/169 - Annotation, p. ex. données de commentaires ou notes de bas de page
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
Aspects of the subject disclosure may include, for example, identifying a first position of a first user, identifying a first context associated with the first user, determining, based on the first position and the first context, at least a first action that is recommended to be taken, and providing at least one output that provides an indication of the at least a first action. Other embodiments are disclosed.
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/23 - Signalisation de servicesSignalisation de données auxiliaires, c.-à-d. transmission de données par un canal non destiné au trafic pour publicité sur mobiles
The disclosed technology relates to detection of attention exhibited by a second user to a first user's avatar in a virtual reality environment. A first user's avatar activity and the second user's activity are evaluated to determine the second user's (e.g., via another avatar) attention level directed towards first user's avatar. Information can be sent to notify the first user that the second user's attention level has satisfied attention-level criterion data. For example, if the second user is viewing and/or is within audio range of the first user for too long of a time or too frequently, then the first user can be notified and/or other action taken. Remedial action is available for negative attention, such blocking the second user from experiencing the first user in the environment. Detection of attention for positive purposes is available, such as to reward an influencer whose avatar is receiving significant attention from followers.
G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p. ex. d’êtres humains, d’animaux ou d’êtres virtuels
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p. ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
81.
SYSTEM AND METHOD FOR CREATING AND USING FLOATING VIRTUAL MACHINES
A system includes a plurality of interconnected hardware platforms, wherein the plurality of hardware platforms are configured to run a software defined network, a plurality of virtual machines configured to be instantiated on the software defined network, and a plurality of floating management layers, each of the floating management layers associated with one of the plurality of virtual machines. Each floating management layer includes coupling the associated virtual machine to one of the plurality of hardware platforms, monitoring performance of the associated virtual machine, detecting a trigger, based on the trigger, determining whether to move the virtual machine to a second of the plurality of hardware platforms, and moving the virtual machine.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Aspects of the subject disclosure may include, for example, a network communication device that includes a backhaul link circuit and a Wi-Fi access point to provide broadband services to a service provider's broadband customers and to provide mobility services to the service provider's mobility customers. This network communication device is installed outside of a dwelling unit in order to simplify the installation procedure and avoid property disruption. An extender device registered to a broadband customer user account may associate to the access point for seamless service. User equipment (UE) of the service provider's mobility customers may associate to the access point to receive Wi-Fi roaming services. Other embodiments are disclosed.
Methods, systems, and apparatuses, for real-time operation control, among other things. There may be adjustments to a first device in which a first network service operates. The adjustment to the device may include moving a second network service of the first device to a second device. The first network service and the second network service may be associated with virtual machines.
H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
H04L 43/062 - Génération de rapports liés au trafic du réseau
H04L 43/0805 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité
Aspects of the subject disclosure may include, for example, determining, by a wireless router or a wireless access point (WAP) associated with a fixed network connection, that a network condition is satisfied, based on the determining that the network condition is satisfied, detecting for available networks operating in licensed spectrum and available networks operating in unlicensed spectrum, responsive to the detecting, identifying a first available network operating in licensed spectrum and a second available network operating in unlicensed spectrum, and aggregating, in one or more link aggregation groups, a first connection established with the first available network and a second connection established with the second available network, thereby augmenting a network capacity of the fixed network connection. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining a Reference Signal Received Power (RSRP) and a Signal to Noise Ratio (SNR) for a plurality of carriers at a user equipment (UE) device, the plurality of carriers transmitted by a source group of cells including a source primary cell (PCell) and one or more source secondary cells (SCells) associated with the source PCell, and initiating a handover of communication with the UE device from the source group of cells to a target group of cells, wherein the target group of cells includes a target PCell and one or more target SCells, wherein the initiating the handover is responsive to the RSRP exceeding a predetermined RSRP threshold and the SNR exceeding a predetermined SNR threshold. Other embodiments are disclosed.
The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.
Aspects of the subject disclosure may include, for example, a device in which a processing system of a remote entry system selects a first circuit from a plurality of circuits of a key remote from the device; wirelessly transmits a first challenge signal to the key, the first challenge signal specifying the first circuit; and wirelessly receives a first response signal from the key, the first response signal having a first response signal power level and a first response signal delay with respect to the first challenge signal. The processing system analyzes the first response signal by comparing the first response signal power level and the first response signal delay respectively with a predetermined first signal power and predetermined first time delay associated with the first circuit; and, in accordance with the comparing, determines whether to enable the entry system. Other embodiments are disclosed.
H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
88.
DETECTION AND NOTIFICATION OF ELECTRONIC INFLUENCE
The disclosed technology is generally directed towards monitoring electronic communications to detect content in a communication that is attempting to influence the user in some way. A user can specify influential intent preference data, such as which electronic communications services/applications to monitor for such influential intent content, and the types of the influential intent to monitor for, e.g., political influence types, advertisement influence types, and so on. A user also can specify remedial or other actions to take upon detection, e.g., block such content, alert on detecting such content and so on. An electronic influence manager server and/or application program can perform the monitoring and/or take the actions. Also described is reporting on the communications with influential intent, user actions with respect thereto. Reputation data can also be collected and used with respect to sources of communications with influential intent.
H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p. ex. des poussées de notifications des messages reçus
89.
APPARATUSES AND METHODS FOR FACILITATING AN INDEPENDENT SCELL TOPOLOGY IN RESPECT OF COMMUNICATIONS AND SIGNALING
Aspects of the subject disclosure may include, for example, pairing a first user equipment (UE) and a second UE as part of a multi-user multiple-input multiple-output (MU-MIMO) topology in a first cell, resulting in a first pairing, and pairing the first UE with a third UE as part of a MU-MIMO topology in a second cell, resulting in a second pairing, wherein the second pairing is independent of the first pairing and the second cell is different from the first cell. Other embodiments are disclosed.
Local weather information such as a nationwide emergency network for first responders can enable first responders to communicate nationally with a single network, linking to suppliers, utilities, and weather information. The system disclosed herein can provide data to first responders and data from first responders can provide insights into local conditions that can be utilized by edge data centers. Adding first responder data can improve the processing speed of moving of edge-based applications out of threatened data centers. Because this movement can also have an impact on low latency applications, identifying the closest edge sites without an impact can keep the applications operating.
H04W 4/90 - Services pour gérer les situations d’urgence ou dangereuses, p. ex. systèmes d’alerte aux séismes et aux tsunamis
G08B 25/00 - Systèmes d'alarme dans lesquels l'emplacement du lieu où existe la condition déclenchant l'alarme est signalé à une station centrale, p. ex. systèmes télégraphiques d'incendie ou de police
H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
H04W 40/02 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court
H04W 40/20 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la position ou de la localisation géographique
H04W 72/566 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de priorité de l’information, de la source d’information ou du destinataire
The disclosed technology is directed towards creating a media content presentation for playback, based on user specified input criteria and playback instructions. A user specifies input criteria related to media source data. The media source data is accessed, and further based on the input criterion, matching segments (e.g., scenes and audio) are determined from metadata information that describes the segments; the media playback content is generated from the matching segments. A user may also specify criteria/instructions that describe how to play the matching segments, such as in linear order, or based on relative relevance such as scene impactfulness. A matching scene can be repeated, and/or augmented with annotation data. For any matching scene or transition between two matching scenes, specified playback speed and audio volume can be specified and applied. As part of generation, the media content presentation can be fit to a specified time constraint.
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de servicesInterface pour utilisateurs finaux pour l'interaction avec le contenu, p. ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
G06V 20/40 - ScènesÉléments spécifiques à la scène dans le contenu vidéo
H04N 21/485 - Interface pour utilisateurs finaux pour la configuration du client
92.
Controlling Access To Datasets Described In A Cryptographically Signed Record
In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Facilitating web page spectroscopy in a communications network is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise receiving first data that describes a first communication packet flow and second data that describes a second communication packet flow. The operations can also comprise training a model based on the first data and the second data, as a result of which the model is trained to detect respective behaviors represented by the first data and the second. Further, the operations can comprise extracting a common parameter from third data that describes a third communication packet flow and fourth data that describes a fourth communication packet flow based on the model.
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
A processing system of a carrier transport vehicle including at least one processor may obtain a notification of a luggage item to be placed in a stowage bin of the carrier transport vehicle, the notification including an identifier of the luggage item, detect, via the identifier of the luggage item, that the luggage item is proximate to the stowage bin, where the identifier of the luggage item is obtained via a wireless signal from the luggage item, and present at least one visual indicator associated with the stowage bin, in response to the detecting that the luggage item is proximate to the stowage bin.
H04B 5/77 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive spécialement adaptés à des fins spécifiques pour l'interrogation
B64D 11/00 - Arrangements pour passagers ou équipageInstallations de postes de pilotage non prévues ailleurs
G08B 5/36 - Systèmes de signalisation optique, p. ex. systèmes d'appel de personnes, indication à distance de l'occupation de sièges utilisant une transmission électriqueSystèmes de signalisation optique, p. ex. systèmes d'appel de personnes, indication à distance de l'occupation de sièges utilisant une transmission électromécanique utilisant des sources de lumière visible
H04B 5/72 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive spécialement adaptés à des fins spécifiques pour la communication locale à l'intérieur d’un dispositif
95.
NETWORK OPTIMIZATION FOR HYBRID QUANTUM-CLASSICAL NETWORKS
A method performed by a processing system including at least one processor includes calculating a quantum network relative performance metric for a current configuration of a hybrid quantum-classical telecommunications network, identifying a proposed new configuration for the hybrid quantum-classical telecommunications network, calculating the quantum network relative performance metric for the proposed new configuration of the hybrid quantum-classical telecommunications network, and implementing the proposed new configuration in the hybrid quantum-classical telecommunications network when the quantum network relative performance metric for the proposed new the hybrid quantum-classical telecommunications network is greater than the quantum network relative performance metric for the current configuration of the hybrid quantum-classical telecommunications network.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
Aspects of the subject disclosure may include, for example, a radio device that has first and second subscriber identity modules; radio resources; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a first communications network connection associated with the first subscriber identity module; establishing a second communications network connection associated with the second subscriber identity module; determining a communications activity on the first communications network connection; pausing or suspending activities of the second communications network connection; and blocking use of the radio resources by the second communications network connection. Other embodiments are disclosed.
H04W 76/15 - Établissement de connexions à liens multiples sans fil
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 48/02 - Restriction d'accès effectuée dans des conditions spécifiques
Aspects of the subject disclosure may include, for example, a machine-readable medium with executable instructions that facilitate performance of operations by a processor including receiving a registration for a trajectory of a satellite; estimating a zone of occupancy at a future time for the satellite; determining an interference of the satellite from the zone of occupancy at the future time; determining a deconfliction for minimizing or eliminating the interference; and sending the deconfliction to a controller of the satellite. Other embodiments are disclosed.
H04B 17/391 - Modélisation du canal de propagation
H04B 17/27 - SurveillanceTests de récepteurs pour localiser ou positionner l’émetteur
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
98.
TRUSTED SYSTEM FOR PRIVACY-PRESERVING VALIDATION OF INDIVIDUALS
Aspects of the subject disclosure may include, for example, receiving, from a computing device, a validation request for validating an individual associated with a mobile device equipped with an authentication app communicatively coupled with an authentication system, obtaining request data from a user validation system, enabling, using the request data, the computing device to communicate with the user validation system to facilitate the validation, wherein the validation involves the user validation system triggering the authentication system to provide access information to the computing device, the authentication system authenticating the individual/mobile device, the authentication system providing, to the user validation system, identification information of the individual based on the authenticating, and the user validation system determining a validation result based on data relating to the identification information. Aspects also include obtaining the validation result from the user validation system and causing the validation result to be presented. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: receiving a path of a threat vehicle; calculating a closest approach distance based on a current position of a drone and the path of the threat vehicle; determining that the closest approach distance is within a threshold; and sending a command to the drone to descend to a safe altitude. Other embodiments are disclosed.
G05D 1/04 - Commande de l'altitude ou de la profondeur
G01S 13/58 - Systèmes de détermination de la vitesse ou de la trajectoireSystèmes de détermination du sens d'un mouvement
G01S 13/933 - Radar ou systèmes analogues, spécialement adaptés pour des applications spécifiques pour prévenir les collisions d'aéronefs ou d'engins spatiaux
100.
Systems and methods for sharing information between/among users
Aspects of the subject disclosure may include, for example: receiving, from a first mobile communication device of a first user, first information associated with a computer-readable indicia that has been scanned by the first mobile communication device, wherein the computer-readable indicia had been displayed by a second mobile communication device of a second user at a time of being scanned by the first mobile communication device; responsive to receiving of the first information, obtaining from one or more first databases first characterizing data that is descriptive of one or more characteristics of the second user; and sending to the first mobile communication device the first characterizing data, wherein the sending facilitates a presentation by the first mobile communication device of the one or more characteristics of the second user. Other embodiments are disclosed.
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme