A method may include identifying network slices associated with transmitting data in a network and determining, by a routing device, that a failure associated with a path used to transmit data has occurred. The method may also include determining, by the routing device, whether the failure is associated with one of the plurality of network slices. The method may further include prioritizing, by the routing device, a route selection process in response to determining that the failure is associated with one of the plurality of network slices.
One or more computing devices, systems, and/or methods are provided. In an example, a method comprises receiving, by a device, attribute data for a region served by a telecommunications service. A cluster label is determined by the device for the region based on the attribute data. A first region persona is determined by the device for the region using a decision tree classifier model based on the cluster label and the attribute data. Recommended service parameters are implemented for the telecommunications service in the region based on the first region persona.
A system, a network, an end-to-end network, a method, a non-transitory computer-readable storage medium are described of an intelligent end-to-end architecture for tiers of application services. The system may include a radio access network (RAN) that provides radio access to a core network and mobile edge application service layer networks located at different mobile edges including a far edge, a mid edge, and an edge, in which the RAN includes a first centralized RAN control plane device at the far edge that provides a RAN control plane service for first traffic relating to the far edge and the mid edge but not the edge; and the core network includes a first centralized core network control plane device at the far edge that provides a core network control plane service for the first traffic relating to the far edge and the mid edge but not the edge.
A network device may receive a request for authentication data, for a UE attempting to register with a network, and an indication that a SUCI utilized by the UE is unencrypted, and may request, from a data store, the authentication data for the UE. The network device may provide, to the data store, a notification instructing the data store to push a UE parameters update (UPU) once a registration process is complete for the UE, and may receive the authentication data from the data store. The network device may complete the registration process for the UE based on the authentication data, and may receive the UPU from the data store based on the registration process being completed. The network device may cause the UE to detach from the network after utilizing the UPU, and may cause the UE to reconnect to the network with an encrypted SUCI.
One or more computing devices, systems, and/or methods are provided. In an example, a method comprises receiving, by a device, attribute data for a customer, determining, by the device, a cluster label for the customer based on the attribute data, determining, by the device, a first customer persona for the customer using a decision tree classifier model based on the cluster label and the attribute data, and providing, by the device, targeted content based on the first customer persona. Embodiments described herein also include a system comprising a processor configured to execute instructions to facilitate performance of operations comprising receiving attribute data for a customer, determining a cluster label for the customer based on the attribute data, determining a first customer persona for the customer using a decision tree classifier model based on the cluster label and the attribute data, and providing targeted content based on first customer persona.
A device may receive a structured dataset, a feature of the structured dataset, and a protected categorical dimension of the structured dataset, and may stratify the structured dataset into subsets by filtering the structured dataset based on the protected categorical dimension. The device may apply a quantile transform to data of the subsets, associated with the feature, to generate transformed subsets, and may combine the transformed subsets to generate a final dataset. The device may generate a training dataset for a machine learning model based on the final dataset, and may train the machine learning model with the training dataset to generate a trained machine learning model.
A device may include a processor configured to determine a plurality of requirements for a Multi-Access Edge Computing (MEC) application requested by a customer; select a solution blueprint for the MEC application, from a set of solution blueprints, based on the determined plurality of requirements, wherein the solution blueprint includes an application deployment blueprint and a connectivity blueprint; and receive approval of the selected solution blueprint from the customer. The processor may be further configured to configure at least one transport network device based on the connectivity blueprint, in response to receiving the approval of the selected solution blueprint from the customer; and deploy at least one component of the MEC application on a MEC device in a MEC network based on the application deployment blueprint, in response to receiving the approval of the selected solution blueprint from the customer.
H04L 41/5041 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p.ex. la mise en œuvre du service par configuration automatique des composants réseau
H04W 4/50 - Fourniture de services ou reconfiguration de services
H04W 40/24 - Gestion d'informations sur la connectabilité, p.ex. exploration de connectabilité ou mise à jour de connectabilité
8.
SYSTEMS AND METHODS FOR DETERMINING RADIO ACCESS NETWORK ANTENNA POOR PERFORMANCE SUBSCRIBER IMPACT
A device may receive antenna alert data associated with antennas of a plurality of base stations of a network, and may process the antenna alert data, with a correlation model, to generate a correlation heatmap matrix. The device may utilize a change point detection model to process the antenna alert data, associated with the correlation heatmap matrix, to determine change point metrics, and may calculate scores for the antenna alert data associated with the correlation heatmap matrix and the change point metrics. The device may perform one or more corrective actions based on the scores.
H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p.ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
9.
SYSTEMS AND METHODS FOR DISTRIBUTED LEDGER ARCHIVING AND SIZE MANAGEMENT
A system described herein may generate a group of distributed ledgers that are each associated with a respective set of ledger parameters, receive a data item that is associated with a set of attributes, identify a distributed ledger that is associated with ledger parameters that meet the set of attributes, and record the data item to the distributed ledger that is associated with ledger parameters that meet the particular set of attributes. The system may determine that a set of archival parameters, associated with a particular distributed ledger, have been met; and may remove the particular distributed ledger from the group of distributed ledgers based on determining that the set of archival parameters, associated with the particular distributed ledger, have been met. Nodes that maintain the group of distributed ledgers may remove ledger data, associated with the removed distributed ledger, from one or more storage resources associated with the nodes.
A radio access network (RAN) may comprise at least one transmission-reception point (TRP) configured to provide wireless connections to one or more User Equipment devices (UEs) in an area. The area is not predefined by a cell boundary. The RAN may be configured to: broadcast Scheduling and Synchronization Relation (SSR) information to a UE; and establish with the UE a transmission mode for the TRP.
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
A method, a device, and a non-transitory storage medium are described in which beam configuration management service is provided. A network device of a wireless access network provides the service that includes identifying redundant configurations across carriers associated with a cell group, and links the common beam configurations to these carriers. The service also includes identifying any difference in beam configurations relative to the common beam configurations for a carrier. The service may transmit this beam configuration information in a control plane message to an end device. The end device may use the beam configuration information.
H04W 16/28 - Structures des cellules utilisant l'orientation du faisceau
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04W 76/10 - Gestion de la connexion Établissement de la connexion
H04W 72/044 - Affectation de ressources sans fil sur la base du type de ressources affectées
H04W 72/23 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c. à d. en direction du terminal
12.
SYSTEMS AND METHODS FOR CLOSED LOOP QOS MANAGEMENT
Systems and methods described herein allow mobile network operators to provide an adaptive quality of service (QoS) approach for application providers. A network device in a core network receives a QoS monitoring report based on QoS monitoring by an access station. The QoS monitoring report includes data for QoS parameters for network services in a default QoS flow supporting a protocol data unit (PDU) session. Based on the QoS monitoring report, the network device determines if the default QoS flow supports a required service level for the PDU session. When the network device determines that the default QoS flow does not support the required service level for the PDU session, the network device automatically activates a dedicated QoS flow to support the PDU session with the required service level.
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
H04L 43/062 - Génération de rapports liés au trafic du réseau
H04L 45/302 - Détermination de la route basée sur la qualité de service [QoS] demandée
H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
Systems and methods described herein enable private telecommunications network subscribers that do not have a distinctive Public Land Mobile Network (PLMN) ID to access visited PLMN services. A device in a visited wireless network receives an attach request for a user equipment (UE) device; detects, based on the attach request, that the UE device is subscribed to a private network; provides, to a roaming identity register (RIR), a roaming authorization request for the UE device; receives a roaming authorization response that includes a network pointer to the private network; and applies, based on the roaming authorization response, a roaming policy for the UE device.
H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
14.
SYSTEMS AND METHODS FOR VIDEOCONFERENCING WITH SPATIAL AUDIO
A system may provide for the generation of spatial audio for audiovisual conferences, video conferences, etc. (referred to herein simply as “conferences”). Spatial audio may include audio encoding and/or decoding techniques in which a sound source may be specified at a location, such as on a two-dimensional plane and/or within a three-dimensional field, and/or in which a direction or target for a given sound source may be specified. A conference participant's position within a conference user interface (“UI”) may be set as the source of sound associated with the conference participant, such that different conference participants may be associated with different sound source positions within the conference UI.
A device may include a processor configured to receive a report from a fixed wireless access device indicating that no anchoring relationship exists between a Fourth Generation (4G) base station and a Fifth Generation (5G) base station to which the fixed wireless access device is attempting to connect. The device may be further configured to instruct a network management system to create the anchoring relationship between the 4G base station and the 5G base station; and update an anchoring relationships database with information relating to the created anchoring relationship, wherein the anchoring relationships database stores information relating to anchoring relationships between base stations in a radio access network.
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may receive traffic data associated with a coverage area and determine that there is network congestion. If there is network congestion, the device may identify a high-consumption user device. The device may perform a corrective action in connection with a load of the high-consumption user device, such as limit a throughput of the high-consumption user device. The device may perform a corrective action based on a policy obtained from a policy and control function.
A system described herein may monitor, via a Central Unit (“CU”) of a radio access network (“RAN”), radio frequency (“RF”) metrics associated with a User Equipment (“UE”). The monitored RF metrics may be based on communications between the UE and a Distributed Unit (“DU”) that is communicatively coupled to the CU. The system may identify a Multi-Access/Mobile Edge Computing (“MEC”) device that is communicatively coupled to the DU and that provides one or more services to the UE via the DU. The system may resource allocation parameters for the MEC based on the RF metrics between the UE and the DU. The system may instruct the MEC to implement the set of resource allocation parameters. The MEC may modify an allocation of MEC resources, allocated for providing the one or more services to the UE, based on the determined set of resource allocation parameters.
In some implementations, a server device may receive a request to validate a connectivity between the server device and a device associated with a cellular site. The server device may generate an ISO image that includes site-specific configuration information for the cellular site. The server device may utilize the ISO image to configure an operating system of the device. The server device may test the connectivity between the server device and the device based on configuring the operating system. The server device may perform one or more actions based on testing the connectivity between the server device and the device.
A device comprises a memory and one or more processors. The memory stores a User Equipment Route Selection Policy (URSP). The one or more processors are configured to: receive a packet from a user device; determine a traffic descriptor associated with the packet; apply a URSP to the traffic descriptor to identify a network slice, within a network, to which the packet is to be forwarded; and forward the packet to the network slice over a wireless connection from the device to the network.
A method, a device, and a non-transitory storage medium are described in which a test case generation service is provided. The service may include receiving and validating requirement text associated with a prospective test case and/or test script. The service may invoke a remedial procedure when the requirement text is not validated. The service may include selecting multiple types of classification models based on a model profile. The service may include aggregating probability values associated with classifications for sentences, and approving such classification that satisfy a threshold value. The service may further include generating test cases and/or test scripts. The service may generate a schedule for test cases and/or test scripts based on one or multiple criteria values generated by one or multiple predictive models.
A device includes a memory to store a User Equipment Route Selection Policy (URSP) and one or more processors. The one or more processors are configured to: obtain network traffic comprising first network traffic and second network traffic, wherein the second network traffic originates from one or more user equipment devices (UEs); apply the URSP to the network traffic; and in response to applying the URSP, forward protocol data units (PDUs) of the network traffic to either a first tunnel to a first network slice or a second tunnel to a second network slice. The first tunnel and the second tunnel are established from the device to the first network slice and the second network slice over communication paths that include at least a wireless communication link from the device to a radio access network (RAN).
A device may receive application information of an application to be deployed in a cloud computing environment. The application information may include requirement information including information defining a compute requirement of the application, a storage requirement of the application, and a network connectivity requirement of the application, and first capability information identifying requested capabilities of the first set of devices. The device may receive second capability information identifying actual capabilities of the second set of devices. The device may compare the first capability information and the second capability information to determine a measure of similarity between the first capability information and the second capability information. The device may generate deployment information for deploying the application on a device, of the second set of devices, based on the measure of similarity.
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p.ex. la mémoire disponible ou la charge de travail
H04L 47/78 - Architectures d'allocation des ressources
H04L 47/762 - Contrôle d'admission; Allocation des ressources en utilisant l'allocation dynamique des ressources, p.ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par le réseau
A device may receive a video and corresponding camera information associated with a camera that captured the video, and may select an object in the video and a wire model for the object. The device may adjust an orientation, location, or size of the wire model to align the wire model on the object in a frame of the video, based on the corresponding camera information and to generate an adjusted wire model. The device may identify the object in another frame of the video, and may align the adjusted wire model on the object in the other frame. The device may interpolate the adjusted wire model for the object for intermediate frames of the video between the first and other frames, and may generate three-dimensional annotations for the video based on the adjusted wire models. The device may train a machine learning model based on the three-dimensional annotations.
G06V 10/776 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source Évaluation des performances
G06V 10/24 - Alignement, centrage, détection de l’orientation ou correction de l’image
G06V 10/26 - Segmentation de formes dans le champ d’image; Découpage ou fusion d’éléments d’image visant à établir la région de motif, p.ex. techniques de regroupement; Détection d’occlusion
G06T 7/80 - Analyse des images capturées pour déterminer les paramètres de caméra intrinsèques ou extrinsèques, c. à d. étalonnage de caméra
24.
SYSTEMS AND METHODS FOR DYNAMIC MAXIMUM TRANSMISSION UNIT ADJUSTMENT IN A WIRELESS NETWORK
A system described herein may identify a requested communication session between a UE and a network, such as a core of a wireless network. The system may identify Quality of Service (“QoS”) information associated with the UE and/or the requested communication session. The QoS information may include or may be based on a network slice identifier, a QoS value, a Service Level Agreement (“SLA”), one or more models associated with UE attributes, or other suitable information. The system may determine a maximum transmission unit (“MTU”) configuration for the UE based on the identified QoS information and/or models that associate UE attributes to MTU configurations. The system may implement the determined MTU configuration, including providing the MTU configuration to one or more gateways or endpoints of the network and/or to the UE. The UE and the network may accordingly use the MTU configuration when communicating via the requested communication session.
A device receives a message associated with creating a session for a User Equipment device (UE), the messaging identifying a Quality of Service (QoS) for the UE. The device adjusts discontinuous reception (DRx) parameters for the UE based on the identified QoS for the UE and instructs the UE to increase or decrease a DRx wait time based on the adjusted DRx parameters.
One or more computing devices, systems, and/or methods for application deployment, monitoring, and management within a container hosting environment are provided. A service collector acquires operational statistics of an application hosted within a container managed by a pod of the container hosting environment. A rule execution engine executes a set of rules to process the operational statistics. In response to the set of rules identifying suboptimal operation of the application, a remedial action is created to address the suboptimal operation of the application. The remedial action is either automatically executed to address the suboptimal operation or is used to generate a recommendation for how to address the suboptimal operation.
An example method includes receiving a message from a sending service and addressed to a destination service. The message is sent to the destination service using a synchronous message modality responsive to a communication history parameter for the destination service indicating a synchronous message type. The message is sent to the destination service using an asynchronous message modality responsive to the communication history parameter indicating an asynchronous message type. A reply is received from the destination service and the reply is sent to the sending service. The synchronous message modality comprises waiting for a reply to be received from the destination service for a predetermined time interval. The asynchronous message modality comprises storing identification data associated with the message in a correlation data store, receiving the reply from the destination service, and determining whether the reply is associated with the message based on the identification data.
A method, a device, and a non-transitory storage medium are described, which provide a recommendation system with performance management service. The service may include selecting and ranking content that relate to a user query and a problem associated with an application and/or a device. The service may include invoking a remedial procedure based on user feedback data. The service may include similarity and classification models based on successful recommendation records.
H04L 41/5061 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par l’interaction entre les fournisseurs de services et leurs clients réseau, p.ex. la gestion de la relation client
G06F 18/22 - Critères d'appariement, p.ex. mesures de proximité
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
A system described herein may identify Quality of Service (“QoS”) information associated with a User Equipment (“UE”) that is connected to a radio access network (“RAN”) of a wireless network. The QoS information may include or may be based on a network slice identifier, a QoS value, a Service Level Agreement (“SLA”), a model associated with UE attributes, or other suitable information. The system may determine a time division duplex (“TDD”) configuration for the UE based on the identified QoS information and/or models that associate UE attributes to TDD configurations. The system may implement the determined TDD configuration at the RAN. The UE and the RAN may communicate with each other according to the implemented TDD configuration, which may include particular timing information for uplink and downlink communications between the UE and the RAN.
A device may receive time domain PRB data associated with a plurality of base stations of a network, and may transform the time domain PRB data into frequency domain PRB data. The device may identify, based on the frequency domain PRB data, periodic interference patterns associated with the network, and may process periodic data associated with the periodic interference patterns, with a clustering model, to identify clusters of periodic interference patterns. The device may utilize a time offset analysis to link clusters and identify a transient periodic interferer, and may process cluster data associated with the clusters and the transient periodic interferer, and public transportation data, with a machine learning model, to predict a route associated with the transient periodic interferer. The device may perform one or more actions based on the route associated with the transient periodic interferer.
Embodiments may involve periodically scanning, by a room system, a locale of the room system. The room system may be rendering media associated with a meeting of persons at the locale of the room system. Based on the scanning, it may be determined that a person at the locale is not authorized with respect to the meeting. Based on the determining, the room system may be instructed to stop rendering the media and user devices of the respective persons may be instructed to begin rendering the media.
Systems and methods described herein provide life cycle management for physical network function (PNFs) via an orchestrator using PNF proxies. A network device in a service provider network receives a software package for a virtual network function (VNF) serving as PNF proxy for a type of PNF. The software package includes a proxy descriptor and external virtual links (VLs) for the type of PNF. The network device associates, an instance of the PNF proxy with an installed PNF, creates the instance of the PNF proxy as a VNF in a cloud platform, and provides a record of the created instance of the PNF proxy to an active inventory system.
A system described herein may identify a particular value that was wirelessly received by a User Equipment (“UE”) at a first time. The particular value may have been recorded to a blockchain, along with a second time, at which the particular value was outputted by a base station of a wireless network. The particular value may include a randomly generated number. The system may determine a location of the base station from which the particular value was outputted. The location of the UE may be determined based on a delay time associated with the particular value, which may be determined based on a difference between the first and second times. The location of the UE may further be determined (e.g., using triangulation techniques) based on values outputted by other base stations, for which the blockchain includes records indicating times at which such values were outputted by the other base stations.
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p.ex. distribution de données d'exploration utilisant des informations radiodiffusées
A device may receive a video and corresponding sensor information associated with a vehicle, and may extract feature vectors associated with the corresponding sensor information and an appearance and a geometry of another vehicle captured in the video. The device may generate a tensor based on the feature vectors, and may process the tensor, with a convolutional neural network model, to generate a modified tensor. The device may select a decoder model from a plurality of decoder models, and may process the modified tensor, with the decoder model, to generate a caption for the video based on attributes associated with the video. The device may perform one or more actions based on the caption for the video.
G06V 20/58 - Reconnaissance d’objets en mouvement ou d’obstacles, p.ex. véhicules ou piétons; Reconnaissance des objets de la circulation, p.ex. signalisation routière, feux de signalisation ou routes
G06V 10/40 - Extraction de caractéristiques d’images ou de vidéos
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
An illustrative 3D modeling system generates a hair orientation image based on a 2D image depicting a human subject having hair. The hair orientation image includes semantic segmentation data indicating whether image elements of the hair orientation image depict the hair of the human subject or content other than the hair. The hair orientation image further includes hair flow data indicating a flow direction of the hair depicted by various image elements. Based on the hair orientation image, the 3D modeling system generates a 3D model of the hair of the human subject. The 3D modeling system then integrates the 3D model of the hair of the human subject with a 3D model of a body of the human subject. Corresponding methods and systems are also disclosed.
A first network device associated with a network may establish an Internet protocol version 6 Multiprotocol BGP session with a second network device associated with the network. The first network device and second network device are both capable of forwarding both IPv4 and IPv6 packets with only an IPv6 address configured on the interface of both the first network device and second network device. The first network device may exchange Multiprotocol Reachability capability with second network device for corresponding 2-tuple Address Family Identifier/Subsequent Address Family Identifier. The first network device may advertise Internet protocol version 4 network layer reachability information and may advertise Internet protocol version 6 network layer reachability information with IPv6 extended next hop encoding using Internet Assigned Numbering Authority assigned capability code value 5 to second network device.
H04L 61/251 - Traduction d'adresses de protocole Internet [IP] entre versions IP différentes
H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p.ex. des commutateurs d'étiquette multi protocole [MPLS]
H04L 69/325 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche réseau [couche OSI 3], p.ex. X.25
H04L 47/17 - Interaction entre les nœuds intermédiaires, p.ex. nœud après nœud.
H04L 61/5069 - Allocation d'adresse pour la communication de groupe, en multidiffusion ou en diffusion
38.
SYSTEMS AND METHODS FOR TRAINING EVENT PREDICTION MODELS FOR CAMERA-BASED WARNING SYSTEMS
In some implementations, a device may receive image data and sensor data associated with the image data. The image data may depict a series of scenes that are captured over a time period and that are associated with an occurrence of an event. The device may determine a time of interest, within the time period, at which a value of the sensor data satisfies one or more criteria. The device may extract a portion of the image data based on the time of interest. The device may extract, from the portion of the image data, a slice of image data depicting a first set of scenes and a slice of image data depicting a second set of scenes. The device may train, based on the slices of image data, a model to predict a probability of an occurrence of an event.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
Disclosure are techniques for allocating aggregation devices in a lawful intercept system. In an embodiment, a method includes maintaining a list of point of interception aggregation (PAG) functions in a network function repository function (NRF) of a cellular network upon instantiation of the PAG functions; receiving a lawful intercept (LI) request; querying the NRF to determine a respective PAG function; and associating a point of interception (POI) function with the respective PAG function.
Systems and methods described herein enable user-aware and application-aware dynamic slicing for mobile networks. A network device in a provider network receives a dynamic slice request from a client application. The dynamic slice request includes authorization credentials and a quality of service (QoS) indication for the client application. In response to the dynamic slice request, the network device generates a traffic descriptor value. The traffic descriptor value includes an access token that indicates the QoS authorized for the client application. The network device pushes updated UE Route Selection Policy (URSP) rules to a modem of the UE device, and also separately directs the traffic descriptor value to the client application. The network device receives, from the UE device, a protocol data unit (PDU) session establishment request that includes network slice selection information based on the traffic descriptor value.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p.ex. en réponse aux événements dans le réseau
H04W 76/10 - Gestion de la connexion Établissement de la connexion
Disclosed is a system comprised of different points-of-presence (“PoPs”) that provide software defined hybrid private and public networking for different entity sites. A system PoP may establish and/or maintain different network circuits for accessing different destinations or services. The system PoP may receive a tunnel creation request from a particular site, may obtain entity-defined policies that are specified for the particular site, and may establish a particular network tunnel to the particular site. The system PoP may then route egress traffic with a first classification through a first network circuit with a different quality of service (“QoS”) than egress traffic with a second classification according to the policies. Similarly, the system PoP may route ingress traffic arriving over the first network circuit through the particular network tunnel with a different QoS than ingress traffic arriving over the second network circuit according to the policies.
H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge de spécifications de services, p.ex. SLA
H04L 47/2483 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS en impliquant l’identification des flux individuels
H04L 47/2441 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS en s'appuyant sur la classification des flux, p.ex. en utilisant des services intégrés [IntServ]
42.
SYSTEMS AND METHODS FOR CONTENT DISCOVERY BY AUTOMATIC ORGANIZATION OF COLLECTIONS OR RAILS
In some implementations, a device may receive historical content data indicating historical characteristics associated with one or more groups of content. The device may determine, based on the historical content data, one or more characteristics associated with a time period. The device may determine, based on the one or more characteristics, a new group of content associated with the time period. The device may generate a display element for accessing content included in the new group of content during the time period.
A method, a device, and a non-transitory storage medium are described in which a network analytics model service is provided. The service may include ingesting customized models and non-customized models by a network analytics device. The ingestion procedure may include receiving the model and model specification data. The service may include provisioning the model and registering the model for discovery by other network devices. The service may include specifying customized identifiers to be used prospective subscribing network devices for the analytics information. The service may also facilitate the use of the analytics information by the subscribing network devices.
H04W 4/50 - Fourniture de services ou reconfiguration de services
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 48/16 - Exploration; Traitement d'informations sur les restrictions d'accès ou les accès
H04W 4/20 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic
44.
SYSTEMS AND METHODS FOR RADIO CHANNEL PARAMETER OPTIMIZATION IN A WIRELESS NETWORK
A system described herein may identify a first set of channel parameters associated with a User Equipment (“UE”). The first set of channel parameters may include timing parameters indicating time intervals at which traffic is able to be wirelessly communicated between the UE and a radio access network (“RAN”), and resource allocation parameters indicating a measure of wireless resources allocated to communicating traffic between the UE and the RAN. The system may generate a second set of channel parameters based on a quantity of instances that traffic was communicated between the UE and the RAN at a beginning of one or more time intervals, indicated by the first set of channel parameters, and a measure of utilization of the allocated wireless resources during the particular timeframe. The UE and the RAN may subsequently communicate using the second set of channel parameters.
A method, a device, and a non-transitory storage medium are described in which a beam sweeping service is provided. The service may include generating multiple and different synchronization signal block burst sets that have different periodicities. The synchronization signal block burst sets may have different priorities based on one or multiple criteria. The one or multiple criteria may include radio beam utilization. The service may also include a multi-tier random access based on the multi-tier synchronization signal block burst sets.
One or more computing devices, systems, and/or methods for simulating wireless networks using multilayer radio frequency resolution maps are provided. A set of resolution maps are selected from a plurality of resolution maps based upon the set of resolution maps corresponding to a speed of emulated user equipment traveling during a simulation of a wireless network or a radio frequency used by the emulated user equipment. A geographical location of the emulated user equipment in a geographical map is translated to a grid location in the set of resolution maps. The emulated user equipment is provided with a cell list at the grid location and signal strengths derived from the set of resolution maps at a given radio frequency and the speed. The emulated user equipment utilizes the cell list and the signal strengths to select and connect to a cell site within the cell list.
H04W 16/22 - Outils ou modèles de simulation de trafic
H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
H04W 48/16 - Exploration; Traitement d'informations sur les restrictions d'accès ou les accès
47.
CONDITIONAL REGION-BASED COSTING IN CONTRACTION HIERARCHIES
A system may perform a search from a source node of a node map to a target node of the node map. Performing the search may include identifying a first path, starting at the source node, that enters a particular constraint region, and identifying a second path, starting at the source node, that does not enter the particular constraint region. The system may select the second path as a path from the source node to the target node, based on identifying that the first path enters the particular constraint region and that the second path does not enter the particular constraint region. The system may cease exploring nodes via the first path when the second path is identified as reaching the target node, and not including a constraint associated with the particular constraint region.
A predictive circuit breaker model and system for network application is disclosed. In some embodiments, the techniques described herein relate to a method that includes receiving telemetry data from one or more network applications; generating a set of feature vectors based on the telemetry data, the set of feature vectors associated with at least one network application in the one or more network applications; inputting the set of feature vectors into a machine learning (ML) model to generate a prediction, the prediction including a binary classification of the set of feature vectors; and triggering at least one circuit breaker function in response to the prediction.
A user equipment (UE), comprising at least one processor may be configured to transmit a first attach request to a first wireless network based on a first universal subscriber identity module (USIM). The UE may receive a rejection from the first wireless network and may switch from the first USIM to a second USIM based on the rejection. The UE may transmit a second attach request to the first wireless network based on the second USIM.
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
50.
SYSTEMS AND METHODS FOR ELEVATION TRACKING OF DEVICES
One or more computing devices, systems, and/or methods for elevation tracking of devices are provided. Barometric pressure data points and elevation data points associated with a set of barometric measurement devices proximate a device are obtained. An interpolated field of barometric pressure is generated using the barometric pressure data points and the elevation data points. x, y location coordinates of the device are projected onto the interpolated field as a projected point within the interpolated field. Barometric leveling is executed upon a device barometric pressure value provided by the device and a barometric pressure data point at the projected point to determine a relative height difference between the device and the projected point. An elevation of the device is determined based upon the relative height difference.
G01C 5/06 - Mesure des hauteurs; Mesure des distances transversales par rapport à la ligne de visée; Nivellement entre des points séparés; Niveaux à lunette en utilisant des moyens barométriques
G01C 25/00 - Fabrication, étalonnage, nettoyage ou réparation des instruments ou des dispositifs mentionnés dans les autres groupes de la présente sous-classe
51.
SYSTEMS AND METHODS FOR REDUCED RESOURCE UTILIZATION FOR EVENT MODELING
A system described herein may provide a technique for using modeling techniques to identify events, trends, etc. in a set of data, such as streaming video or audio content. The system may perform lightweight pre-processing operations on a different set of data, such as object position data, to identify timeframes at which an event may potentially have occurred, and the modeling techniques may be performed at portions of the streaming content that correspond to such timeframes. The system may forgo performing such modeling techniques at other portions of the streaming content, thus conserving processing resources.
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
52.
Systems and methods for facilitating provisioning of internet protocol multimedia subsystem services
In some implementations, a network device (e.g., an Internet protocol multimedia subsystem (IMS) application server (IMS-AS) may receive, via a first communication interface, from a call session control function (CSCF) device, a request to register for an Internet protocol multimedia subsystem (IMS) service. The network device may provide via a second communication interface between the network device and a unified data management (UDM) device, and to the UDM device, a request for IMS service information associated with the IMS service. The network device may receive based on providing the request for IMS service information, via the second communication interface, and from the UDM device, IMS service information. The network device may cause, based on the IMS service information, the IMS service to be provided to a user device associated with the request to register for the IMS service.
Disclosed are systems and methods for initiating communication between users of a user group based on machine learning techniques. The disclosed systems and methods provide a novel framework for automating communication scheduling and communication initiation based on user communication objectives and machine learning techniques. The disclosed framework operates by leveraging available user provided communication parameters, user provided objectives, and various real-time data associated with the users, and using the aforementioned data as inputs for machine learning models, in order to schedule communication between the users, automatically initiate communication between the users, or transmit communication notifications to the users.
H04L 51/043 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM] en utilisant ou en gérant les informations de présence
H04L 51/52 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel pour la prise en charge des services des réseaux sociaux
H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
A vehicle device may receive audio data and other vehicle data associated with a vehicle and may transform the audio data to transformed audio data in a frequency domain. The vehicle device may segment the transformed audio data into a plurality of audio segments and may process the plurality of audio segments, with different feature extraction techniques, to extract a plurality of feature vectors. The vehicle device may merge the plurality of feature vectors into a merged feature vector and may create an audio signature for the audio data based on the merged feature vector. The vehicle device may process the audio signature and the other vehicle data, with a model, to determine a classification of the audio signature and may perform one or more actions based on the classification of the audio signature.
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
G10L 21/0232 - Traitement dans le domaine fréquentiel
H04R 3/04 - Circuits pour transducteurs pour corriger la fréquence de réponse
G10L 25/24 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant le cepstre
G10L 25/18 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant l’information spectrale de chaque sous-bande
G08G 1/0962 - Dispositions pour donner des instructions variables pour le trafic avec un indicateur monté à l'intérieur du véhicule, p.ex. délivrant des messages vocaux
A system described herein may identify a plurality of records recorded to a blockchain, and may identify a particular record of the plurality of records that includes a particular indicator that the particular record is associated with a particular event. The particular indicator may indicate a type of off-chain event. The system may perform, based on identifying the particular record that is associated with the particular event, one or more off-chain actions associated with the particular event. The performed off-chain event may be the indicated type, out of a plurality of possible types of events to perform. The system may record, to the blockchain, an indication that the one or more off-chain actions associated with the particular event have been performed. The event may include an identifier, which the system may also record to the indication that the one or more off-chain actions have been performed.
One or more computing devices, systems, and/or methods are provided. In an example, a system includes a first non-quantum-resistant (NQR) device configured to generate first data and a first quantum capable proxy server configured to receive the first data, encrypt the first data using a quantum resistant (QR) protocol to generate first QR data, and communicate the first QR data to a first target device using a first QR channel. In an example, a method includes generating first data by a first non-quantum-resistant (NQR) device, communicating the first data, by the first NQR device, to a first quantum capable proxy server, encrypting the first data, by the quantum capable proxy server, using a quantum resistant (QR) protocol to generate first QR data, and communicating, by the quantum capable proxy server, the first QR data to a first target device using a first QR channel.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
57.
SYSTEMS AND METHODS FOR SUPPORTING INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM SERVICES IN FIFTH-GENERATION NETWORKS
A network device may receive, from a CSCF device, a request for registration data associated with an IMS service, and may provide, to the CSCF device, the registration data associated with the IMS service. The network device may receive, from the CSCF device, a request for location data associated with the IMS service, and may provide, to the CSCF device, the location data associated with the IMS service. The network device may receive, from the CSCF device, a request for authentication data associated with the IMS service, and may provide, to the CSCF device, the authentication data associated with the IMS service. The network device may receive, from the CSCF device, a request for subscriber profile data associated with the IMS service, and may provide, to the CSCF device, the subscriber profile data associated with the IMS service.
A network device may provide, to a content server device, an upload policy for uploading data, and may receive a notification indicating that the user device is attached to a network associated with a network identifier. The network device may receive a request identifying data to be uploaded by a user device to the content server device, and may determine a time window, a data size, and the network identifier associated with the upload policy and the network. The network device may determine whether the request complies with the time window, the data size, and the network identifier, and may determine whether a quantity of tokens associated with the network identifier is zero. The network device may provide, to the user device, a response indicating approval of the data to be uploaded, and may receive an indication that uploading the data is complete.
H04N 21/239 - Interfaçage de la voie montante du réseau de transmission, p.ex. établissement de priorité des requêtes de clients
H04N 21/24 - Surveillance de procédés ou de ressources, p.ex. surveillance de la charge du serveur, de la bande passante disponible ou des requêtes effectuées sur la voie montante
H04N 21/61 - Structure physique de réseau; Traitement de signal
59.
Systems and Methods for Adaptive Video Conferencing
An illustrative video conference management system monitors an encoded video stream corresponding to an original real-time video stream of a video conference meeting. The video conference management system determines context data associated with one or more encoded video frames of the encoded video stream. The context data includes at least one of an encoder metric or a content attribute that indicates an encoding complexity level of the original real-time video stream. The video conference management system adjusts one or more encoded video streams corresponding to the original real-time video stream based on the context data. Corresponding methods and systems are also disclosed.
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
H04N 19/14 - Complexité de l’unité de codage, p.ex. activité ou estimation de présence de contours
H04N 19/42 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques - caractérisés par les détails de mise en œuvre ou le matériel spécialement adapté à la compression ou à la décompression vidéo, p.ex. la mise en œuvre de logiciels spécialisés
60.
METHOD AND SYSTEM FOR MONITORING EVENT HANDLING OF END DEVICES
A method, a device, and a non-transitory storage medium are described in which a monitoring event handling service is provided. The service may include a non-stand-alone core device subscribing to a registration status for an end device with a stand-alone core device. The service may also include the non-stand-alone core device subscribing to a monitoring event service with the stand-alone core device on behalf of another non-stand-alone core network device. The stand-alone core device may monitor an event when the end device is stand-alone registered and may notify the non-stand-alone core device when the event occurs. The service may include the non-stand-alone core device notifying the other non-stand-alone core device when the event occurs.
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
H04W 8/04 - Enregistrement dans un registre de localisation nominal ou un serveur d'abonnés locaux [HSS Home Subscriber Server]
61.
SYSTEMS AND METHODS FOR HYBRID RECORD UNIFICATION USING A COMBINATION OF DETERMINISTIC, PROBABILISTIC, AND POSSIBILISTIC OPERATIONS
A hybrid linkage system may receive data records from different data sources, and may merge data records from the data sources with or without crisp or fuzzy constraints. The system may compute scores based on fuzzy match results between different data fields from a first data record and a second data record of a merged data record pair. The system may classify the merged data record pair with a weight from the first linguistic term based on the relative importance of the first fuzzy match score, and with a weight from the second linguistic term based on the relative importance of the second fuzzy match score, and may execute an action that uses consolidated data from the first and second data records in response to the first linguistic term and the second linguistic term evaluating to a match between the first data record and the second data record.
A device may receive radio frequency (RF) transmissions from access points provided in a zone, and may calculate channel state information (CSI) for the access points based on the RF transmissions. The device may identify CSI phases that satisfy a phase threshold to eliminate surrounding movement in the zone and to focus on an entry location of the zone, and may perform a short-time Fourier transform of the CSI phases to generate a frequency versus time graph. The device may perform a spectrogram analysis of the frequency versus time graph or may process the frequency versus time graph, with a machine learning model, to determine a quantity of people in the zone and a start and stop times associated with entries and exits of the people to and from the zone. The device may perform actions based on the quantity of people and the start and stop times.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 13/184 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations actifs par interruption d'un faisceau ou d'une barrière de radiations utilisant des réflecteurs de radiations
63.
SYSTEMS AND METHODS FOR AUTOMATING NETWORK SLICE CONFIGURATION
In some implementations, a first device may receive, from a second device, network function (NF) configuration information indicating that an NF instance is to be provisioned to support a combination of network slices. The NF configuration information may include first network slice information regarding the first network slice and second network slice information regarding the second network slice. The first device may obtain, from a data structure, first slice configuration information associated with the NF instance supporting the first network slice and second slice configuration information associated with the NF instance supporting the second network slice. The first device may generate configuration parameters to provision the NF instance to support the combination of network slices and provide the configuration parameters to cause the NF instance to be provisioned to support the combination of network slices.
A method, a device, and a non-transitory storage medium are described in which a card assignment, allocation, and distribution service is provided. The service may include generating vendor-agnostic identifiers that create a unified inventory among cards of different vendors. The service may also include generating vendor-agnostic identifiers with criterion data based on the vendor-agnostic identifiers. The criterion data may be used to steer and distribute cards among distribution devices associated with different vendor platforms. The vendor-agnostic identifiers with criterion data may optimize or minimize the generation and storage of data used to manage allocation and distribution of cards. Also, the vendor-agnostic identifiers with criterion data may reduce and/or streamline the network processing in allocation and distribution procedures of the cards to end devices.
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 4/60 - Services basés sur un abonnement qui utilisent des serveurs d’applications ou de supports d’enregistrement, p.ex. boîtes à outils d’application SIM
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04B 1/3816 - TRANSMISSION - Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission Émetteurs-récepteurs, c. à d. dispositifs dans lesquels l'émetteur et le récepteur forment un ensemble structural et dans lesquels au moins une partie est utilisée pour des fonctions d'émission et de réception avec des connecteurs pour programmer des dispositifs d’identification
65.
SYSTEMS AND METHODS FOR OPTIMAL PATH DETERMINATION USING CONTRACTION HIERARCHIES WITH MULTI-LINK CONSTRAINTS
A system described herein may provide a technique for the generation of a node map using contraction hierarchy techniques in a manner that accounts for multi-link constraints. Multi-link constraints may include a sequence of two or more links through the node map, and paths that include such multi-link constraints may be associated with an additional cost based on such inclusion. Shortcut links that represent paths through nodes contracted out of the node map may be associated with portions of multi-link constraints. Paths through such shortcut links, where such paths include the remainder of the multi-link constraint, may be considered as including the multi-link constraint, and the cost of such paths may be calculated accordingly. The costs of links and/or paths, including paths that include multi-link constraints, may be used in determining a path from a source node to a target node of the node map.
In some implementations, a device may receive file location information identifying a file to be transferred to a user device associated with the first network provider, wherein the file location information identifies a domain name associated with a second network provider. The device may provide, based on the file location information, a request to obtain one or more records associated with the domain name. The device may receive the one or more records based on the request. The device may selectively obtain, based on the one or more records, the file from a first content device associated with the second network provider or from a second content device associated with a third-party provider. The device may provide the file to the user device.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
67.
UPGRADE RECOMMENDATIONS FOR WIRELESS WIDE AREA NETWORKS
A device comprises a processor. The processor may be configured to: receive information about an existing cell site; and generate a distance histogram for the existing cell site based on the received information. Additionally, the processor may be configured to at least one of: calculate, using the generated distance histogram, a first value that indicates an amount of traffic to be offloaded from the existing cell site to a new cell site, or calculate, using the generated distance histogram, a second value that indicates an amount of traffic to be offloaded from operating bands of the existing cell site as a result of an upgrade at the existing cell site.
A method, a system, and a non-transitory storage medium are described in which an binding information service is provided. The binding information service may include applying one or multiple criteria to binding information stored by a binding service function. The binding information service may identify candidate binding information instances that may need deletion based on the one or multiple criteria. The binding information service may interrogate a policy control network device as to the current registrability of the binding information. The binding information service may delete or maintain the binding information based on a result of the interrogation. The binding information service may also include directing the binding service function to delete binding information based on one or multiple criteria. The one or multiple criteria may relate to the age of the binding information or a last time the registrability of the binding information was confirmed.
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 8/22 - Traitement ou transfert des données du terminal, p.ex. statut ou capacités physiques
H04W 60/06 - Annulation de l'enregistrement ou détachement
H04W 76/10 - Gestion de la connexion Établissement de la connexion
69.
SYSTEMS AND METHODS FOR PROVIDING SECURE ACCESS TO A PRIVATE MULTIACCESS EDGE COMPUTING DEVICE VIA A MULTI-TENANCY ENVIRONMENT
A device may receive and store credentials identifying security levels of users for access to functionalities of an on-premises device, and may receive a credential of a user and a request to access a functionality of the on-premises device. The device may determine whether a security level of the credential matches a first security level of the credentials, and may reject the request when the security level fails to match the first security level. The device may determine, when the security level matches the first security level, whether a computing resource of the on-premises device matches a computing resource of the first security level, and may provide the user with access to the computing resource when the computing resource matches the computing resource of the first security level. The device may reject the request when the computing resource fails to match the computing resource of the first security level.
One or more computing devices, systems, and/or methods are provided. A system includes a first user equipment (UE) module and a second UE module, a first base station (BS) module associated with the first UE module, and a second BS module associated with the second UE module. The first BS module is configured to send a first resource allocation map associated with the first UE module to the second BS module and at least one of the second UE module or the second BS module is configured to access a first fast fading table to determine a first fast fading parameter for the second UE module, generate a first interference metric based on the first resource allocation map and the first fast fading parameter, and modulate a data transmission between the second UE module and the second BS module based on the first interference metric.
An illustrative application executing on a first device establishes a first network connection between the first device and a collaboration platform server managing a set of components for a collaboration platform providing voice communication services with respect to a virtual space. Using the first network connection, the application: 1) sets a first location within the virtual space at which a first voice component is positioned, and 2) determines a second location within the virtual space at which a second voice component is positioned. The application receives, by way of a second network connection between the first and second devices, audio data representing voice communication originating at the second device. Based on the first and second locations, the application generates a spatialized rendering of the audio data for presentation to a user. Corresponding methods and systems are also disclosed.
A system described herein may maintain information associating one or more tokens to one or more network slices associated with a network. The system may receive a request, from an application executing at a User Equipment (“UE”), for communication session information, where the request includes a particular token. The system may identify a particular network slice associated with the particular token based on the information associating the one or more tokens to the one or more network slices. The system may receive communication session information, associated with the particular network slice, from the network, and may provide the communication session information to the application. The application may use the communication session information to communicate with the network via the particular network slice. The application may use such communication session information without providing an application identifier to the network.
A device may include a processor configured to obtain a quantum key generated using quantum random numbers received from a quantum random number generator. The processor may be further configured to obtain a digital signature for a uniform resource locator (URL) associated with the obtained quantum key, wherein the digital signature is received from a security device configured to provide the quantum key to a user equipment (UE) device; receive a request from an application server to function as a proxy for a secure session with the UE device; authenticate the secure session with the UE device using the quantum key and the digital signature; and proxy the secure session between the UE device and the application server.
H04W 12/03 - Protection de la confidentialité, p.ex. par chiffrement
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
74.
SYSTEMS AND METHODS FOR EFFICIENTLY CAUSING A SECONDARY CELL TO BECOME A PRIMARY CELL
In some implementations, a device may receive cell information regarding a current primary cell associated with a user equipment (UE), wherein the UE is further associated with a plurality of secondary cells. The device may determine, based on the cell information, that the UE is to be associated with a new primary cell, wherein the new primary cell is selected from the plurality of secondary cells. The device may generate configuration information indicating that: a particular secondary cell, of the plurality of secondary cells, is to become the new primary cell, and one or more other secondary cells, of the plurality of secondary cells, are to remain secondary cells. The device may provide, to the UE, the configuration information to configure the UE to communicate via the new primary cell.
Disclosed are systems and methods for a robust Self-Organizing Network (SON) framework that quantifies SON applications' control and management of a network into key performance indicators (KPI) that are leveraged to determine the impact of a SON application's effectiveness in regulating network parameters, which then dictates how the SON application operates. The disclosed framework is configured to receive multiple data streams from existing data sources, determine the performance of a node on a network, and then automatically perform SON operations based therefrom. The disclosed framework can utilize this information to predict additional and/or future opportunities for SON automation on the network, which can be based on an aggregate determination of a net performance gain (NPG) of the SON applications. The framework can leverage the NPG to modify, configure and/or further maintain network operations so as to improve control and management of the network and the applications operating thereon.
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p.ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04L 43/062 - Génération de rapports liés au trafic du réseau
H04L 43/065 - Génération de rapports liés aux appareils du réseau
76.
SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENT
One or more computing devices, systems, and/or methods for managing a firmware password of a User Equipment (UE) are provided. In an example, the UE determines that a first firmware password variable is indicative of a firmware password of a firmware of the UE. The UE transmits the first firmware password variable to a first computer for storage in a first dataset. The UE generates a password. The UE sets a second firmware password variable, in a second dataset stored on the UE, to the password. The UE transmits the second firmware password variable including the password to the first computer for storage in the first dataset. The UE sets the firmware password of the firmware of the UE to the second firmware password variable including the password.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
77.
System and Method of Shift and Operative Match Optimization
An illustrative method includes a computing system receiving a request from an entity to fill a shift associated with a task. The method further includes accessing values for a set of shift criteria associated with the entity and the shift and accessing values for a set of operative criteria associated with an operative. The method further includes determining, based on the values for the set of shift criteria and the values for the set of operative criteria, a value for a compatibility rating of the operative with the shift. The method further includes providing, by the computing system, an output based on the value for the compatibility rating of the operative with the shift.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
78.
SYSTEM AND METHOD FOR DETERMINING INTENTIONS OF MESSAGES
One or more computing devices, systems, and/or methods for determining an intention of a message and/or performing one or more operations based upon the intention are provided. In an example, a first set of text may be received, from a client device, via a messaging interface. Based upon the first set of text, one or more sets of text semantically similar to the first set of text may be determined. Based upon the first set of text and the one or more sets of text a plurality of intention predictions may be determined. A first intention of the first set of text may be determined based upon the plurality of intention predictions. One or more operations may be performed based upon the first intention.
H04L 51/00 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
A system may receive a first definition for a virtualized instance of a network function. The first definition may include a first set of declarations in a first format that is different than respective formats supported by different virtualized environments. The system may select a first virtualized environment to run the virtualized instance based on requirements specified within the first definition, and may generate a second definition with a second set of declarations that map the first set of declarations from the first format to a second format supported by the first virtualized environment. The system may deploy the virtualized instance to the first virtualized environment using the second set of declarations from the second definition. Deploying the virtualized instance may include configuring its operation based on some of the second set of declarations matching a configuration format supported by the first virtualized environment.
H04L 47/78 - Architectures d'allocation des ressources
H04L 47/70 - Contrôle d'admission; Allocation des ressources
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
80.
SYSTEMS AND METHODS FOR TRANSFER OF NON-FUNGIBLE ASSETS ACROSS MULTIPLE BLOCKCHAIN SYSTEMS
A system described herein may provide a technique for bridging an asset, such as a non-fungible asset (e.g., a Non-Fungible Token (“NFT”)) from one blockchain to another, while retaining the uniqueness and/or scarcity of the asset. The system may receive provenance information associated with the asset that is associated with a first blockchain, associate the particular asset with a particular identifier, and receive an instruction to bridge the asset to a second blockchain (e.g., from an owner of the asset). Based on receiving the instruction to bridge the asset to the second blockchain, the system may lock the asset on the first blockchain, and mint the asset on the second blockchain, wherein the minted asset includes the particular identifier. The identifier may be linked to off-chain data that associates the minted asset to the original asset, thus maintaining the chain of custody of the asset across the two blockchains.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
81.
SYSTEMS AND METHODS FOR DETERMINING A HANDOVER TIME PERIOD BASED ON MOBILITY PREDICTION
A device may receive geolocation data associated with a user device in a first cell region, and may determine a location of the user device. The device may determine whether the user device is located in an overlapping region or a non-overlapping region between the first cell region and a second cell region, and may calculate a velocity of the user device. The device may estimate a trajectory of the user device, and may calculate a first distance associated with the user device entering the overlapping region. The device may calculate a second distance associated with the user device exiting the overlapping region, and may determine a first time period to travel the first distance. The device may determine a second time period to travel the second distance, and may determine a handover time period based on the first time period and the second time period.
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p.ex. des données de vitesse
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 36/30 - La resélection étant déclenchée par des paramètres spécifiques par des données de mesure ou d’estimation de la qualité des liaisons
82.
SYSTEMS AND METHODS FOR SECURE ONBOARDING AND COMMUNICATION FOR INTERNET OF THINGS DEVICES
A device may receive software installation packages that include unique device identifiers and unique security mechanisms associated with corresponding IoT devices and include an address for the device, and may store the software installation packages in a data structure. The device may receive, based on the address for the device and from an IoT device, connection data identifying a request to connect to the device and identifying a device identifier and a security mechanism associated with the IoT device, and may utilize an MQTT protocol to authenticate the connection data based on the device identifier, the security mechanism, and the software installation packages stored in the data structure. The device may identify the IoT device as active when the connection data is authenticated, and may enable, when the connection data is authenticated, the IoT device to publish data to the device or to subscribe to data from the device.
A system described herein may provide a technique for the compression of query terms and search data against which the query terms may be evaluated. The compression may be dynamic, in that a quantity of bits used to compress the search data and query terms may be based on a quantity of unique characters included in a given query term. The compression may further include reducing the volume of search data by compressing entire words, that do not include any of the unique characters of the query term, to one particular code.
An interference detection system in a network determines that an unknown radio frequency (RF) interference source that causes RF interference experienced by a first wireless station is a persistent RF interference source over a plurality of time intervals in a selected time period. A predicted interference source location is identified for each time interval in the selected time period. An aggregated predicted interference source location is calculated based on the identified one or more predicted interference source locations.
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
85.
DYNAMIC SMALL CELL RADIO FREQUENCY (RF) OPTIMIZATION
A method, device, and non-transitory computer-readable medium provide for scanning, by a device, a radio service area of a small cell radio access node to detect radio signals of one or more radio frequency (RF) bands, the radio signals including transmissions associated with one or more other small cell radio access nodes that are operating in a vicinity of the small cell radio access node, and the small radio access node being configured to alternately operate at multiple RF bands including the one or more RF bands; determining, by the device, a signal strength associated with each of the one or more RF bands; and dynamically optimizing, by device, operation of the small cell radio access node based on the signal strength associated with each of the one or more RF bands.
H04W 28/02 - Gestion du trafic, p.ex. régulation de flux ou d'encombrement
H04W 72/542 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant la qualité mesurée ou perçue
A device may receive a simulation start command and status data indicating that network elements are ready to process data for multiple simulations. The device may align a time slot to zero, and may define a simulation start time, for the multiple simulations, based on the simulation start command and the status data. The device may define a verification start time, for the multiple simulations, based on the simulation start command, the status data, the time slot, and a system frame number being zero, and may define a network frame number that increments when the verification start time changes from zero to one. The device may cause the multiple simulations to be executed by the network elements, based on the time slot, the system frame number, and the network frame number, and may receive synchronized simulation results based on causing the multiple simulations to be executed by the network elements.
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
H04L 43/067 - Génération de rapports en utilisant des rapports de délai
H04L 43/106 - Surveillance active, p.ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p.ex. en ajoutant des horodatages
87.
SYSTEMS AND METHODS FOR DYNAMIC CRYPTOGRAPHY FOR SMALL CELLS
A device within a small cell may establish a first secure communication channel between the device and a network device based on a first type of encryption. The device within the small cell may transmit data between the small cell and a core network via the first secure communication channel. The device within the small cell may receive information associated with a second type of encryption, wherein the second type of encryption is different from the first type of encryption. The device within the small cell may terminate the first secure communication channel. The device within the small cell may establish a second secure communication channel between the device and the network device based on the information associated with the second type of encryption. The device within the small cell may transmit further data between the small cell and the core network via the second secure communication channel.
In some implementations, a device may provide content received via a quadrature amplitude modulation channel. The device may receive supplemental content information regarding supplemental content to be provided during a period of time associated with providing the content, wherein the supplemental content information includes a uniform resource locator (URL) identifying a location of the supplemental content and start time information identifying a time when the supplemental content is to be provided. The device may obtain the supplemental content using the URL. The device may transition, from providing the content, to providing the supplemental content based on the start time information. The device may transition, from providing the supplemental content, to providing the content after providing the supplemental content.
H04N 21/2387 - Traitement de flux en réponse à une requête de reproduction par un utilisateur final, p.ex. pour la lecture à vitesse variable ("trick play")
H04N 21/433 - Opération de stockage de contenu, p.ex. opération de stockage en réponse à une requête de pause ou opérations de cache
H04N 21/858 - Création de liens entre données et contenu, p.ex. en liant une URL à un objet vidéo en créant une zone active ("hotspot")
H04L 27/34 - Systèmes à courant porteur à modulation de phase et d'amplitude, p.ex. en quadrature d'amplitude
89.
SYSTEMS AND METHODS FOR TRANSFERRING MULTIPLE PACKET DATA UNIT SESSIONS WITH A SAME DATA NETWORK NAME CONFIGURATION BETWEEN NETWORKS
A network device may receive an indication of movement of a user device, associated with multiple packet data unit (PDU) sessions, from a first radio access network (RAN) to a second RAN, and may maintain, based on the indication, a particular PDU session, of the multiple PDU sessions, associated with a default flow. The network device may release, based on the indication, the multiple PDU sessions other than the particular PDU session, and may handle the multiple PDU sessions, other than the particular PDU session, in accordance with a handling option.
Systems and methods described herein utilize synthetic pixel generation using a custom neural network to generate synthetic versions of objects hidden by occlusions for effective detection and tracking. A computing device stores an object detector model and a synthetic image generator model; receives a video feed; detects objects of interest in a current frame of the video feed; identifies an occluded object in the current frame; retrieves a previous frame from the video feed; generates synthetic data based on the previous frame for the occluded object; and forwards a modified version of the current frame to an object tracking system, wherein the modified version of the current frame includes the synthetic data.
G06V 10/26 - Segmentation de formes dans le champ d’image; Découpage ou fusion d’éléments d’image visant à établir la région de motif, p.ex. techniques de regroupement; Détection d’occlusion
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
G06V 40/10 - Corps d’êtres humains ou d’animaux, p.ex. occupants de véhicules automobiles ou piétons; Parties du corps, p.ex. mains
91.
SYSTEMS AND METHODS FOR SCALABLE OFF-CHAIN STORAGE OF BLOCKCHAIN-SECURED DATA
A system described herein may generate a hash value based on a set of data stored in an off-chain repository. The system may record an association between the set of data and the hash value to a blockchain system, receive a query from a client device, determine that the query is associated with the set of data, output a response to the query based on the set of data. The response may include the hash value. The system may authenticate the query (e.g., the client device) using one or more suitable authentication mechanisms, thus securing access to the set of data. The client device may verify the set of data based on determining that the hash value included in the response matches the hash value recorded to the blockchain system as being associated with the set of data.
Systems and methods described herein provide a cyber risk assessment service. A computing device determines weights for techniques of a cyber security framework based on historical industry impact. The computing device associates an enterprise network with an industry identifier, obtains customer risk data for the enterprise network, and normalizes and/or combines the customer risk data to form normalized risk scores. The computing device maps the customer risk data to corresponding techniques in the cyber security framework, generates technique scores based on the mapping and the normalized risk scores, and generates weighted technique scores using some of the weights selected based on the industry identifier. The computing device calculates an overall security score for the enterprise network based on the weighted technique scores, identifies a corrective recommendation for the overall security score, and provides the overall security score and the corrective recommendation for presentation to a user.
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
93.
SYSTEMS AND METHODS FOR UTILIZING MODELS TO DETECT DANGEROUS TRACKS FOR VEHICLES
A device may receive accelerometer data and video data for a vehicle and may identify bounding boxes and object classes for objects near the vehicle. The device may identify tracks for the objects and may filter out tracks that are not associated with vehicles or vulnerable road users to generate one or more tracks or an indication of no tracks. The device may generate a collision cone identifying a drivable area of the vehicle to identify objects more likely to be involved in a collision and may filter out tracks from the one or more tracks, based on the bounding boxes, and to generate a subset of tracks or another indication of no tracks. The device may determine scores for the subset of tracks and may identify a track of the subset of tracks with a highest score. The device may perform actions based on the identified track.
G06V 20/58 - Reconnaissance d’objets en mouvement ou d’obstacles, p.ex. véhicules ou piétons; Reconnaissance des objets de la circulation, p.ex. signalisation routière, feux de signalisation ou routes
B60W 30/095 - Prévision du trajet ou de la probabilité de collision
G01P 15/00 - Mesure de l'accélération; Mesure de la décélération; Mesure des chocs, c. à d. d'une variation brusque de l'accélération
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
B60W 50/14 - Moyens d'information du conducteur, pour l'avertir ou provoquer son intervention
G06V 10/22 - Prétraitement de l’image par la sélection d’une région spécifique contenant ou référençant une forme; Localisation ou traitement de régions spécifiques visant à guider la détection ou la reconnaissance
94.
Gesture Recognition Systems and Methods for Facilitating Touchless User Interaction with a User Interface of a Computer System
An exemplary method includes a gesture recognition system determining, based on imagery of a user while the user touchlessly interacts with a user interface of a computer system, a configuration of a plurality of landmarks associated with the user and comparing the configuration of the plurality of landmarks to defined landmark configurations associated with a plurality of defined gestures. Each of the plurality of defined gestures may be associated with a different user input enterable by way of the user interface of the computer system. The method may further include the gesture recognition system selecting, based on the comparing of the configuration of the plurality of landmarks to the defined landmark configurations associated with the plurality of defined gestures, a defined gesture included in the plurality of defined gestures, and directing the computer system to enter a user input that is associated with the defined gesture.
A first network component in a first wireless network may be configured to: receive a first request from a core network component in the first wireless network, to authenticate a User Equipment device (UE); and attempt to authenticate the UE. When the attempt to authenticate the UE is successful, the first component may send a first reply to the core network component. The first reply may indicate that the UE is successfully authenticated. When the attempt to authenticate the UE is not successful, the first component may send a second request to authenticate the UE to a second network component in a second wireless network; and receive a response to the second request from the second network component. The response may indicate whether the UE is successfully authenticated at the second network component.
A user device may receive, from a server device, a three-dimensional model of a product, and may display the three-dimensional model of the product, with a product review option, in an augmented reality user interface. The user device may display a product feature review panel, product review features, and product feature hotspots, with the three-dimensional model in the augmented reality user interface, based on selection of the product review option. The user device may receive a review of a product feature, via one of the product feature hotspots associated with the product feature and provided in the augmented reality user interface, and may submit the review of the product feature to the server device.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06V 20/20 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans les scènes de réalité augmentée
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
G06V 40/20 - Mouvements ou comportement, p.ex. reconnaissance des gestes
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
G10L 15/26 - Systèmes de synthèse de texte à partir de la parole
A method may include receiving, from a user device, a registration request that includes a subscription concealed identifier (SUCI), identifying a network element to decode the SUCI and forwarding the SUCI to the identified network element. The method may also include decoding the SUCI to identify a subscription permanent identifier (SUPI), identifying a unified data management (UDM) device associated with the SUPI and transmitting an authentication request to the identified UDM device to obtain authentication information associated with the user device. The method may further include receiving the authentication information and authenticating the user device based on the received authentication information.
A management system obtains, from a user device, information indicating a power measurement of a beam set that is utilized to communicate with the user device. The beam set includes one or more active beams, of a plurality of beams, that are associated with a single beam identifier. The management system identifies a location of the user device and thereby determines an expected power measurement of the beam set. The management system determines that a difference between the power measurement of the beam set and the expected power measurement of the beam set satisfies (e.g., is greater than or equal to) a difference threshold. The management system therefore causes the beam set to be modified. The management system may use a machine learning model (e.g., a neural network machine learning model) to facilitate modification of the beam set.
H04B 7/02 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
A method may include establishing, by a first service provider and via an application programming interface (API), an agreement with a second entity. The agreement may identify services that can be modified without submission of a new order. The method may also include receiving a first message requesting a change associated with a service and determining, by the first service provider, whether the requested change corresponds to a change that is permitted based on the agreement and whether resources are available in the first network to implement the requested change. The method may further include determining whether the requested change is accepted, sending a second message to the second entity that indicates whether the change is accepted and in response to determining that the change is accepted, automatically implementing the change to the service in the first network.
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
A method, a device, and a non-transitory storage medium are described in which a network access management service is provided. The service may include modifying subscription data pertaining to an end device. The modification may include control data directed to remediating behavior of the end device. The service may provide the control data to the end device during a registration procedure or a deregistration procedure with the end device. The end device may execute a remedial procedure based on the control data. The service may prevent the registering of the end device to the core network. The service may deregister the end device from the core network when the end device may be registered.
H04W 60/06 - Annulation de l'enregistrement ou détachement
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 24/04 - Configurations pour maintenir l'état de fonctionnement