Ribbon Communications Operating Company, Inc. (USA)
Inventor
Boyle, Iii, Charles W.
Sharma, Ashish
Abstract
Methods, apparatus, and system for generating efficient cross-layer key performance indicators for monitoring, managing and debugging communications networks. An exemplary method embodiment includes the steps of: generating a plurality of different cross-layer key performance indicators (CL-KPIs) from a set of event data records corresponding to a first period of time and a first base protocol, each CL-KPI in said plurality of different CL-KPIs being for a different failure cause scenario; identifying a CL-KPI in the plurality of different CL-KPIs corresponding to the first period of time and the first base protocol having a highest CL-KPI value and determining a most likely failure cause scenario for said first base protocol to be the failure cause scenario associated with the identified CL-KPI having the highest CL-KPI value.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun J.
Hutchins, John W.
Abstract
Methods and apparatus for call traffic anomaly mitigation are described herein. One or more embodiments include receiving a scoring request including a telephone number associated with a telephone call at a scoring device from a call processing entity, receiving a violator list of telephone numbers and their corresponding severity values at the scoring device from an anomaly analyzer, determining a severity value associated with the telephone number by performing a lookup operation in the violator list, performing a random simulation using the severity value as a probability to determine an indicator value, and inputting the indicator value into a model to determine a call reputation score.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Telecommunications and networking equipment, networking
hardware, firmware and applications software, for transport
and switching in the field of optical networks; optical
networking products, namely, optical transporters,
transponders and muxponders, amplifiers, switches, fixed and
reconfigurable optical add/drop multiplexers, regenerators,
dispersion compensators, dynamic gain equalizers, and
electro-optical integrated circuits employed in such
equipment; optical product operating systems and software
for configuring and managing optical products through
in-band and out-of-band control interfaces and for reporting
on product status; and downloadable instruction manuals for
all of the foregoing. Providing temporary use of on-line, non-downloadable
cloud-based software for use in managing, monitoring,
controlling, analyzing, planning and designing communication
networks and parts thereof; providing temporary use of
on-line, non-downloadable cloud-based software for planning,
engineering, commissioning, configuring, provisioning,
controlling, monitoring, analyzing, restoring, fault
locating, operating and maintaining optical networks;
providing temporary use of on-line, non-downloadable
cloud-based software for use in automating service and
network operation lifecycles; providing temporary use of
on-line, non-downloadable cloud-based software for transport
and switching in the field of optical networking; providing
temporary use of on-line, non-downloadable cloud-based
software for configuring and managing optical products
through in-band and out-of-band control interfaces and for
reporting on product status.
4.
METHODS, DEVICES, AND SYSTEMS FOR PROVIDING DYNAMIC PROTECTION AGAINST AMPLIFICATION ATTACKS
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asvaren, Tolga
Nayak, Subhransu S.
Abstract
Methods, devices, and systems for providing dynamic protection against amplification attacks are described herein. One communications method includes receiving, at a session border controller (SBC), a first request message from a peer device that does not have an assigned trust level, determining, based on a type of communication that is received from the peer device, whether the peer device should be classified as an untrusted level, semi-trusted level, or trusted level peer device, and assigning the classification to the peer device for use in subsequent communications with the peer device.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Telecommunications and networking equipment, networking hardware, firmware and applications software, for transport and switching in the field of optical networks; optical networking products, namely, optical transporters, transponders and muxponders, amplifiers, switches, fixed and reconfigurable optical add/drop multiplexers, regenerators, dispersion compensators, dynamic gain equalizers, and electro-optical integrated circuits employed in such equipment; optical product operating systems and software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status; and downloadable instruction manuals for all of the foregoing. (1) Providing temporary use of on-line, non-downloadable cloud-based software for use in managing, monitoring, controlling, analyzing, planning and designing communication networks and parts thereof; providing temporary use of on-line, non-downloadable cloud-based software for planning, engineering, commissioning, configuring, provisioning, controlling, monitoring, analyzing, restoring, fault locating, operating and maintaining optical networks; providing temporary use of on-line, non-downloadable cloud-based software for use in automating service and network operation lifecycles; providing temporary use of on-line, non-downloadable cloud-based software for transport and switching in the field of optical networking; providing temporary use of on-line, non-downloadable cloud-based software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status.
6.
Methods, systems and apparatus for handling maintenance events in public cloud deployments
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Gogate, Amol Sudhir
Venkataraman, Shivakumar
Abstract
An exemplary embodiment of implementing a communications service in a Public Cloud system comprises the steps of: (i) registering, by a Maintenance Management application of the communications service, to receive notifications for maintenance events scheduled for virtual machines and/or servers of the Public Cloud system being used to implement the communications service; (ii) receiving, by the Maintenance Management application, a maintenance notification indicating a first virtual machine is to undergo a maintenance event; (iii) determining, by the Maintenance Management application, public IP addresses being hosted by a first Packet Front End application executing on the first virtual machine; and (iv) notifying session control applications of the communications service to drain the determined public IP addresses being hosted by the first Packet Front End application.
H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
RIBBON COMMUNICATIONS OPERATINGCOMPANY, INC. (USA)
Inventor
Bharrat, Shaun Jaikarran
Stovenour, Michael
Abstract
The present invention relates to methods, systems, and apparatus for generating and/or using training data for a machine learning model. The method including the steps of: generating from a first plurality of telephone calls a first set of media fingerprints and corresponding communications information, the media fingerprints included in the first set of media fingerprints and corresponding telephone calls information being a first set of media fingerprints; generating from a second plurality of telephone calls a set of media fingerprints of an undesired call, each individual call of the second plurality of calls having characteristics indicating a probability greater than a first threshold that the individual call is undesired; labeling individual media fingerprints in the first set of media fingerprints and corresponding call information as being of an undesired call when the individual media fingerprint being labeled matches a media fingerprint in the set of media fingerprints of an undesired call. Deploying the machine learning model to block undesired calls.
The present invention relates to methods, systems, and apparatus for processing audio signals. An exemplary method embodiment includes the steps of: removing silence from an audio signal; determining, for a plurality of time segments of the audio signal, power spectral density values of the audio signal for each of a plurality of N different frequency bins, N being an integer greater than 1; identifying (i) a plurality of dominant frequency peaks based on the determined power spectral density values, and (ii) positions in the audio signal corresponding to the identified peaks; and generating a first audio fingerprint from at least some of the identified plurality of dominant frequency peaks and the identified positions in the audio signal corresponding to the identified peaks. In various embodiments, audio fingerprints are generated from an audio signal of call and then used to determine if the call is a robocall or SPAM call.
G10L 25/54 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for retrieval
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G06F 16/683 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
H04M 3/436 - Arrangements for screening incoming calls
H04L 65/1076 - Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
9.
METHODS AND APPARATUS FOR GENERATING AND/OR USING COMMUNICATIONS MEDIA FINGERPRINTS
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Jangi, Shrirang
Bhade, Vilas
Abstract
The present invention relates to methods, systems, and apparatus for processing audio signals. An exemplary method embodiment includes the steps of: removing silence from an audio signal; determining, for a plurality of time segments of the audio signal, power spectral density values of the audio signal for each of a plurality of N different frequency bins, N being an integer greater than 1; identifying (i) a plurality of dominant frequency peaks based on the determined power spectral density values, and (ii) positions in the audio signal corresponding to the identified peaks; and generating a first audio fingerprint from at least some of the identified plurality of dominant frequency peaks and the identified positions in the audio signal corresponding to the identified peaks. In various embodiments, audio fingerprints are generated from an audio signal of call and then used to determine if the call is a robocall or SPAM call.
G10L 19/02 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocodersCoding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using spectral analysis, e.g. transform vocoders or subband vocoders
H03M 7/30 - CompressionExpansionSuppression of unnecessary data, e.g. redundancy reduction
10.
Methods, systems and apparatus for generating and/or using communications training data
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Stovenour, Michael
Abstract
The present invention relates to methods, systems, and apparatus for generating and/or using training data. An exemplary embodiment includes the steps of: generating from a first plurality of communications a first set of media fingerprints and corresponding communications information, the media fingerprints included in the first set of media fingerprints and corresponding communications information being a first set of media fingerprints; generating from a second plurality of communications a set of media fingerprints of a first type, each individual communication of the second plurality of communications having characteristics indicating a probability greater than a first threshold that the individual communication is of the first type; labeling individual media fingerprints in the first set of media fingerprints and corresponding communications information as being of the first type when the individual media fingerprint being labeled matches a media fingerprint in the set of media fingerprints of the first type.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Boyle, Charles W.
Kaki, Sreenivas Nvr
Purayil, Nizar K.
Ostapenko, Vsevolod V.
Abstract
A method performed by a computing system includes collecting information on transactions in a telecommunication system, using the information on transactions to create a plurality of event objects, each of the event objects associated with a telecommunication event, associating each of the event objects with a Key Performance Indicator (KPI), applying the event objects to a plurality of inference functions, each inference functions using the set of parameters as inputs and the KPIs of the event objects as outputs to create a model that infers a relationship between the set of parameters and the KPIs, and analyzing metadata from each of the inference functions to determine which of the set of parameters was used to predict an outcome leading to the KPI.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Asveren, Tolga
Sharma, Ashish
Abstract
The present invention relates to communications methods, apparatus and systems for providing media micro-services in a scalable and efficient manner. In an exemplary method embodiment, a packet plane control service entity performs the following operations: (i) receives a request from a Signaling-Session Border Controller to implement one or more micro-services on a media packet stream, the request including information about the media packet stream including stream identification information; generates instructions for one or more entities under the control of the packet plane control service entity to implement the requested one or more micro-services on the media packet stream; and communicates the generated instructions to the one or more entities under the control of the packet plane control service entity for implementation on the media packet stream.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Prajapat, Surendra
Sakya, Rumus
Abstract
The present invention relates to methods and apparatus for determining a best or optimal media path or route between communications devices. An exemplary method embodiment of the present invention includes the steps of (i) receiving, at a first communications device, data of a first data communications session, the first data communications session being a first media communications session, the data being media; (ii) selecting an optimal media communications route from a plurality of communications routes between the first communications device and a second communications device; and (iii) communicating the received media of the first media communications session from the first communications device to the second communications device via the selected optimal media communications route. In some embodiments, the optimal media communications route is determined by a UCBot application executing on the first communication device based on media quality metrics for each of the routes determined during test media sessions.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bala, Pradeep
Abstract
Communications methods and apparatus for preserving STIR/SHAKEN original attestation/signature information for diverted Session Initiation Protocol (SIP) messages and/or calls. An exemplary method embodiment includes the steps of: receiving, at a first Session Border Controller (SBC), a diverted Session Initiation Protocol (SIP) INVITE message corresponding to a first call, the diverted SIP INVITE message not including an Identity header; obtaining an original Identity header or information from the original Identity header corresponding to the first call using one or more of the following: information included in the diverted SIP INVITE message, information included in a Session Description Protocol message included in the diverted SIP INVITE message, an SBC trunk group, or a source Internet Protocol (IP) address transport protocol port of an IP packet carrying the diverted SIP Invite message; and generating an Identity header based on the original Identity header or information from the original identity header.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Venkataraman, Shivakumar
Gogate, Amol Sudhir
Hart, Justin
Sharma, Ashish
Abstract
The present invention relates to communications methods and apparatus for session load balancing among session processing entities. An exemplary method embodiment includes the steps of receiving from a first device at a Signaling Front End Load Balancer (SLB) a first session initiation request destined for a second device; making a first session load balancing decision at the SLB with respect to the received first session initiation request; transmitting the first session initiation request to a first Session Border Controller (SBC) worker based on the first load balancing decision, the first SBC worker being one of a plurality of SBC workers forming a cluster of SBC workers, making a session mismatch determination at the first SBC worker with respect to a first session corresponding to the first session initiation request; and when the session mismatch determination is that a session mismatch has occurred notifying the SLB of the session mismatch.
09 - Scientific and electric apparatus and instruments
Goods & Services
Optical networking products, namely, transponders and muxponders, amplifiers, optical switches, fixed and reconfigurable optical add/drop multiplexers, regenerators, dispersion compensation modules, WDM (wavelength division multiplexing) dynamic gain equalizers, and electro-optical integrated circuits employed in such equipment; downloadable and recorded optical product operating system software and downloadable and recorded software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status; embedded and preinstalled operating system software sold as a component of computer hardware, namely, optical products; and downloadable instruction manuals for all of the foregoing
09 - Scientific and electric apparatus and instruments
Goods & Services
Telecommunications and data networking hardware, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; Downloadable and recorded firmware and downloadable and recorded applications software for transporting and switching optical channels and wavelengths carrying client signals in the field of optical networks; embedded and pre-installed firmware and applications software sold as a component of computer hardware for transporting and switching optical channels and wavelengths carrying client signals in the field of optical networks; optical networking products, namely, transponders and muxponders, amplifiers, optical switches, fixed and reconfigurable optical add/drop multiplexers, regenerators, dispersion compensation modules, WDM (wavelength division multiplexing) dynamic gain equalizers, and electro-optical integrated circuits employed in such equipment; Downloadable and recorded optical product operating systems software and downloadable and recorded software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status; Embedded and pre-installed optical product operating systems software sold as a component of computer hardware; Embedded and preinstalled software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status sold as a component of computer hardware; downloadable instruction manuals for all of the foregoing
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of on-line, non-downloadable cloud-based software for use in managing, monitoring, controlling, analyzing, planning and designing communication networks and parts thereof; Providing temporary use of on-line, non-downloadable cloud-based software for planning, engineering, commissioning, configuring, provisioning, controlling, monitoring, analyzing, restoring, fault locating, operating and maintaining optical networks; Providing temporary use of on-line, non-downloadable cloud-based software for use in automating service and network operation lifecycles; Providing temporary use of on-line, non-downloadable cloud-based software for transport and switching in the field of optical networking; Providing temporary use of on-line, non-downloadable cloud-based software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of on-line, non-downloadable cloud-based software for use in managing, monitoring, controlling, analyzing, planning and designing communication networks and parts thereof; Providing temporary use of on-line, non-downloadable cloud-based software for planning, engineering, commissioning, configuring, provisioning, controlling, monitoring, analyzing, restoring, fault locating, operating and maintaining optical networks; Providing temporary use of on-line, non-downloadable cloud-based software for use in automating service and network operation lifecycles; Providing temporary use of on-line, non-downloadable cloud-based software for transport and switching in the field of optical networking; Providing temporary use of on-line, non-downloadable cloud-based software for configuring and managing optical products through in-band and out-of-band control interfaces and for reporting on product status
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hecht, Inbal
Gelman, Efraim
Ezra, Shirel
Shem-Tov, Ziv
Porat, Hayim
Abstract
According to one example, a method performed by a computing system includes receiving a request for optimizing a communication network, the request defining a set of demands for the communication network, each demand of the set of demands having two or more endpoints, a diversity policy, a number of routes, and a set of constraints. The method further includes selecting a subset of optimization functions from a set of optimization functions, the selecting being based on characteristics of the communication network and a decision tree. The method further includes using the selected subset of optimization functions, determining an initial solution for the communication network, the initial solution comprising assignment of routes within demands of the set of demands. The method further includes, within a time constraint, iteratively applying an updated subset of optimization functions with modified parameters to reduce a cost of the initial solution to produce an optimal solution.
H04L 41/083 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0869 - Validating the configuration within one network element
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Amritraj, Vijay
Dey, Souvik
Abstract
A method performed by a computing system includes receiving a first request from a first pod being executed on the computing system, responding to the first request with an Internet Protocol (IP) address and a first port range, receiving a second request from a second pod being executed on the computing system, and responding to the second request with the Internet Protocol (IP) address and a second port range that is different than the first port range. The method further includes, with a networking service implemented within the kernel, processing network traffic between external entities and the first and second pods by updating source and destination IP addresses and ports of packets of the network traffic.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Kuppanna, Sridhar
Ahmed, Dilnawaj
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to methods and apparatus for dynamically detecting and/or mitigating threats in communications systems. Exemplary methods and apparatus of the present invention allow for a combination of automated and operator controlled responses to threats. While an operator is provided an opportunity to provide input on how to respond to a threat, after one or more threats of a given type are identified, the system will automatically take corrective action without waiting for operator input and/or in the absence of operator input following notification of a threat.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun J.
Hutchins, John W.
Abstract
Methods and apparatus for call traffic anomaly mitigation are described herein. One or more embodiments include receiving a scoring request including a telephone number associated with a telephone call at a scoring device from a call processing entity, receiving a violator list of telephone numbers and their corresponding severity values at the scoring device from an anomaly analyzer, determining a severity value associated with the telephone number by performing a lookup operation in the violator list, performing a random simulation using the severity value as a probability to determine an indicator value, and inputting the indicator value into a model to determine a call reputation score.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Bharrat, Shaun J.
Hutchins, John W.
Abstract
Methods and apparatus for call traffic anomaly mitigation are described herein. One or more embodiments include receiving a scoring request including a telephone number associated with a telephone call at a scoring device from a call processing entity, receiving a violator list of telephone numbers and their corresponding severity values at the scoring device from an anomaly analyzer, determining a severity value associated with the telephone number by performing a lookup operation in the violator list, performing a random simulation using the severity value as a probability to determine an indicator value, and inputting the indicator value into a model to determine a call reputation score.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bala, Pradeep
Stovenour, Michael
Abstract
Communications methods and apparatus for providing and/or adding STIR/SHAKEN Diversion Information to requests. An exemplary method embodiment includes the steps of: receiving at a second communications network a Session Initiation Protocol (SIP) Invite request from a first communications network, the SIP Invite request being directed to a first SIP address corresponding to a first user equipment device located within the second communications network, the SIP Invite request including a SIP Identity shaken header and one or more SIP Identity div headers; determining at the second communications network whether or not the received SIP Invite request was previously diverted by the second communications network to another network; and when the SIP Invite request is determined to have been previously diverted by the second communications network to another network, processing the SIP Invite request at the second communications network as a previously received and diverted SIP Invite request.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Asveren, Tolga
Sharma, Ashish
Abstract
The present invention relates to communications methods, apparatus and systems for providing media micro-services in a scalable and efficient manner. In an exemplary method embodiment, a packet plane control service entity performs the following operations: (i) receives a request from a Signaling-Session Border Controller to implement one or more micro-services on a media packet stream, the request including information about the media packet stream including stream identification information; generates instructions for one or more entities under the control of the packet plane control service entity to implement the requested one or more micro-services on the media packet stream; and communicates the generated instructions to the one or more entities under the control of the packet plane control service entity for implementation on the media packet stream.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Abstract
The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary method embodiment includes the steps of: (i) storing a set of N key performance indicator (KPI) models; (ii) associating each of a plurality of recurring time slots of a recurring time frame on a per group member basis with one of the N KPI models wherein the associating including associating a first group member of a first group and a first recurring time slot with a first one of the N models, the first one of the N models being a first model; (iii) receiving event data for the first group member for a first time period; and (iv) determining based on the first model if a key performance indicator value for the first group member and first time period is anomalous.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bollapolli, Nagesh Kumar
Kuriakose, Aby
Abstract
The present invention is directed to communications methods and apparatus for efficiently distributing traffic to processing entities. An exemplary method includes the steps of: receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message; selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP invite message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, the selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and the message allocation rate, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message, and sending the first SIP INVITE message to the first SBC.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a Virtual Network Function (VNF) component associated with a VNF, communicating with an access network over a first physical network connected to a first physical network interface of a physical machine associated with the VNF component. The method further includes, with the VNF component, communicating with a core network over a second physical network connected to a second physical network interface of the physical machine, the second network being isolated from the first network.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Nayak, Subhransu S.
Kuriakose, Aby
Abstract
The present invention relates to communications methods and apparatus for distributing Session Initiation Protocol (SIP) messages among SIP processing entities including during periods of failure recovery. An exemplary method embodiment includes the steps of: establishing a first connection oriented protocol connection between a first Session Initiation Protocol Load Balancer (SLB) of a plurality of SLBs and a client device; receiving via the first connection oriented protocol connection at the first SLB a first SIP REGISTER request message from the first client device; determining, by the first SLB, based on information received from the client device, a first Session Border Controller (SBC) from a plurality of SBCs to send the first SIP REGISTER request message, said information uniquely identifying the first SBC from other SBCs in the plurality of SBCs; and sending, by the first SLB, the first SIP REGISTER request message to the first SBC.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Boyle, Charles W.
Kovvali, Surya Kumar
Purayil, Nizar K
Abstract
A method includes: receiving protocol event data from a plurality of probes within the telecommunication system; determining a most probable cause of a call event from the protocol event data; applying the most probable cause to a trained machine learning algorithm that includes the most probable cause as its input and a telecommunication system score as its output; and in response to an output score from the trained machine learning algorithm, performing a corrective action for a plurality of network users that are expected to be affected by the most probable cause.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
33.
Methods, apparatus and systems for efficient cross-layer network analytics
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Boyle, Iii, Charles W.
Sharma, Ashish
Abstract
Methods, apparatus, and system for generating efficient cross-layer key performance indicators for monitoring, managing and debugging communications networks. An exemplary method embodiment includes the steps of: generating a plurality of different cross-layer key performance indicators (CL-KPIs) from a set of event data records corresponding to a first period of time and a first base protocol, each CL-KPI in said plurality of different CL-KPIs being for a different failure cause scenario; identifying a CL-KPI in the plurality of different CL-KPIs corresponding to the first period of time and the first base protocol having a highest CL-KPI value and determining a most likely failure cause scenario for said first base protocol to be the failure cause scenario associated with the identified CL-KPI having the highest CL-KPI value.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Venkataraman, Shivakumar
Gogate, Amol Sudhir
Hart, Justin
Sharma, Ashish
Abstract
The present invention relates to communications methods and apparatus for session load balancing among session processing entities. An exemplary method embodiment includes the steps of receiving from a first device at a Signaling Front End Load Balancer (SLB) a first session initiation request destined for a second device; making a first session load balancing decision at the SLB with respect to the received first session initiation request; transmitting the first session initiation request to a first Session Border Controller (SBC) worker based on the first load balancing decision, the first SBC worker being one of a plurality of SBC workers forming a cluster of SBC workers, making a session mismatch determination at the first SBC worker with respect to a first session corresponding to the first session initiation request; and when the session mismatch determination is that a session mismatch has occurred notifying the SLB of the session mismatch.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Nayak, Subhransu S.
Philip, Prince Arimpur Cheerotha
Subramanian, Rajangam
Abstract
The present invention relates to methods and apparatus for detecting, minimizing and/or preventing message processing faults and in particular message processing fault avalanches at a single processing device and among a cluster of message processing devices. An exemplary method embodiment includes: enabling message blocking at a Session Border Controller (SBC) for Session Initiation Protocol (SIP) messages including a first key value in response to a first threshold number of SIP messages including the first key value having caused a SIP message processing failure; receiving, at the SBC, a SIP message including at least one key value; determining if message blocking is enabled for one or more key values included in the SIP message; and dropping by the SBC the SIP message in response to determining that message blocking is enabled for one or more key values included in the SIP message, but otherwise processing the SIP message by the SBC.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bala, Pradeep
Stovenour, Michael
Abstract
Communications methods and apparatus for providing and/or adding STIR/SHAKEN Diversion Information to requests. An exemplary method embodiment includes the steps of: receiving at a second communications network a Session Initiation Protocol (SIP) Invite request from a first communications network, the SIP Invite request being directed to a first SIP address corresponding to a first user equipment device located within the second communications network, the SIP Invite request including a SIP Identity shaken header and one or more SIP Identity div headers; determining at the second communications network whether or not the received SIP Invite request was previously diverted by the second communications network to another network; and when the SIP Invite request is determined to have been previously diverted by the second communications network to another network, processing the SIP Invite request at the second communications network as a previously received and diverted SIP Invite request.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Boyle, Iii, Charles W.
Abstract
Methods and apparatus for implementing and operating malicious transaction detection systems. An exemplary method embodiment includes the steps of: (i) operating, a malicious transaction detection system, to receive communications session establishment data; operating, the malicious transaction detection system, to determine a probability of whether or not the communications session establishment data indicates that the communications session is malicious; and when the determined probability is greater than or equal to a predetermined threshold value determining that a transaction corresponding to the received communications session establishment data is malicious; and when the determined probability is less than the predetermined threshold value determining that the transaction corresponding to the received communications session establishment data is not malicious; and wherein the malicious transaction detection system includes a determination model trained using synthetic communications session data.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Prajapat, Surendra
Sakya, Rumus
Abstract
The present invention relates to methods and apparatus for determining a best or optimal media path or route between communications devices. An exemplary method embodiment of the present invention includes the steps of (i) receiving, at a first communications device, data of a first data communications session, the first data communications session being a first media communications session, the data being media; (ii) selecting an optimal media communications route from a plurality of communications routes between the first communications device and a second communications device; and (iii) communicating the received media of the first media communications session from the first communications device to the second communications device via the selected optimal media communications route. In some embodiments, the optimal media communications route is determined by a UCBot application executing on the first communication device based on media quality metrics for each of the routes determined during test media sessions.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a Virtual Network Function (VNF) manager, managing a VNF that includes a plurality of VNF components running on a plurality of virtual machines, the virtual machines running on a plurality of physical computing machines, and with the VNF manager, causing a Network Function Virtualization Infrastructure (NFVI) to have a total number of virtual machines provisioned, the total number being equal to a number of virtual machines capable of providing for a current demand for VNF components plus an additional number of virtual machines equal to the highest number of virtual machines being provided by a single one of the plurality of physical computing machines.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bollapolli, Nagesh Kumar
Kuriakose, Aby
Abstract
The present invention is directed to communications methods and apparatus for efficiently distributing traffic to processing entities. An exemplary method includes the steps of: receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message; selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP invite message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, the selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and the message allocation rate, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message, and sending the first SIP INVITE message to the first SBC.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Boyle, Charles W.
Kovvali, Surya Kumar
Purayil, Nizar K.
Abstract
A method includes: receiving protocol event data from a plurality of probes within the telecommunication system; determining a most probable cause of a call event from the protocol event data; applying the most probable cause to a trained machine learning algorithm that includes the most probable cause as its input and a telecommunication system score as its output; and in response to an output score from the trained machine learning algorithm, performing a corrective action for a plurality of network users that are expected to be affected by the most probable cause.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Duffy, Mark
Corson, M. Scott
Gahlaut, Siddharth
Asveren, Tolga
Abstract
Methods and apparatus for synchronizing packet streams and in particular to the synchronization of transcoded and/or transrated Real-time Transport Protocol (RTP) packet streams, e.g., transcoded and/or transrated RTP packet streams carrying audio and/or video data. In one embodiment, a packet processing device receives packets of a first RTP packet stream and a first RTCP packet stream and generates a second RTP packet stream from the first RTP packet stream and generates a second RTCP packet stream from the first RTCP packet stream. The second RTP packet stream including packets with timestamps different than packets of the first RTP packet stream. The second RTCP packet stream including NTP timestamps received in or based on the NTP timestamps of the first RTCP packet stream and associated with RTP timestamps corresponding to content in the second RTP packet stream which was generated by transrating or trancoding content in the first RTP packet stream.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Asveren, Tolga
Amritraj, Vijay
Dey, Souvik
Abstract
A method performed by a computing system includes receiving a first request from a first pod being executed on the computing system, responding to the first request with an Internet Protocol (IP) address and a first port range, receiving a second request from a second pod being executed on the computing system, and responding to the second request with the Internet Protocol (IP) address and a second port range that is different than the first port range. The method further includes, with a networking service implemented within the kernel, processing network traffic between external entities and the first and second pods by updating source and destination IP addresses and ports of packets of the network traffic.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Asveren, Tolga
Amritraj, Vijay
Dey, Souvik
Abstract
A method performed by a computing system includes receiving a first request from a first pod being executed on the computing system, responding to the first request with an Internet Protocol (IP) address and a first port range, receiving a second request from a second pod being executed on the computing system, and responding to the second request with the Internet Protocol (IP) address and a second port range that is different than the first port range. The method further includes, with a networking service implemented within the kernel, processing network traffic between external entities and the first and second pods by updating source and destination IP addresses and ports of packets of the network traffic.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Dey, Souvik
St. Pierre, Mark
Karmarkar, Suyash Suhas
Abstract
The present invention relates to methods and apparatus for migrating and/or changing the allocation of network interface(s) or Internet Protocol address(es) of network interface(s) from one Pod, e.g., a failed Pod, to another Pod, e.g., a live Pod, in a Kubernetes system. An exemplary method of operating a Kubernetes system in accordance with an embodiment of the invention includes: establishing, by the Kubernetes system, a first service including a first Pod located on a first node and a second Pod located on a second node, allocating by the Kubernetes system an external network interface including an Internet Protocol address for use by the first Pod, the allocation of said external network interface for use by the first Pod being unknown to a first Kubelet managing the first node; and upon failure of the first Pod, changing allocation of the external network interface from the first Pod to the second Pod.
H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bollapolli, Nagesh Kumar
Kuriakose, Aby
Abstract
The present invention is directed to communications methods and apparatus for efficiently distributing traffic to processing entities. An exemplary method includes the steps of: receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message; selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP invite message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, the selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and the message allocation rate, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message, and sending the first SIP INVITE message to the first SBC.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bala, Pradeep
Abstract
Communications methods and apparatus for preserving STIR/SHAKEN original attestation/signature information for diverted Session Initiation Protocol (SIP) messages and/or calls. An exemplary method embodiment includes the steps of: receiving, at a first Session Border Controller (SBC), a diverted Session Initiation Protocol (SIP) INVITE message corresponding to a first call, the diverted SIP INVITE message not including an Identity header; obtaining an original Identity header or information from the original Identity header corresponding to the first call using one or more of the following: information included in the diverted SIP INVITE message, information included in a Session Description Protocol message included in the diverted SIP INVITE message, an SBC trunk group, or a source Internet Protocol (IP) address transport protocol port of an IP packet carrying the diverted SIP Invite message; and generating an Identity header based on the original Identity header or information from the original identity header.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Nayak, Subhransu S.
Philip, Prince Arimpur Cheerotha
Subramanian, Rajangam
Abstract
The present invention relates to methods and apparatus for detecting, minimizing and/or preventing message processing faults and in particular message processing fault avalanches at a single processing device and among a cluster of message processing devices. An exemplary method embodiment includes: enabling message blocking at a Session Border Controller (SBC) for Session Initiation Protocol (SIP) messages including a first key value in response to a first threshold number of SIP messages including the first key value having caused a SIP message processing failure; receiving, at the SBC, a SIP message including at least one key value; determining if message blocking is enabled for one or more key values included in the SIP message; and dropping by the SBC the SIP message in response to determining that message blocking is enabled for one or more key values included in the SIP message, but otherwise processing the SIP message by the SBC.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Kuppanna, Sridhar
Ahmed, Dilnawaj
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to methods and apparatus for dynamically detecting and/or mitigating threats in communications systems. Exemplary methods and apparatus of the present invention allow for a combination of automated and operator controlled responses to threats. While an operator is provided an opportunity to provide input on how to respond to a threat, after one or more threats of a given type are identified, the system will automatically take corrective action without waiting for operator input and/or in the absence of operator input following notification of a threat.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Abstract
The present invention relates to communications methods and apparatus for determining whether a received call originated from an artificial intelligence system and the call handling procedures to be used on the received call based on whether or not the call was determined to have been originated from an artificial intelligence system. An exemplary method embodiment includes the steps of: receiving a first call; determining whether said first call originated from an artificial intelligence system; and when said first call is determined to have originated from an artificial intelligence system performing one or more artificial intelligence call handling operations.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Boyle, Charles W.
Kowali, Surya Kumar
Purayil, Nizar K.
Ostapenko, Vsevolod V.
Kumaravel, Mahesh
Abstract
A method performed by a computing system that collects information on transactions in a telecommunication system includes receiving an event object. The event object includes parameters associated with a telecommunication event. The method further includes classifying the event object, using a classification mechanism, as one of a plurality of Key Performance Indicators (KPIs) by using the parameters, including considering events from multiple protocols for classifying event objects. The method further includes, after classifying the event object, inferring relationships between a set of inputs and a set of outputs, the set of inputs including information types from the event object and the set of outputs including KPIs.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
52.
Methods and apparatus for detecting, eliminating and/or mitigating split brain occurrences in high availability systems
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Finer, Howard Elliot
Chenji, Hemanth Kumar Yathiraju
Matey, George J.
St. Pierre, Mark
Nayak, Subhransu S.
Abstract
The present invention relates to communications methods and apparatus for detecting and/or mitigating split brain occurrences in high availability systems. A split brain condition being a condition wherein both a standby processing node and another processing node of a cluster of processing nodes included in a high availability system are both operating at the same time in an active mode of operation. An exemplary method embodiment of operating a high availability system including a plurality of processing nodes includes the steps of determining at a standby processing node that a failure condition exists, said standby processing node being one of the cluster of processing nodes; switching the standby processing node from a standby mode of operation to an active mode of operation in response to determining that a failure condition exists; and determining whether the high availability system is experiencing a split brain condition.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
53.
Most probable cause determination for telecommunication events
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Boyle, Charles W.
Kaki, Sreenivas Nvr
Purayil, Nizar K.
Ostapenko, Vsevolod V.
Abstract
A method performed by a computing system includes collecting information on transactions in a telecommunication system, using the information on transactions to create a plurality of event objects, each of the event objects associated with a telecommunication event, associating each of the event objects with a Key Performance Indicator (KPI), applying the event objects to a plurality of inference functions, each inference functions using the set of parameters as inputs and the KPIs of the event objects as outputs to create a model that infers a relationship between the set of parameters and the KPIs, and analyzing metadata from each of the inference functions to determine which of the set of parameters was used to predict an outcome leading to the KPI.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
54.
Communications apparatus, systems, and methods for preventing and/or minimizing session data clipping
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Abstract
The present invention is directed to communications apparatus, systems, and methods for preventing and/or minimizing session data clipping/loss when using the ICE protocol procedures on a session border controller. An exemplary method embodiment of operating a Session Border Controller (SBC) includes, receiving, at the SBC, an initial offer message from a first user equipment device directed to a second user equipment device, said initial offer message including one or more candidate addresses for the first user equipment device; and establishing a data path between the SBC and the second user equipment device in response to receiving said initial offer message prior to establishing a data session between the first user equipment device and the session border controller.
H04L 65/1069 - Session establishment or de-establishment
H04L 61/2575 - NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
H04L 61/2567 - NAT traversal for reachability, e.g. inquiring the address of a correspondent behind a NAT server
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Nayak, Subhransu S.
Chakravarthy, Vijaya Nirmala
Abstract
The present invention relates to methods and apparatus for efficient handling of registration messages by network equipment. An exemplary embodiment includes the steps of: operating network equipment in a first mode of operation; detecting that a first condition exists, switching the network equipment from said first mode of operation to a second mode of operation, said second mode of operation including: receiving a first initial SIP registration request message destined for a registrar; determining an address of record (AOR) value included in the first initial SIP registration request message; determining whether a matching registration record exists for the determined AOR value included in the first initial SIP registration request message; and when the network equipment determines that a matching registration record exists for the determined AOR value included in the initial SIP registration request message, treating said first initial SIP registration request message as a refresh SIP registration message.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Abstract
The present invention is directed to communications apparatus, systems, and methods for preventing and/or minimizing session data clipping/loss when using the ICE protocol procedures on a session border controller. An exemplary method embodiment of operating a Session Border Controller (SBC) includes, receiving, at the SBC, an initial offer message from a first user equipment device directed to a second user equipment device, said initial offer message including one or more candidate addresses for the first user equipment device; and establishing a data path between the SBC and the second user equipment device in response to receiving said initial offer message prior to establishing a data session between the first user equipment device and the session border controller.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Barakat, Lulia Ann
Haltom, Jeffrey
Archer, Duncan
Stovenour, Michael
Asveren, Tolga
Abstract
A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Abstract
The present invention relates to communications methods and apparatus for determining whether a received call originated from an artificial intelligence system and the call handling procedures to be used on the received call based on whether or not the call was determined to have been originated from an artificial intelligence system. An exemplary method embodiment includes the steps of: receiving a first call; determining whether said first call originated from an artificial intelligence system; and when said first call is determined to have originated from an artificial intelligence system performing one or more artificial intelligence call handling operations.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Gogate, Amol Sudhir
Nayak, Subhransu S.
Abstract
The present invention relates to methods, systems and apparatus for providing efficient packet flow fillrate adjustments and providing protection against distributed denial of service attacks. One exemplary embodiment in accordance with the invention is a method of operating a communication system including the steps of receiving, at a session border controller, a first SIP invite request message; making a decision, at the session border controller, as to whether the first SIP invite request originated from an Integrated Access Device or an IP-PBX device; generating, at the SBC, a packet flow fillrate based on said decision as to whether the SIP invite request originated at an Integrated Access Device or an Internet Protocol-Private Branch Exchange (IP-PBX) device.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a Virtual Network Function (VNF) manager that manages a VNF that includes plurality of VNF components running on a plurality of virtual machines, determining that an additional VNF component should be provisioned on an additional virtual machine. The method further includes, in response to the determining that the additional VNF component should be provisioned, instructing a compute controller to provision the additional virtual machine. The method further includes instructing a Software-Defined Networking (SDN) controller to connect the additional virtual machine to a network that interconnects the VNF components, and provisioning the additional VNF component on the additional virtual machine.
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Thornton, Timothy R.
Bharrat, Shaun Jaikarran
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to systems, apparatus and methods for the computation and use of session, device and/or user signatures for determining communications session types, device types, and/or user signatures. An exemplary system in accordance with an embodiment of the invention includes: a first device, the first device including: a receiver that receives a first set of session control messages belonging to a first communications session, said first set of session control messages including at least one session control message; a feature extractor that extracts a first set of device features from the first set of session control messages; and a first neural network that determines a device signature from the first set of session control messages based on said set of device features.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/24 - Arrangements for maintenance or administration
G06N 3/04 - Architecture, e.g. interconnection topology
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
62.
Methods and apparatus for storing and/or retrieving session state information
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Rai, Shambhu Dayal
Abstract
Methods and apparatus related to the storage and/or recovery of session state information are described. A communications server, e.g., a web RTC server, supporting a communications session, stores session state information corresponding to the communications session in a client device, e.g., a user device including a web browser, participating in the communications session. Following a failure of the communications server, the client device establishes a new connection with a replacement communications server and communicates the stored session state information to the replacement communications server. In some embodiments, the session state information is communicated between a communications server and a client device in encrypted form via a secure HTTP web socket connection. In various embodiments, both the communications server and the replacement communications server include or have access to a shared encryption key.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a Virtual Network Function (VNF) manager, managing a VNF that includes a plurality of VNF components running on a plurality of virtual machines, the virtual machines running on a plurality of physical computing machines, and with the VNF manager, causing a Network Function Virtualization Infrastructure (NFVI) to have a total number of virtual machines provisioned, the total number being equal to a number of virtual machines capable of providing for a current demand for VNF components plus an additional number of virtual machines equal to the highest number of virtual machines being provided by a single one of the plurality of physical computing machines.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Thornton, Timothy R.
Bharrat, Shaun Jaikarran
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to systems, apparatus and methods for the computation and use of session, device and/or user signatures for determining communications session types, device types, and/or user signatures. An exemplary method in accordance with an embodiment of the invention includes: receiving a first set of session control messages belonging to a first communications session, the first set of session control messages including at least one session control message; extracting a first set of features from the first set of session control messages; operating one or more neural networks to identify a group session signature to which the first set of session control messages corresponds based on the first set of features, the identified group session signature being one of a plurality of group session signatures.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06N 3/04 - Architecture, e.g. interconnection topology
65.
Key performance indicator anomaly detection in telephony networks
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Abstract
The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary method of operating a system to detect traffic anomalies includes the steps of: inputting input values, said input values including i) a set of key performance indicator values and ii) one or more selector values corresponding to a first anomaly group classification instance into a trained neural network; operating the trained neural network to output values corresponding to the inputted set of key performance indicator values; determining a score for the first anomaly group classification instance based on the output values of the trained neural network corresponding to the key performance indicator values, each of said output values corresponding to one key performance indicator input value; and when the score is above a first threshold determining that an anomaly condition exists with respect to the first anomaly group classification instance.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Sharma, Ashish
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to communications methods, apparatus and systems for providing media micro flow services in a scalable manner using SDN principles. In an exemplary method embodiment a session border controller in a SDN network is operated to receive first signaling information for establishing a first media session, the first media session including a first media packet flow that passes through a first programmable switch of the SDN network; generate instructions to implement a media micro flow service on the first programmable switch through which the first media packet flow passes; and send the instructions to a SDN controller which controls the first programmable switch.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Lubenski, Zeev V.
Abstract
Embodiments of methods and systems for mobility in enterprise networks are presented. The methods and systems described herein provide a mobile wireless device with access to both an enterprise network and an external network by establishing a proxy connection between a gateway component of the enterprise network and a gateway component of the external network. Such embodiments may maintain the security of the enterprise network. Additionally, such embodiments may not require modification of the User Equipment (UE) or of components of the external network. Indeed, the methods and systems may operate transparently to both the UE and to components of the external network.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Finer, Howard Elliot
Chenji, Hemanth Kumar Yathiraju
Matey, George J.
St. Pierre, Mark
Nayak, Subhransu S.
Abstract
The present invention relates to communications methods and apparatus for detecting and/or mitigating split brain occurrences in high availability systems. A split brain condition being a condition wherein both a standby processing node and another processing node of a cluster of processing nodes included in a high availability system are both operating at the same time in an active mode of operation. An exemplary method embodiment of operating a high availability system including a plurality of processing nodes includes the steps of determining at a standby processing node that a failure condition exists, said standby processing node being one of the cluster of processing nodes; switching the standby processing node from a standby mode of operation to an active mode of operation in response to determining that a failure condition exists; and determining whether the high availability system is experiencing a split brain condition.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
69.
Communications methods and apparatus for dynamic detection and/or mitigation of anomalies
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Abstract
The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary method embodiment includes the steps of: (i) storing a set of N key performance indicator (KPI) models; (ii) associating each of a plurality of recurring time slots of a recurring time frame on a per group member basis with one of the N KPI models wherein the associating including associating a first group member of a first group and a first recurring time slot with a first one of the N models, the first one of the N models being a first model; (iii) receiving event data for the first group member for a first time period; and (iv) determining based on the first model if a key performance indicator value for the first group member and first time period is anomalous.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a distributed telecommunication component, providing a plurality of first type nodes, each first type node configured to perform a signaling function. The method further include, with the distributed telecommunication component, providing a plurality of second type nodes, each second type node configured to perform a media bearing function. At least one of the plurality of bearer nodes is geographically separate by a predetermined distance from at least one of the plurality of control nodes.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Abstract
The present invention relates to communications methods and apparatus for determining whether a received call originated from an artificial intelligence system and the call handling procedures to be used on the received call based on whether or not the call was determined to have been originated from an artificial intelligence system. An exemplary method embodiment includes the steps of: receiving a first call at a communications device including a first artificial intelligence system; determining whether said first call originated from a second artificial intelligence system; and when said first call is determined to have originated from a second artificial intelligence system performing one or more artificial intelligence call handling operations.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Rai, Shambhu Dayal
Abstract
Methods and apparatus related to the storage and/or recovery of session state information are described. A communications server, e.g., a web RTC server, supporting a communications session, stores session state information corresponding to the communications session in a client device, e.g., a user device including a web browser, participating in the communications session. Following a failure of the communications server, the client device establishes a new connection with a replacement communications server and communicates the stored session state information to the replacement communications server. In some embodiments, the session state information is communicated between a communications server and a client device in encrypted form via a secure HTTP web socket connection. In various embodiments, both the communications server and the replacement communications server include or have access to a shared encryption key.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
73.
Highly scalable methods and apparatus for balancing sip loads across a cluster of sip processing entities
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Kuriakose, Aby
Abstract
Methods, apparatus and systems for load balancing Session Initiation Protocol session transactions among a self-organized cluster of SIP processing devices. An exemplary method embodiment includes the steps of dynamically forming a load balancing cluster of SIP processing devices from a plurality of SIP processing devices, said cluster of SIP processing devices being self-organized; dynamically building a communications network, by said cluster of SIP processing devices, for distributing session transaction load state information among the SIP processing devices in the cluster; and each of the SIP processing devices of the cluster asynchronously determining session transaction load state information on a recurring basis reflecting its current session transaction load state. In some embodiments, the SIP processing devices are session border controllers.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computerised telephony services Software as a service (SAAS) services featuring software for telecommunications service providers to authenticate and verify caller identification
75.
Methods and apparatus for communicating delay information and minimizing delays
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Abstract
Features relating to communicating delay information and minimizing aggregate processing delays corresponding to content streams, e.g., audio and video streams, in a multi-media communication session while still achieving stream synchronization, are described. Some embodiments are well suited for systems where video and audio streams are transcoded by different entities. In some embodiments downstream entities, e.g., transcoder and/or receiving end device, are informed about the delay introduced to at least one stream by one or more upstream devices, e.g., a transcoder. The downstream entity synchronizes the received content streams by adding artificial latency as needed to the relevant one of the streams based on the received delay information thereby avoiding unnecessary introduction of artificial delays at every transcoding node in the path. Received delay information for a content stream may indicate one or more individual transcoding delays introduced into the stream or an aggregate of transcoding delays introduced into the stream.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bollapalli, Nagesh Kumar
Sharma, Ashish
Ravi Kiran, Pendyala Satya
Abstract
The present invention is directed to methods, apparatus and systems for optimizing media paths in communications networks. An exemplary embodiment includes the steps of a first SBC (SBC1) receiving a session request including a SDP offer for a session between first and second devices including media stream(s), said request being sent by a second SBC (SBC2) and traversing a portion of a signaling path including intermediary device(s), determining that media stream(s) should bypass one or more of the intermediary device(s), generating and transmitting to SBC2 from SBC1 a SDP answer including at least one of: (i) all SDP media descriptor transport addresses being set to zero; (ii) all SDP media stream connection values being set to 0.0.0.0 and at least one media transport address being non-zero; or (iii) header information or SDP information indicating that at least one intermediary device should be bypassed for the one or more media streams.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
77.
Communications methods and apparatus for dynamic detection and/or mitigation of threats and/or anomalies
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Kuppanna, Sridhar
Ahmed, Dilnawaj
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to methods and apparatus for dynamically detecting and/or mitigating threats in communications systems. Exemplary methods and apparatus of the present invention allow for a combination of automated and operator controlled responses to threats. While an operator is provided an opportunity to provide input on how to respond to a threat, after one or more threats of a given type are identified, the system will automatically take corrective action without waiting for operator input and/or in the absence of operator input following notification of a threat.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Kuppanna, Sridhar
Ahmed, Dilnawaj
Bharrat, Shaun Jaikarran
Thornton, Timothy R.
Hart, Justin
Riley, Kevin
Abstract
The present invention relates to methods and apparatus for dynamically detecting and/or mitigating threats in communications systems. Exemplary methods and apparatus of the present invention allow for a combination of automated and operator controlled responses to threats. While an operator is provided an opportunity to provide input on how to respond to a threat, after one or more threats of a given type are identified, the system will automatically take corrective action without waiting for operator input and/or in the absence of operator input following notification of a threat.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Bharrat, Shaun Jaikarran
Chen, Tie Ju
Abstract
The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary embodiment includes the steps of: processing a set of call detail records (CDRS), each CDR in said set of CDRs corresponding to an individual call and including multiple information fields providing information about the individual call to which the CDR corresponds, said processing including: generating from said CDRs, on a per CDR basis one or more Field GroupIDs using a hash function; generating for CDRs corresponding to a first Field GroupID a first set of key performance indicators (KPIs), said first set of (KPIs) including one or more KPIs corresponding to the first Field GroupID, said one or more KPIs including at least a first KPI; and determining that a first KPI violation has occurred for the first Field GroupID when the first KPI exceeds a dynamic performance threshold.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Mumford, Keith A.
Agrawal, Satish
Wallis, Mark
Abstract
Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use SIM-based authentication due to being forbidden access to a SIM-based key are provided an alternate secret key for use in an EAP-AKA or EAP-SIM type procedure according to embodiments. An authentication server or other backend authentication infrastructure of embodiments requests authentication vectors from a backend system sharing the alternative secret key. Accordingly, the backend authentication platform of embodiments is adapted to know or detect that an application is using an alternative secret key (e.g., a secret key other than the SIM-based secret key) and to perform the appropriate procedure for the key type.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
81.
Highly scalable methods and apparatus for balancing SIP loads across a cluster of SIP processing entities
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Kuriakose, Aby
Abstract
Methods, apparatus and systems for load balancing Session Initiation Protocol session transactions among a self-organized cluster of SIP processing devices. An exemplary method embodiment includes the steps of dynamically forming a load balancing cluster of SIP processing devices from a plurality of SIP processing devices, said cluster of SIP processing devices being self-organized; dynamically building a communications network, by said cluster of SIP processing devices, for distributing session transaction load state information among the SIP processing devices in the cluster; and each of the SIP processing devices of the cluster asynchronously determining session transaction load state information on a recurring basis reflecting its current session transaction load state. In some embodiments, the SIP processing devices are session border controllers.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Bollapalli, Nagesh Kumar
Abstract
The present invention relates to communications methods, apparatus and systems for efficiently managing NAPT bindings and mappings. An exemplary embodiment of operating a communication system includes the steps of (i) receiving, at a real-time communications entity, a media session offer from a device, (ii) transmitting, from the communications entity to a Network Address and Port Translation entity (NAPT), a request signal to allocate a public Internet Protocol (IP) address and port number pair corresponding to an interface on the NAPT for the session; (iii) determining, at the communications entity, a remote IP address and port number pair corresponding to an interface on the device to be used for communicating media of the media session; (iv) transmitting, from the communications entity to the NAPT, a signal identifying the determined remote IP address and port number pair; and (v) releasing, at the NAPT, the allocated public IP address and port number pair.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Gogate, Amol Sudhir
Nayak, Subhransu S.
Abstract
The present invention relates to methods, systems and apparatus for providing efficient packet flow fillrate adjustments and providing protection against distributed denial of service attacks. One exemplary embodiment in accordance with the invention is a method of operating a communication system including the steps of receiving, at a session border controller, a first SIP invite request message; making a decision, at the session border controller, as to whether the first SIP invite request originated from an Integrated Access Device or an IP-PBX device; generating, at the SBC, a packet flow fillrate based on said decision as to whether the SIP invite request originated at an Integrated Access Device or an Internet Protocol-Private Branch Exchange (IP-PBX) device.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Caron, Francois
Abstract
According to one example, a method includes processing a communication session with a first virtual machine of a plurality of virtual machines associated with a network node and monitoring packet loss on a leg of the communication session between a first endpoint and a second endpoint. The method further includes, in response to determining that the packet loss exceeds a first threshold, toggling on an enhanced mode for a codec associated with the communication session, the enhanced mode providing increased error resilience. The method further includes, in response to determining that the toggling on the enhanced mode causes the first virtual machine to exceed a processing capacity threshold, moving the communication session to a second virtual machine of the plurality of virtual machines.
H04M 7/00 - Arrangements for interconnection between switching centres
G10L 19/24 - Variable rate codecs, e.g. for generating different qualities using a scalable representation such as hierarchical encoding or layered encoding
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
G10L 19/22 - Mode decision, i.e. based on audio signal content versus external parameters
G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
85.
System, methods, and computer program products for selecting codec parameters
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Caron, Francois
Abstract
Embodiments provide systems, methods, apparatus, and computer program products for selecting codec parameters to satisfy one or more operating constraints. An example method performed by a network component that facilitates a communication session set-up process among endpoints in a communication network, the method includes: during the communication session set-up process, determining a utilization factor of the network component; selecting a value for sampling frequency associated with a first codec in response to determining the utilization factor; negotiating use of the first codec and the value for sampling frequency with a first endpoint and negotiating use of a second codec with a second endpoint; and transcoding a media stream of a communication session between the first endpoint and the second endpoint according to the first codec and the value for sampling frequency and the second codec.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Miller, Paul
Abstract
A method includes provisioning a first Virtual Network Function (VNF) component on a first virtual machine, the first virtual machine being supported by a first physical computing system, provisioning a second VNF component directly on a second physical computing system, and using, within a telecommunications network, a VNF that includes both the first VNF component running on the first virtual machine and the second VNF component running directly on the second physical computing system. The method further includes, with a VNF manager, determining that a third VNF component should be provisioned, and in response to determining that the third VNF component is capable of utilizing a hardware accelerator associated with a third physical computing system, implementing the third VNF component on the third physical computing system.
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Isacks, Kevin Neil
Neyen, Lisa Villa
Rai, Shambhu Dayal
Thornton, Timothy R.
Abstract
Methods and apparatus for deriving and/or generating, user presence information from communication signals monitored by a SBC or PRI Gateway and aggregating and/or distributing the user presence information. An exemplary method embodiment includes the steps of storing a plurality of user profile records, each of the user profile records mapping contact information for a user to one or more user identifiers corresponding to the user; receiving first signaling information; determining a first user corresponding to the first signaling information by comparing at least a first portion of the information contained in the first signaling information to at least a first portion of the information contained in the plurality of user profiles; and generating presence status information for the first user and communicating the first presence status information to a presence server as presence status information corresponding to a first user identifier, said first user identifier corresponding to said first user.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04M 7/12 - Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
H04M 1/253 - Telephone sets using digital voice transmission
H04M 1/247 - Telephone sets including user guidance or feature selection means facilitating their use
H04M 7/00 - Arrangements for interconnection between switching centres
H04M 3/42 - Systems providing special services or facilities to subscribers
88.
Methods and apparatus for supporting encoding, decoding and/or transcoding of content streams in a communication system
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Dutta, Biswanath
Venkataraman, Shivakumar
Pillim, Sathish
Abstract
Methods and systems for supporting parallel processing utilizing Central Processing Unit(s) (CPU(s)) and at least one Graphics Processing Unit (GPU) device to provide high scale processing of content streams. An exemplary method embodiment including the steps of: receiving at a CPU multiple data units corresponding to a first frame time for each of first through Nth content streams; sequentially processing by the CPU data units corresponding to different content streams and the first frame time; operating a set of cores of a GPU, in parallel, to perform processing on a set of data units, processing including operating each core of the set of cores to perform an operation on a data unit corresponding to a single one of the first plurality of content streams, each core in the set of cores processing a data unit of a different content stream, said processing generating a set of generated data units.
G10L 19/008 - Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
G06F 15/78 - Architectures of general purpose stored program computers comprising a single central processing unit
G06T 1/20 - Processor architecturesProcessor configuration, e.g. pipelining
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Dutta, Biswanath
Venkataraman, Shivakumar
Kumar, Christ John
Selvaraj, Pradheep
Abstract
Context values used by filters corresponding to different streams are stored in an interleaved manner in a block of contiguous memory locations, e.g., of a buffer, to facilitate coalesced access of data units, e.g., context values, corresponding to different channels to facilitate filtering of multiple streams, e.g., audio streams, in parallel using a graphics processing unit. Context values corresponding to different channels are intentionally grouped together on an interleaved per channel basis in staging memory. This allows context values for multiple different streams to be transferred, e.g., loaded, as a single block e.g., with a context value of each different channel being loaded into a different GPU core. By organizing the context values to facilitate GPU processing, device operation is improved and execution efficiency is achieved as compared to what would be the case if multiple non-contiguous memory locations had to be implemented to load the cores of the GPU.
G10L 19/008 - Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
G06F 15/78 - Architectures of general purpose stored program computers comprising a single central processing unit
Ribbon Communications Operating Company, Inc. (USA)
Inventor
May, Karl
Mckee, Alan
Graham, Trevor
King, Richard
Walker, Scott
Myslinski, Piotr
Abstract
The present invention includes various novel systems and methods for communication in a network. A System Environment Monitor is employed in some embodiments to extract from the network both real-time and historical Network Metrics at the Infrastructure Layer, as well as Application Metadata at the Application Layer. Network analytics facilitate decisions based upon the differing characteristics of Application Components and lower-level hardware components across multiple DTTs. In response, an SDN Controller generates modified sets of SDN Flows, and implements them in real time across a mixed technology (multi-DTT) network in a manner that avoids disrupting existing SDN Flows and other real-time network traffic.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Abstract
Methods, apparatus, and systems for determining during call setup whether or not to introduce an Access Transfer Gateway into a call path between devices based on a geographical indication of the position of one of the devices.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Miller, Paul
Abstract
A method includes, with a Virtual Network Function (VNF) manager that manages a VNF that includes plurality of VNF components running on a plurality of virtual machines, determining that an additional VNF component should be provisioned on an additional virtual machine. The method further includes, in response to the determining that the additional VNF component should be provisioned, instructing a compute controller to provision the additional virtual machine. The method further includes instructing a Software-Defined Networking (SDN) controller to connect the additional virtual machine to a network that interconnects the VNF components, and provisioning the additional VNF component on the additional virtual machine.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Asveren, Tolga
Riley, Kevin
Malek, Dan
Abstract
The present invention relates to communications methods, apparatus and systems for determining and using Software Defined Networking (SDN) communications link and path status information. An exemplary embodiment of a method of operating a Session Border Controller (SBC) in a software defined network (SDN) includes: determining application level metrics at a SBC for a data communications flow and transmitting the application level metrics to a SDN controller. An exemplary embodiment of a method of operating a software defined networking (SDN) controller in a software defined network includes the steps of receiving, at a receiver of the SDN controller via the software defined network, application level metrics corresponding to a data communications session flow; and determining, by the SDN controller, the status of a communications path between two Internet Protocol addresses based on the received application level metrics. Exemplary apparatus embodiments include an SDN controller and SBC controller implementing the exemplary methods.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Chen, Tie Ju
Abstract
The present invention relates to communications methods and apparatus dynamically detecting and/or mitigating anomalies in communications systems/networks. An exemplary embodiment includes the steps of: processing a set of call detail records (CDRS), each CDR in said set of CDRs corresponding to an individual call and including multiple information fields providing information about the individual call to which the CDR corresponds, said processing including: generating from said CDRs, on a per CDR basis one or more Field GroupIDs using a hash function; generating for CDRs corresponding to a first Field GroupID a first set of key performance indicators (KPIs), said first set of (KPIs) including one or more KPIs corresponding to the first Field GroupID, said one or more KPIs including at least a first KPI; and determining that a first KPI violation has occurred for the first Field GroupID when the first KPI exceeds a dynamic performance threshold.
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Miller, Paul
Abstract
A system includes a first control node, the first control node configured to establish communication sessions between endpoints. The system further includes a second control node, the second control node configured to establish communication sessions between endpoints. The system further includes a first bearer node comprising a first media gateway having a first virtual media gateway and a second virtual media gateway, the first virtual media gateway configured to provide access to media resources of the first bearer node to the first control node and the second virtual media gateway configured to provide access to media resources of the first bearer node to the second control node.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bharrat, Shaun Jaikarran
Chen, Tie Ju
Kuppanna, Sridhar
Asveren, Tolga
Abstract
The present invention relates to methods, systems and apparatus for identifying and acting upon suspect robocalls. An exemplary method embodiment includes the steps of processing call records of a customer to identify calls which are possibly from a robocaller, based on at least one of i) a call characteristic or ii) a call pattern; storing calling party source identification information of the identified calls in a suspect robocall database; processing an incoming call, said processing including comparing calling party source identification information of an incoming call to the calling party source identification information in the suspect robocall database; and completing the incoming call in a standard manner if the incoming call is not in the suspect robocall database; and handling the call as a suspect robocall if the incoming calling party source identification information is in the suspect robocall database.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Isacks, Kevin Neil
Neyen, Lisa Villa
Rai, Shambhu Dayal
Thornton, Timothy R.
Abstract
Methods and apparatus for deriving and/or generating, user presence information from communication signals monitored by a SBC or PRI Gateway and aggregating and/or distributing the user presence information. An exemplary method embodiment includes the steps of storing a plurality of user profile records, each of the user profile records mapping contact information for a user to one or more user identifiers corresponding to the user; receiving first signaling information; determining a first user corresponding to the first signaling information by comparing at least a first portion of the information contained in the first signaling information to at least a first portion of the information contained in the plurality of user profiles; and generating presence status information for the first user and communicating the first presence status information to a presence server as presence status information corresponding to a first user identifier, said first user identifier corresponding to said first user.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04M 7/12 - Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
98.
Methods, apparatus and systems to increase media resource function availability
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Hart, Justin
Sharma, Ashish
Bollapalli, Nagesh Kumar
Abstract
Communications methods, apparatus and systems for detecting a status condition indicative of a failure of a media processing entity and providing media redirection to increase media resource function availability. One embodiment of the present invention is a method that includes directing, by a first Session Border Controller (SBC), a first media call flow of a first call through a first media content processing entity to a second SBC, detecting, at one of said first or second SBCs, a status condition indicative of a failure condition for the first media content processing entity, and redirecting, by the SBC that detects the status condition indicative of a failure condition, the first media call flow for the first call so that the first media call flow passes through a second media content processing entity instead of through the first media content processing entity without terminating the first call.
Ribbon Communications Operating Company, Inc. (USA)
Inventor
Bollapalli, Nagesh Kumar
Sridhar, Anuradha
Patel, Rajiv Harish
Bala, Pradeep
Abstract
Systems, methods, and computer-readable storage media are disclosed which provide improved performance for packet switched (PS)-to-PS handovers. Embodiments provide for improved handover operations by utilizing registration refreshing techniques to reduce the time required to complete signaling and registration of a UE over a target access in connection with a handover of a communication session from a serving access to the target access. Embodiments further provide improved handover operations that eliminate the exchange of signaling information with a remote UE in connection with a handover of a communication session from a serving access to the target access. Further, handover operations are processed by a network node that is closer to the UE requesting the handover (e.g., the network node may be an Access-SBC/P-CSCF that operates between a core network and the UE).
RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (USA)
Inventor
Caron, Francois
Abstract
A method includes, with a computing system, receiving a plurality of packets for transcoding, the plurality of packets comprising a first set of packets having data in a first format and a second set of packets having data in a second format, with the computing system, placing the first set of packets in a first queue, the first queue comprising packets from more than one communication session, with the computing system, placing the second set of packets in a second queue, the second queue having packets from more than one communication session, with the computing system, processing packets of the first queue with a graphics processing unit, and with the computing system, after processing the packets of the first queue with the graphics processing unit, processing packets of the second queue with the graphics processing unit.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream