One or more computing devices, systems, and/or methods for low power consumption geofencing are provided. During a learning phase, a model is generated to determine whether a device is within a geofence. In response to receiving a first lookup location request, location identification logic is used to determine a first device location and a determination is made as to whether the device is within the geofence. First radio signal information associated with determining the first device location is recorded within a training data structure used to create the model. In response to receiving a second lookup location request after the learning phase, the model is used to determine whether the device is within the geofence. An output by the model is used if a confidence level is above a threshold, otherwise, the location identification logic is used.
G08B 21/02 - Alarms for ensuring the safety of persons
G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
2.
METHOD AND SYSTEM FOR RADIO ACCESS TECHNOLOGY TYPE MONITORING EVENT SERVICE
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an RAT type monitoring event service. The RAT type monitoring event service may include providing a current RAT type associated with an end device and a network to an application function. The RAT type monitoring event service may also include providing a notification to the application function when the end device changes its RAT type. The current RAT type may be used by the application function to perform a network operation or procedure. The application function may subscribe to a monitoring and event notification associated with the RAT type monitoring event service.
A system described herein may maintain User Equipment (“UE”) context information associated with one or more communication sessions between a particular UE and a wireless network, and may detect that one or more triggering events have occurred with respect to the particular UE or the one or more communication sessions. The system may output, based on detecting the one or more triggering events, a status update request. The request may include an identifier of the particular UE and/or an identifier of a particular communication session between the particular UE and the wireless network. The system may receive a response to the status update request, and may selectively remove at least a portion of the maintained UE context information, associated with the one or more communication sessions between the particular UE and the wireless network, based on the response to the status update request.
The present teaching relates to customer service with AI-based automated auditing on agent fraud. Real-time features of a communication between an agent and a customer are obtained. To detect agent fraud, a batch feature vector is computed based on real-time features extracted from communications involving the agent and accumulated over a batch period. Agent fraud is detected based on a model and the detection result is used to audit the agent for service performance.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
5.
SYSTEMS AND METHODS FOR PROVIDING ANALYTICS FROM A NETWORK DATA ANALYTICS FUNCTION BASED ON NETWORK POLICIES
A network device may establish an interface with a unified data management (UDM) device, and may utilize the interface to register with the UDM device and to provide, to the UDM device, registration data identifying an association between the network device and a user equipment (UE). The network device may provide policy data to a network data analytics function (NWDAF) that identifies the network device based on the registration data, and may receive, from the NWDAF, analytics calculated based on the policy data. The network device may perform one or more actions based on the analytics.
The present teaching is directed to network capacity planning based on denoised user clusters and network element clusters. Collected information representing characteristics and activities of users and characteristics and performance of network elements is used to cluster users and network elements to generate initial user clusters and initial network element clusters, each of which is denoised in an iterative process to derive denoised subclusters that have no impure subclusters therein. Network capacity planning is performed based on correlations identified between denoised user subclusters and denoised network element subclusters.
A system described herein may identify a chaincode record recorded to a blockchain, and may output chaincode discovery information to a chaincode discovery system. A client device may receive the chaincode discovery information from the chaincode discovery system, and may output a request to invoke the chaincode. The system may obtain verification, from the chaincode discovery system, that the client device is authorized to invoke the chaincode, and may instruct a node that maintains the blockchain to execute the chaincode. The system may receive output values resulting from executing the chaincode and may output, to the client device, the output values resulting from executing the chaincode.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
8.
SYSTEMS AND METHODS FOR RADIO ACCESS NETWORK SERVICE FEASIBILITY ASSESSMENT
A device may include a processor configured to obtain requirements for a wireless communication service to be deployed on a carrier on a sector of a base station and obtain key performance indicator (KPI) values for the carrier on the sector of the base station. The processor may be further configured to use a trained machine learning model to determine a required capacity and a predicted average latency for the wireless communication service based on the obtained requirements and the obtained KPI values; determine that the wireless communication service satisfies a deployment requirement to be deployed on the carrier on the sector of the base station based on the determined required capacity and the predicted average latency; and deploy the wireless communication service on the carrier on the sector of the base station, in response to determining that the wireless communication service satisfies the deployment requirement.
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
9.
SYSTEMS AND METHODS FOR SERVICE CENTER CONTROL AND MANAGEMENT
Disclosed are systems and methods for a computerized framework enacted by service contact centers that provides a proactive and adaptive response system that accurately identifies security and/or legal concerns of service requests, and enables artificial intelligence/machine learning (AI/ML)-based mechanisms for dynamically addressing the underlying technical and/or service related concerns of such service requests. The disclosed framework can computationally determine how effective service agents have been, and are currently being in curating solutions/responses to each customer service call, which can enable modified functionality for the customer as well as curated services based on how sufficiently handled the service call was responded to by the agent. The disclosed systems and methods provide a generative service call experience that can improve agent performance while reducing the strain on user experience, both during and/or after service calls.
Systems and methods described provide a multiple-input multiple-output (MIMO) optimization service. A network device in a RAN predicts high usage thresholds and available per-service resources for supporting MIMO transmissions. The network device identifies, based on the predicted usage thresholds, user equipment (UE) devices that have a high-throughput session and have high usage levels on a cell. The network device assigns, based on the predicted available per-service resources, sounding reference signal (SRS)-based MIMO resources to the UE devices in the cell and assigns codebook-based MIMO resources to other UE devices in the cell.
In some implementations, a session management function (SMF) may transmit, to a network data analytics function (NWDAF), an analytics message that requests or subscribes to analytics for user equipment (UE) to user plane function (UPF) (UE-to-UPF) latency. The SMF may receive, from the NWDAF, analytics information in response to the analytics message, wherein the analytics information indicates present or future predicted UE-to-UPF latency information for one or more of a downlink direction or an uplink direction. The SMF may transmit a session modify message to modify a protocol data unit (PDU) session, wherein the PDU session is to be modified based on a UPF selection, and the UPF selection is based on the analytics information.
One or more computing devices, systems, and/or methods for low power consumption geofencing are provided. Location determination facilities used during a past number of device location lookups over a timeframe are tracked. If a geofence is actively set and movement of a device has triggered execution of location identification logic, then a determination is made as to whether a particular location determination facility was used during the past number of device location lookups over the timeframe. If the particular location determination facility was used during the past number of device location lookups over the timeframe, then an original sequence of location determination facilities attempted by the location identification logic is modified to create a modified sequence of location determination facilities used to determine a current device location of the device. Otherwise, the original sequence of location determination facilities is used to determine the current device location of the device.
One or more computing devices, systems, and/or methods for upgrading sites of a communication network are provided. Operational information of network functions within a communication network are tracked within a data repository. An upgrade ruleset is defined for identifying sites within a communication network to upgrade. The operational information, the upgrade ruleset, and model rules generated by a model for a set of candidate sites are processed to generate a positive list of sites to upgrade and a negative list of sites to not upgrade. The negative list of sites and criteria used to determine that the negative list of sites are not being upgraded are provided such as to a user. An upgrade process is performed to upgrade the sites within the positive list of sites.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Systems and methods enable dynamic network function management, including obtaining user input data identifying network slice provisioning parameters for a creation of a network slice in a network; sending a request for a network repository function (NRF) instance for the network slice, to an orchestrator; receiving, from the NRF instance, a verification message of the creation of the network slice; sending, to the orchestrator, a request for a creation of multiple network function (NF) instances according to the network slice provisioning parameters; receiving, from the orchestrator, a verification message of the creation of the NF instances for the network slice; receiving, from the NRF, a confirmation message of a registration of the NF instances for the network slice; sending slice-specific subscriber provisioning data to a user data instance provisioned for the network slice; and generating a network slice creation confirmation message identifying the network slice.
In some implementations, a domain name system (DNS) server may receive, from a user equipment (UE), a DNS request message that indicates location information. The DNS server may select a node for the UE based on the location information. The DNS server may transmit, to the UE, an indication of the node.
H04W 40/20 - Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
H04W 8/26 - Network addressing or numbering for mobility support
A device may include a processor. The processor may be configured to: determine whether a network demand for the device to send or receive data is below a threshold; if the network demand is below threshold, determine whether a network to which the device is wirelessly connected is congested; and when it is determined that the network is not congested, decrease processing capabilities at the device to process the network demand.
A device may receive global metadata terms and aliases, group level metadata terms and aliases, and user level metadata terms and aliases, and may generate global metadata graphs, group level metadata graphs, and user level metadata graphs. The device may train natural language understanding (NLU) models with the global metadata graphs, the group level metadata graphs, and the user level metadata graphs to generate trained NLU models, and may receive a search request from a user. The device may assign a level to the user and an identifier within the level based on a confidence and prior interactions associated with the user, and may select an NLU model from the trained NLU models based on the level and the identifier assigned to the user. The device may process the search request, with the NLU model, to generate search results, and may perform actions based on the search results.
A method, a device, and a non-transitory storage medium are described in which an inter-operator mobility service is provided. The service may provide provisioning decisions and configurations that may include core devices that are shared between users of a first entity and users of a second entity or are dedicated to the users of an entity to support a network slice and/or access to an application service for end devices. The service may manage access and use of radio frequencies associated with the first and second entities based on subscription information and location of the end devices associated with first and second entities. The service may further include enabling inter-network handovers associated with end devices.
One or more computing devices, systems, and/or methods for locating subscriber information are provided. When a trigger event occurs within a communication network (e.g., a network outage where a provisioning component is unable to provision a subscriber with a subscriber location service), the subscriber location service is transitioned from a first mode of operation to a second mode of operation. While in the second mode of operation, the subscriber location service responds to requests from a network repository service with an indicator when a subscriber cannot be found. The indicator triggers the network repository service to select and recommend one or more data stores of subscriber information for a network function to attempt for accessing the subscriber information. The network repository service may provide retry instructions to the network function for retrying the attempts to access the subscriber information one or more times.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an application authorization service. The application authorization service may be performed at an end device and invoked responsive to the launching of an application. The application authorization service may include validating an application certificate associated with the application, validating an attestation value, and validating a token provided by the application. The application may provide a request that includes an application identifier and a token. The application may be granted access to a network or denied access depending on the outcome of the validation procedures. The granted access may include assignment of a network slice. The application certificate, a secured token, and a secured attestation value may be stored in a secure environment at the end device and used for validation procedures.
A system described herein may maintain a set of Quality of Service (“QoS”) parameters associated with a particular User Equipment (“UE”). The system may provide the set of QoS parameters to a policy element of a wireless network, wherein the wireless network establishes a first dedicated bearer with the particular UE, which may be associated with the set of QoS parameters. The system may receive, after the first dedicated bearer is established, information indicating an occurrence of a particular event associated with the particular UE, and may output, to a policy element of the wireless network, a request to establish a second dedicated bearer with the particular UE. The wireless network may establish the second dedicated bearer with the particular UE, which may be associated with the set of QoS parameters.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a low latency, low loss, and scalable throughput (LI4S)-triggered prioritized connection service. The LI4S-triggered prioritized connection service may enable an evolved packet data gateway (ePDG) to provision prioritized and non-prioritized tunnels with end devices via untrusted wireless local area networks. The prioritized tunnel may support LI4S or another quality of service in which the ePDG may provide prioritized data forwarding. The end device may transmit a request that includes priority data.
In some implementations, a radio access network (RAN) intelligent controller (RIC) associated with a core network may identify one or more controls for controlling a RAN at two or more of a cell level, a slicing level, a user equipment (UE) grouping level, or a quality of service (QOS) level. The RIC may transmit, to one or more of a radio unit (RU) associated with the RAN, a distributed unit (DU) associated with the RAN, a centralized unit (CU) associated with the RAN, or a network management system (NMS), signaling associated with the one or more controls.
A device may receive, before a time period, current capacity data associated with sectors of an FWA network and qualified sector data identifying qualified sectors of FWA devices associated with the FWA network, and may receive, over the time period, FWA data associated with the FWA devices and corresponding sectors. The device may apply rules to the FWA data to generate modified FWA data, and may calculate maximum data volumes during the time period for the FWA devices based on the modified FWA data. The device may assign actual sectors to the FWA devices based on the maximum data volumes, and may compare the qualified sectors and the actual sectors to identify modified sectors. The device may modify the current capacity data based on the modified sectors and to generate modified capacity data associated with the sectors, and may perform actions based on the modified capacity data.
Systems and methods are provided to enable mobile network operators to dynamically determine when a Low-Latency, Low-Loss Scalable-Throughput (L4S) service shall be enabled for a data flow. A network device in a core network receives a request for a Quality of Service (QoS) flow associated with a user equipment (UE) device; determines whether to enable a LS4 service for the QoS flow; and notifies, based on the determining, a Session Management Function (SMF) to create the QoS flow with L4S service enabled.
A device may include a processor. The processor may be configured to receive, from the User Equipment device (UE), over a network, a registration request that includes a list of network slices requested by the UE; request a network component to provide a list of network slices to which the UE is subscribed; obtain a list of replacement network slices for replacing one or more of the list of network slices when one or more of the list of network slices become unavailable for a session with the UE; obtain a second list of network slices, which are allowed by the network to establish a session with the UE, based on the list of network slices and the list of replacement network slices; and send the second list of network slices to the UE.
A network function virtualization (NFV) orchestration service includes a centralized orchestration device and a multi-cluster container management (MCCM) platform. The centralized orchestration device stores a catalog of virtual network function descriptors (VNFDs) in an input language; generates, based on the catalog of VNFDs, intents for containerized network function (CNF) services; and stores the generated intents as blocks in a central intent database, wherein the blocks include an input data model for the CNF services. The MCCM platform includes one or more processors to receive and store a copy of the intent database; read design time policies from the copy of the intent database; and convert the input data model into a vendor-specific output data model in an output language.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Arranging, organizing, conducting, and hosting social entertainment events; Arranging and conducting special events for social entertainment purposes; Organizing cultural and arts events; Live music performances
29.
SYSTEMS AND METHODS FOR USING A UNIQUE ROUTING INDICATOR TO CONNECT TO A NETWORK
In some implementations, a device of a network may receive, from a user equipment (UE), a request associated with enabling the UE to access a network, wherein the request includes a first routing indicator. The device may identify an authentication manager, of the network, that is mapped to the first routing indicator in an entry of a routing table of the network. The device may route the request to the authentication manager of the network to permit the authentication manager to authenticate the UE. The device may purge, based on the request being routed to the authentication manager, the entry to remove the first routing indicator from the routing table. The device may store, after purging the entry, a second routing indicator in the entry to map the second routing indicator to the authentication manager, wherein the second routing indicator is different from the first routing indicator.
A device may receive a MAC address and MAC integer of a network device newly provided in a network relative to existing network devices, existing IP addresses associated with the existing network devices, and a list of available IP addresses. The device may convert the available IP addresses into integers, and may select a first available IP address. The device may identify a first integer of the first available IP address, and may combine the first integer and the MAC integer to generate a network device integer. The device may identify an IP address for the network device based on the network device integer, and may process the IP address and the existing IP addresses, with a machine learning model, to determine that the IP address is not duplicative of one of the existing IP addresses. The device may assign the IP address to the network device.
H04L 61/5046 - Resolving address allocation conflictsTesting of addresses
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
H04W 28/02 - Traffic management, e.g. flow control or congestion control
31.
SYSTEMS AND METHODS TO IMPROVE NETWORK SLICE PERFORMANCE AND EFFICIENCY
Systems and methods described herein provide new parameters for RAN configurations to manage network slices. A network device stores definitions for multiple mode parameters for a central unit (CU) of a radio access network (RAN), wherein each mode parameter defines a section of the CU that provides a relative performance level for a slice subnet over the RAN. The network device receives a slice configuration request for a network slice that identifies one of the multiple mode parameters and instantiates the network slice to operate over the section of the CU that is associated with the identified one of the multiple mode parameters. Additionally, a slice anti-affinity (SA) parameter is provided to selectively isolate network slices and improve slice reliability within the RAN.
In some implementations, a device may generate a user equipment (UE) route selection policy (URSP) rule that indicates a route selection descriptor and a traffic descriptor, and one of the route selection descriptor or the traffic descriptor indicates a core network (CN) type associated with the URSP rule. The device may transmit the URSP rule.
A device may receive time series data, and may convert the time series data into binary data. The device may calculate Hamming distances for the binary data, and may translate the time series data to vectors that capture patterns over a time period of the time series data. The device may calculate vector Euclidean distances for the vectors, and may calculate Euclidean distances for the time series data. The device may select weights for the Hamming distances, the vector Euclidean distances, and the Euclidean distances, and may apply the weights to the Hamming distances, the vector Euclidean distances, and the Euclidean distances. The device may process the time series data, the weighted Hamming distances, the weighted vector Euclidean distances, and the weighted Euclidean distances, with a clustering model, to generate clusters for the time series data, and may perform one or more actions based on the clusters.
A device may include a processor configured to receive an indication from a subscriber management device that a user equipment (UE) device has attached to a second core network, wherein the device is in a core network associated with a Radio Access Network. The processor may be configured to subscribe with a second network exposure device in the second core network to receive telemetry information notifications for the UE device, in response to receiving the indication; receive a telemetry information notification for the UE device from the second network exposure device; and report telemetry information obtained from the received telemetry information notification to a server device associated with the UE device
In some implementations, an access and mobility management function (AMF) may receive subscribed network slice selection assistance information (NSSAI) that indicates location information associated with a slice and time information associated with the slice. The AMF may determine an allowed NSSAI based on one or more of the location information, the time information, a static policy, or a dynamic policy. A access and mobility policy control function (AM-PCF) may create the dynamic policy to determine a location and a time at which the subscribed NSSAI may be used. The AMF may transmit, to a user equipment (UE), an indication of the allowed NSSAI.
A system described herein may monitor a set of local Key Performance Indicators (“KPIs”) associated with an edge computing device. The local KPIs may not be provided to a central orchestrator that is communicatively coupled to multiple edge computing devices. The system may monitor application KPIs associated applications implemented by the edge computing device, which may be provided to the central orchestrator. The orchestration models may include conditions associated with the set of local KPIs, and orchestration actions to perform with respect to the particular edge computing based on the conditions. The system may perform orchestration actions on the particular edge computing device based on the monitored local KPIs and application KPIs. The central orchestrator may identify that the application KPIs are below a threshold and perform a second set of orchestration actions with respect to the edge computing device, or one or more other edge computing devices.
A device may forward, to a User Equipment device (UE) over a network, an updated list of subscribed network slices; receive, from the UE, a registration request that includes a list of requested network slices; generate, based on the list of requested network slices, an updated list of allowed network slices; and send the updated list of allowed network slices to the UE. The updated list of allowed network slices may be synchronized to the updated list of subscribed network slices.
A device may include a first plurality of microelectromechanical system (MEMS) elements. Each of the MEMS elements may include a mirror configured to reflect a radio frequency (RF) signal propagating through a free space to the mirror and whose surface orientation is configurable based on signals from a controller. The device may also include the controller. The controller may be configured to: receive a configuration message from a cellular network component over a radio frequency (RF) control channel; extract configuration parameter values for one or more of the MEMS elements; and configure the one or more of the MEMS elements by sending control signals corresponding to the configuration parameter values.
A device may receive road facing camera (RFC) video data, driver facing camera (DFC) video data, and idling events data associated with a vehicle, and may receive traffic data associated with the vehicle. The device may determine that an idling event of the idling events data is an idling event trigger, and may process the idling event and the DFC video data, based on the idling event being an idling event trigger and with a first machine learning model, to determine a behavior of a driver of the vehicle. The device may process the behavior of the driver, the RFC video data, and the traffic data, with a second machine learning model, to determine a score for the idling event, and may determine a classification for the idling event based on the score and a score threshold. The device may perform one or more actions based on the classification.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 20/56 - Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
G06V 20/59 - Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
40.
SYSTEMS AND METHODS FOR CLASSIFYING A VEHICLE MANEUVER USING A SPATIOTEMPORAL ATTENTION SELECTOR
A device may receive video data and corresponding GPS data and IMU data associated with a vehicle, and may process the video data, with an object detector model, to identify objects and to generate a first feature vector. The device may process the GPS data and the IMU data, with a first CNN model, to generate a second feature vector, and may process the objects and the video data, with a tracking model, to identify positions and classes of the objects and to generate a third feature vector. The device may utilize a second CNN model to generate a matrix of object features based on the first, second, and third feature vectors, and may utilize a spatiotemporal attention selector model or a max pooled model with the matrix of object features to identify a classification of a maneuver of the vehicle. The device may perform actions based on the classification.
G01C 21/16 - NavigationNavigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigatedDead reckoning by integrating acceleration or speed, i.e. inertial navigation
G01S 19/47 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement the supplementary measurement being an inertial measurement, e.g. tightly coupled inertial
41.
SYSTEMS AND METHODS FOR AUTOMATED SECURE NETWORK FUNCTION PROVISIONING IN A WIRELESS NETWORK
A system described herein may maintain a set of policies associated with accessing a radio access network (“RAN”), may receive a request for a particular network function (“NF”) to access the RAN, and may determine, based on the set of policies and information included in the request, whether to grant the request to access the RAN. The system may establish, when determining that the request should be granted, connectivity between the particular NF and the RAN, where establishing the connectivity includes assigning a particular address to the particular NF, routing traffic, addressed to the particular address, to the particular NF, routing traffic, received from the particular NF, to the RAN. The system may forgo establishing connectivity between the particular NF and the RAN when determining that the request should not be granted. The RAN may include an Open RAN (“O-RAN”).
A method, a network device, and a non-transitory storage medium are described in which an application-aware scheduling service is provided. The application-aware scheduling service may be configured with bandwidth values and usability values for traffic of applications. The application-aware scheduling service may manage air interface scheduling based on the bandwidth and usability values. The application-aware scheduling service may perform packet inspection to identify an application relating to traffic. The application-aware scheduling service may be configured with a maximum bandwidth for traffic of applications.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 47/2475 - Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
H04W 8/04 - Registration at HLR or HSS [Home Subscriber Server]
H04W 28/084 - Load balancing or load distribution among network function virtualisation [NFV] entitiesLoad balancing or load distribution among edge computing entities, e.g. multi-access edge computing
43.
SYSTEMS AND METHODS FOR TRAINING A DRIVING AGENT BASED ON REAL-WORLD DRIVING DATA
A device may receive video data and corresponding GPS data and IMU data associated with a vehicle, and may remove video frames from the video data to generate modified video data. The device may select objects and image regions of video frames of the modified video data, and may determine a current speed and a current turn angle of the vehicle based on the GPS data, the IMU data, and the modified video data. The device may mask the objects of the video frames of the modified video data to learn first features, and may mask the image regions of the video frames of the modified video data to learn second features. The device may generate a trained neural network model based on the current speed, the current turn angle, the first features, and the second features, and may implement the trained neural network model in the vehicle.
G01C 21/16 - NavigationNavigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigatedDead reckoning by integrating acceleration or speed, i.e. inertial navigation
G01S 19/49 - Determining position by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system whereby the further system is an inertial position system, e.g. loosely-coupled
44.
SYSTEMS AND METHODS FOR INTER-RADIO ACCESS TECHNOLOGY HANDOVER
A system described herein may receive a request for a User Equipment (“UE”) to access a radio access network (“RAN”), which may implement a Closed Subscriber Group (“CSG”) technique. The request may be a handover request from a different RAN, which may implement a different radio access technology (“RAT”). The system may determine that an access policy for the particular RAN does not indicate that the UE is authorized to access the RAN. The system may output a request to the RAN, including an indication that the access policy for the RAN does not indicate that the UE is authorized to access the RAN. The system may receive a response to the second request. The response may include an indication of whether the UE is allowed to access the RAN, as determined by the RAN based on one or more conditions in addition to an identifier of the UE.
In some implementations, a network simulator module that is associated with at least one of a radio access network (RAN) device or a user equipment (UE) may receive real-time radio frequency (RF) data. The real-time RF data may be associated with emulated real-time channel conditions corresponding to a simulated location of the at least one of the RAN device or the UE, and the at least one of the RAN device or the UE may be a physical device that is located at and/or in communication with the network simulator module. The network simulator module may receive measurement data associated with signal measurements associated with the at least one of the RAN device or the UE based on the real-time RF data. The network simulator module may determine a performance of the at least one of the RAN device or the UE based on the measurement data.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an agnostic-based end device management service. The agnostic-based end device management service may include a network-side service that hosts persona information associated with a user and end devices. The persona information may include executable end device applications, end device application data, context information pertaining to the user and the end devices, end device application session data, and business logic. The end devices of the user may not store and execute the end device applications yet have access and use of end device functionality across varying types of end devices. The network-side service may also simulate the executable environment of an end device when providing an application service to the end device. An end device-side service of the end device may render application data and provide sensory data and input data to the network-side service.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an LAS service. The LAS service may include enablement or disablement of the LA service subsequent to an establishment and active traffic flow associated with an application session. The LAS service may be enabled or disabled based on performance metric criteria and threshold values not being satisfied or being satisfied. The LAS service may be implemented to include an exposure function.
A device of network may provide, to a secondary device, an identifier of a user equipment and a code for messaging, and may receive, from the secondary device and based on the code, target data identifying a target application to notify when the user equipment is stolen. The device may receive an indication of theft of the user equipment, and may block access of the identifier of the user equipment to the target application based on the indication.
A network device may receive, from an equipment identity register, a status of a user equipment and a notification indicating that the user equipment is lost or stolen, and may provide, to a unified data management component, a subscription request that includes the status of the user equipment. The network device may receive, from the unified data management component, a subscription for the user equipment based on the subscription request and based on the status of the user equipment, and may provide, to the user equipment, a command to cause the user equipment to update a configuration of the user equipment based on the subscription.
A device may receive a data relay request from an application to deliver data to a User Equipment device (UE); select a network path that includes either a satellite network or a cellular network; and forward the data to the UE over the selected network path.
A device may include a processor configured to monitor a data flow, associated with a user equipment (UE) device, in a Radio Access Network (RAN). The processor may be further configured to detect a congestion condition for the monitored data flow associated with the UE device; generate an Explicit Congestion Notification (ECN) in response to detecting the congestion condition; and mark packets associated with the data flow with the generated ECN.
Systems and methods provide a selective network slice admission control (NSAC) service on a per user equipment (UE) device level, and include manage select NSAC criteria related to a first limit to a number of user equipment (UE) devices and a second limit to a number of protocol data unit (PDU) sessions supportable on a network slice; receive an indication that a first UE device requests a first PDU session on the network slice; apply at least one of the select NSAC criteria to the first UE device and/or the first PDU session; determine, based on the application, that the first UE device is countable toward the first limit and/or the first PDU session is countable toward the second limit; and generate an NSAC update response message indicating that the first UE device and/or the first PDU session is countable.
In some implementations, a server device may receive a request to validate a connectivity between the server device and a device associated with a cellular site. The server device may generate an ISO image that includes site-specific configuration information for the cellular site. The server device may utilize the ISO image to configure an operating system of the device. The server device may test the connectivity between the server device and the device based on configuring the operating system. The server device may perform one or more actions based on testing the connectivity between the server device and the device.
One or more computing devices, systems, and/or methods for estimating the impact of communication device failures of a communication network are provided. Energy consumption data over a time interval of when an alarm of a communication device failure occurred is evaluated to identify change points relating to threshold changes in energy consumption by user equipment. The change points are used to identify stable energy level intervals. Key performance indicators are sampled along the stable energy level intervals and are compared to identify an impact of the failure upon the user equipment connected to the communication network.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
An illustrative point cloud segmentation system generates an instance-wise semantic mask for a particular source image of a set of source images that has been used to construct a 3D point cloud representing a scene that includes one or more objects. The point cloud segmentation system maps a set of 3D points from the 3D point cloud to corresponding 2D points of the particular source image, then labels, based on contours defined by the instance-wise semantic mask to demarcate the one or more objects, the mapped set of 3D points in accordance with where the corresponding 2D point for each mapped 3D point is positioned with respect to the contours. Based on the labeling of the mapped 3D points, the point cloud segmentation system produces a segmented 3D point cloud including an instance-wise segmentation of the one or more objects at the scene. Corresponding methods and systems are also disclosed.
G06V 10/46 - Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]Salient regional features
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
H04N 13/351 - Multi-view displays for displaying three or more geometrical viewpoints without viewer tracking for displaying simultaneously
57.
SYSTEMS AND METHODS FOR APPLYING QUALITY OF SERVICE PROFILES BASED ON OBSERVED FLOW DATA RATES
In some implementations, a radio access network (RAN) may receive a graded quality of service (QoS) profile indicating a set of QoS profiles and corresponding observed flow data rates. The RAN may measure an observed flow data rate of traffic associated with a session. The RAN may select a QoS profile from the set of QoS profiles based on the observed flow data rate. The RAN may apply the QoS profile to the session.
One or more computing devices, systems, and/or methods for implementing dynamic quality of service for devices are provided. Generating a classification associated with a device, connected to the wireless network through a router. Service details for the device are stored, and correspond to expected wireless network quality of service that is to be provided by the wireless network to the device and corresponds to the classification (e.g., device classification, application classification, and experience mode classification), and/or other factors such as time and location. A current wireless network quality of service obtained from the device is compared with the service details to identify a delta. Wireless network quality of service for the device is modified based upon the delta. In this way, network side modifications and/or WiFi router side modifications may be performed.
In some implementations, the techniques described herein relate to a method including: monitoring, by a processor, a network to extract data packets transferred over fixed time intervals; filtering, by the processor, the extracted data packets to identify data transfers exceeding a predefined size threshold; aggregating, by the processor, the identified data transfers; computing, by the processor, a network speed value based on the aggregated data transfers; and storing, by the processor, the computed network speed value in a data storage unit; and executing a network action based on a detected degradation in the computed network speed value.
A cable identification system is provided. The cable identification system may include a laser pulse generator configured to emit laser pulses into the first optical-fiber cable segment. The cable identification system may include a polarization disturbance device configured to induce a change in polarization of a second optical-fiber cable segment via changing a position of the second optical-fiber cable segment. The cable identification system may include a polarization detection device configured to determine measures of polarization based upon backscattered light received from the first optical-fiber cable segment when the second optical-fiber cable segment has different positions. The polarization detection device may be configured to determine whether the first optical-fiber cable segment is connected to the second optical-fiber cable segment based upon the measures of polarization.
An illustrative cellular network optimized for data communication in accordance with a set of parameters is described herein. The cellular network may receive a data communication that is to be delivered, in accordance with a set of parameters, from a first communication device to a second communication device. A particular user plane function (UPF) node may process the data communication in accordance with the set of parameters. The particular UPF node may be included in a set of UPF nodes deployed at sites including an edge site associated with a cellular base station and a central site associated with a network core. Based on the processing by the particular UPF node, the cellular network may deliver the data communication from the first communication device to the second communication device in accordance with the set of parameters. Corresponding methods and systems are also disclosed.
A method may include establishing, for a user equipment (UE) device, a data session via a network and determining whether the network is congested or overloaded or whether a power level of the UE device is less than a threshold. The method may also include instructing the UE device to re-register for a Category M1 (Cat-M1) data session, in response to determining that the network is congested or overloaded or the power level of the UE device is less than the threshold.
A device may include a processor configured to detect that a communication session in a private cellular wireless network is associated with an application and determine that data units associated with the communication session match a network slicing rule associated with the private cellular wireless network. The processor may be further configured to classify the communication session to a network slice based on the network slicing rule and assign the data units associated with the communication session to the network slice.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
A device may receive, from a packet probe, an uplink packet flow provided to a base station by a user equipment, and may add bytes for packets of the uplink packet flow in each scheduling interval of multiple scheduling intervals. The device may group the packets into bursts based on the multiple scheduling intervals and based on adding the bytes for the packets, and may calculate a transfer speed of each of the bursts. The device may calculate a maximum transfer speed for the bursts based on the transfer speed of each of the bursts, and may calculate a congestion delay for each of the bursts based on the maximum transfer speed for the bursts. The device may perform one or more actions based on the congestion delay for each of the bursts.
A system described herein may identify a first container of a virtualized environment, where the first container implements a particular node of a set of nodes that maintain a distributed ledger. Identifying the first container may include identifying a set of node configuration parameters associated with the particular node implemented by the first container, and a set of container configuration parameters associated with the first container. The system may request instantiation of a second container, where configuration parameters of the second container may be based on the container configuration parameters associated with the first container. The system may modify a network interface of the virtualized environment, which is associated with the first container, to be associated with the second container in lieu of the first container. The second container may communicate with the other nodes via the network interface to maintain the distributed ledger.
The present teaching relates to conduct persona-adaptive communications with a customer at a geo-locale. Transcripts of a current and historic communications involving the customer are used to characterize the persona of the customer. Transcripts of historic communications with customers at the geo-locale are used to characterize the persona of the geo-locale. Current persona of the customer exhibited in the current communication is combined with the customer's persona and the geo-locale's persona to compute a response input vector, A language model generates, based on the response input vector, a persona-adaptive response, which is then sent to the customer a response.
Systems and methods described herein enable network slice selection from different service providers using embedded Subscriber Identity Modules (eSIMs). A user equipment (UE) device stores a first eSIM associated with a first service provider of a first mobile network and a second eSIM associated with a second service provider of a second mobile network. The UE device also stores policy rules governing selection of the first eSIM and the second eSIM, wherein the policy rules limit use of second eSIM to a network slice on the second mobile network. The UE device initiates a session connection request associated with an application and directs the session connection request through one of the first eSIM or the second eSIM based on the policy rules.
A network device may receive a PDU session create message associated with establishing a PDU session with a user device and via a RAN, and may receive a first 5QI value and a second 5QI value associated with the PDU session. The network device may attempt to establish the PDU session with the first 5QI value and via the RAN, and may receive an indication that the first 5QI value is not supported for establishing the PDU session. The network device may cause the PDU session to be established with the second 5QI value, and via the RAN, based on the indication that the first 5QI value is not supported for establishing the PDU session.
A network device requests, from a mobile network, a check of network slicing eligibility for a first session involving a first user, a first application, and a first application server. The network device receives, based on the check of network slicing eligibility, network slicing plan information associated with the first user and network slicing configuration information of the mobile network. The network device identifies a network slice identifier (ID) of a first network slice of the mobile network based on an identity of the first application, the network slicing plan information, and the network slicing configuration information; and sends a notification message, that includes the network slice ID, to the first application server for notifying the first application of the first network slice to use for the first session.
Some implementations are directed to a wireless receiver. In some implementations, the wireless receiver may include a receiver body encompassing one or more antenna elements, a cover removably coupled to the receiver body, and a mounting bracket removably coupled to the receiver body. In some implementations, at least one of the one or more antenna elements, the cover, or the mounting bracket is movable with respect to the receiver body in order to align the wireless receiver with a signal path.
H01Q 3/04 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system using mechanical movement of antenna or antenna system as a whole for varying one co-ordinate of the orientation
H01Q 1/08 - Means for collapsing antennas or parts thereof
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an registration support service. The registration support service may include providing an end device with registration support information that may facilitate a re-registration of the end device with an access and mobility management function, a mobility management entity, or the like. The registration support information may include a time period and/or a location with which the end device may initiate a registration procedure. The registration support information may be generated based on historical behavior of the end device.
A device may receive at least first network parameters and first performance indicators of a first access station in a first access network; receive at least second network parameters and second performance indicators of a second access station in a second access network; determine whether to steer a User Equipment device (UE) wirelessly connected to the first access station, from the first access station toward the second access station, based on the at least first and second network parameters and first and second performance indicators; and based on the determination, modify one or more of the first network parameters of the first access station and the second network parameters of the second access station.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an IAB backhaul sharing among co-located radio sites service. The IAB backhaul sharing among co-located radio sites service may include a traffic balancing service that performs access link bandwidth management and allocation to integrated access and backhaul (IAB) nodes based on bandwidth assessment of IAB backhaul links and bandwidth demands of IAB nodes. The service may further include a scheduling service that includes localized scheduling and load balancing at each IAB node of user traffic based on an allocated bandwidth provided by the traffic balancing service. The scheduling service may include an integrated schedule between co-located radio sites associated with the IAB node.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
H04W 28/16 - Central resource managementNegotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
74.
SYSTEMS AND METHODS FOR DISTRIBUTED FIBER SENSING FOR ULTRA-LONG-HAUL TRANSPORT NETWORKS
A device may provide a first optical signal to a destination terminal via a fiber cable and a plurality of sensing repeaters provided at intermediate sites of an ultra-long-haul transport network. The device may receive a second optical signal, based on the first optical signal, via the fiber cable and the plurality of sensing repeaters provided at the intermediate sites of the ultra-long-haul transport network. The device may determine whether the fiber cable has an issue based on the second optical signal, and may perform one or more actions based on whether the fiber cable has an issue.
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
H04B 10/079 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
75.
MULTI-LAYER INTERACTION AND CODE EXAMINER FOR N-TIER ARCHITECTURE APPLICATIONS
In some implementations, the techniques described herein relate to a method including: receiving a request from a user to analyze a consumer microservice; retrieving first source code associated with the consumer microservice and second source code associated with a producer microservice; analyzing the first source code to identify issues in the first source code; retrieving log data generated by the consumer microservice; analyzing the first source code, the second source code, and the log data to identify unused fields transmitted by the producer microservice to the consumer microservice; generating a report including the issues and the unused fields; and transmitting the report to the user responsive to the request.
Disclosed are systems and methods for a network framework for managing network elements (NEs) of a wireless/cellular and wireline network. The framework enables the scaling of a quantity, diversity and availability of NEs on/within a network via secure, efficient handling of multiple connectivity protocols, management protocols and/or NE data models. The framework can operate to provide a newly configured microservice architecture for the performance of NE management that is based on the specifics of NE types and/or NE protocols. Such architecture can operate as a collection (e.g., cluster) of microservices (or components) that can be independently scaled and can enable services to communicate with one another at the service level. The disclosed framework provides customized service technologies for each component/service in a configured manner so as to cluster services to specific needs/requests of each NE.
H04L 41/06 - Management of faults, events, alarms or notifications
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
09 - Scientific and electric apparatus and instruments
Goods & Services
Diagnostic hardware and software for soil, plant, tree, ocean and earth diagnostics; measurement apparatus for natural ecosystems, soil, trees, plants, earth and oceans; implantable sensors for soil, plant, tree, ocean and earth diagnostics; ecosystem diagnostic apparatus for developing plans to maximize geological productivity, irrigation, fertilization and carbon sequestration.
78.
System and method for ephemeral assignment of network slices
A device may include a processor. The processor may be configured to: send an enlistment request to a network over a wireless connection, wherein the enlistment request includes an application identifier (ID) corresponding to an application to be enlisted; receive a reply from the network in response to the enlistment request, wherein the reply includes a replacement User Equipment Route Selection Policy (URSP) rule; receive a session request from the application to establish a session; identify, in response to the session request and based on the replacement URSP rule, a network slice on the network; and establish the session between the application and the identified network slice on the network.
One or more computing devices, systems, and/or methods for managing security associated with applications are provided. In an example, a central security gateway may determine first security policy information associated with a first application. The central security gateway may establish a first encrypted connection with a first device of the first application. The central security gateway may manage, based upon the first security policy information and using the first encrypted connection, security associated with the first application. The central security gateway may determine second security policy information associated with a second application. The central security gateway may establish a second encrypted connection with a second device of the second application. The central security gateway may manage, based upon the second security policy information and using the second encrypted connection, security associated with the second application.
A device sends, based on information indicating that a primary backhaul link of a private network is down, at least one message to a controller of the private network. The at least one message indicates that the controller is to activate at least one route condition policy, and the at least one message, when received by the controller, is to cause the controller to activate the at least one route condition policy. The device sends, based on the information, at least one additional message to a baseband unit (BBU) of the private network. The at least one additional message indicates that the BBU is to apply one or more spectrum sharing parameters for the private network, and the at least one additional message, when received by the BBU, is to cause the BBU to apply the one or more spectrum sharing parameters.
A device receives a message associated with creating a session for a User Equipment device (UE), the messaging identifying a Quality of Service (QOS) for the UE. The device adjusts discontinuous reception (DRx) parameters for the UE based on the identified QoS for the UE and instructs the UE to increase or decrease a DRx wait time based on the adjusted DRx parameters.
A system described herein may maintain a local copy of a distributed ledger, including a first set of records that each include payload information. The system may maintain a restricted access ledger based on the distributed ledger, including a second set of records that include modified payload information included in the first set of records of the distributed ledger. The system may receive a request to access the distributed ledger, including one or more attributes, and may determine, based on the one or more attributes of the request, whether to grant access to the distributed ledger or to the restricted access ledger. When determining to grant access to the distributed ledger, the system may provide payload information from the distributed ledger in response to the request, and when determining to grant restricted access to the restricted access ledger, the system may provide payload information from the restricted access ledger.
A method, a system, and a non-transitory storage medium are described in which an discovery service is provided. The discovery service may provide a network device to request for binding information from a binding service function. The request may or may not include information that indicates a type of policy control function. For example, the information may indicate a session management policy control function, an access management policy control function, or another dedicated type of policy control function.
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
84.
System and Method for Automated Recovery to Re-Provision a Subscriber of a Communication Network
One or more computing devices, systems, and/or methods for automated recovery to re-provision a subscriber of a communication network are provided. A communication session establishment request for a user equipment of a subscriber to utilize a communication network may be received. Subscriber location information, session management subscription data, and policy data associated with the subscriber may be retrieved. A subscriber not found response may be received from a charging component as a response to a charging subscriber request for the charging component to track network and service utilization by the user equipment due to a prior failure to register the subscriber with the charging component. Accordingly, an automated self-healing action may be performed to re-provision the subscriber with the charging component for registering the subscriber for network and service utilization tracking by the charging component
In some implementations, a policy control function (PCF) device may receive a PCF device key uniquely associated with a user equipment (UE). The PCF device may generate an integrity key and an encryption key based on the PCF device key and an identifier of the PCF device. The PCF device may generate, based on the integrity key, integrity data associated with policy information related to the UE. The PCF device may encrypt, based on the encryption key, the policy information to generate encrypted policy information. The PCF device may send, for the UE, a UE policy message indicating the integrity data, the encrypted policy information, and the identifier of the PCF device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A device determines a periodicity of downstream traffic destined for a User Equipment device (UE) and sets a value of at least one Discontinuous Reception (DRx) cycle length parameter to compensate for the determined periodicity of the downstream traffic. The device generates UE DRx instructions that include the at least one DRx cycle length parameter and sends the UE DRx instructions to the UE for implementing DRx at the UE.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an offset-based mobility prioritization service. The offset-based mobility prioritization service may include obtaining performance metric information and any changes to configuration and/or topology of a transport network, such as an X-haul network. The offset-based mobility prioritization service may include calculating offset values, such as cell individual offset values, based on this information. The offset values may be calculated based on other factors, such as end device classifications, states and/or modes of end devices, and other information. The offset-based mobility prioritization service may further include calculating neighbor lists. The offset values and neighbor lists may be used to prioritize, influence, or steer end devices and/or source wireless stations in selecting target wireless stations when performing handover procedures or other types of cell selection or reselection procedures.
An illustrative UE locator system determines a time measurement indicative of a signal travel time between a UE device and an access point device. The signal travel time corresponds to an apparent distance, presuming a line-of-sight (LoS) signal travel path, between a location of the UE device and a location of the access point device. The UE locator system also accesses, from a bias suppression datastore, bias suppression data configured for use in suppressing an influence of a bias between the apparent distance and a true distance between the location of the UE device and the location of the access point device. Based on the time measurement and the bias suppression data, the UE locator system estimates the location of the UE device. Corresponding methods and systems are also disclosed.
G01S 13/87 - Combinations of radar systems, e.g. primary radar and secondary radar
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/10 - Position of receiver fixed by co-ordinating a plurality of position lines defined by path-difference measurements
H04W 4/029 - Location-based management or tracking services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer services and computer networking services, namely, computer networking design services for others, computer network configuration services; telecommunications software services, namely, design and development of computer software for telecommunications networks; computer services, namely, monitoring of technical functions of the computer networks of others; remote and on-site management and administration of the virtual and physical information technology (it) systems of others; cloud hosting provider services; cloud storage services; recovery and remote online backup of computer data; computer services, namely, providing remote and on-site infrastructure management services for the monitoring, administration and management of public and private cloud computing information technology and application systems; ;providing cloud storage, namely, providing remote server storage access through public or private computer networks; technical monitoring, namely, monitoring technological functions of the computer servers and telecommunication and network equipment of others; computer services, namely, creating an on-line virtual environment for virtual computing accessible via the internet and other computer networks; leasing and rental of computing capacity, namely, computer software, computer hardware and computer networking equipment; technical management of virtual infrastructure and computer networking, namely, monitoring, administration and management of public and private cloud computing it and application systems of others; providing temporary use of on-line non-downloadable software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable software including apis for use in software development and testing; design, development and implementation of computer networks and computer systems for others; monitoring of computer networks and computer systems by on-site and remote accesses to ensure their proper functioning; technical consulting services in the fields of computer software, computer hardware and computer networks, namely, providing consulting regarding the design, implementation, configuration and use of computer software, and providing consultation regarding the design of computer hardware and networks; technical support services relating to computer infrastructure technology, namely, providing technical advice on the installation and updating of computer software for use with computer servers, electronic data storage systems, and computer networks; design for others in the field of telecommunications and computerized communications and data networks; design services for others and design consulting services for others related thereto in the fields of information technology, computer programming, data center management and global computer networks; technical consultation services for the operation of the electronic information networks of others; design of premises-based, cloud-based and hybrid unified communications systems; providing temporary use of on-line non-downloadable network security software; computer technology consultation in the fields of internet and network security and secure transmission of data and information; technical consulting services in the fields of computer software, computer hardware and computer networks, namely, providing consultation regarding design, implementation, configuration and use thereof; computer networks and communications network security services, namely, providing on-line non-downloadable software for and technical consultation on the areas of computer system and network intrusion protection, security threat analysis, managed security services, vulnerability management and assessment, threat analysis, and forensics and penetration testing; data encryption services; testing, analysis and evaluation of the goods and services of others in the fields of computers and computer security assessments for determine conformation with certification standards and to assure compliance with industry standards; consulting services in the field of computer security and communications network security services; vehicle diagnostic services, namely, providing on-line non-downloadable computer software for use by consumers to access information in the field of vehicle diagnostics and vehicle diagnostic records via a computer information network; providing on-line non-downloadable software for machine to machine (m2m) services and network and internet connected devices for the purpose of transmitting data; providing on-line non-downloadable software for the internet of things (iot) for the purpose of transmitting data; providing an on-line non-downloadable software platform for the management of iot services, and connected and remote devices; providing a web portal featuring technology that allows users to monitor and manage connectivity, usage and provisioning of m2m and iot devices; computer consulting in the field of iot communication and connected devices; computer services, namely, creating virtual communities for registered users to participate in discussions and engage in networking; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; installation, maintenance, and repair of telecommunication network software, computer systems software, and communication network software; providing on-line non-downloadable software for use in network access control, and creating and maintaining firewalls; telecommunications engineering consultancy; providing on-line non-downloadable computer and network security software for facilitating authentication of authorized users, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, enabling the secure exchange of information by users; providing on-line non-downloadable software application for messaging and sharing of voice, data, and photos; providing on-line non-downloadable software for streaming of data content; providing on-line non-downloadable computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; providing on-line non-downloadable computer application software for mobile phones, namely, software for facilitation of communication in the nature of voice, data or image transmission by users; providing online non-downloadable computer software platforms for discovering, purchasing, paying maintenance fees for and managing entertainment, audio, gaming, fitness, music and lifestyle streaming services and streaming service subscriptions
09 - Scientific and electric apparatus and instruments
Goods & Services
Television (tv) set-top boxes; digital video recorders (dvrs); remote controls for televisions, set-top boxes and streaming devices; modems and wireless routers; wireless network extenders being computer hardware; usb cables; battery chargers; smartwatches; protective covers and cases for mobile phones; specialty holsters adapted for carrying cell phones; fitted plastic films for anti-glare and anti-scratch protection adapted for use with mobile phone display screens; downloadable software for use in network access control, and creating and maintaining firewalls; downloadable computer software for encryption; downloadable computer and network security software for facilitating authentication of authorized users, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, enabling the secure exchange of information by users; downloadable software application for messaging and sharing of voice, data, and photos; downloadable software for streaming of data content; downloadable software for the collection, editing, organizing, modifying, transmission, storage and sharing of audio, video, data and information; downloadable computer application software for mobile phones, namely, software for facilitation of communication in the nature of voice, data or image transmission by users; downloadable software for telecommunications account management, bill payment, administering and managing a customer loyalty rewards program, purchasing tickets to entertainment and sporting events, and managing electronic device insurance coverage; downloadable software for technical support services, namely, used for troubleshooting in the nature of the repair of telecommunication devices, equipment and services; downloadable software for providing customer support services in the nature of providing education and training to customers on the use of telecommunications goods and services; downloadable software for technical support services, namely, used for providing technical consultation in the field of mobile electronic devices, telecommunications equipment and telecommunications services; downloadable software for managing telecommunications networks and telecommunications network equipment; downloadable software for filtering and blocking unwanted telephone calls; downloadable software in the nature of a mobile application featuring technology that enables online retail store and ordering services featuring telecommunication devices and mobile electronic device accessories; downloadable mobile application software for messaging and sharing of data; downloadable mobile application software for messaging and location sharing between parents and/or other authorized persons and children via mobile devices; downloadable mobile application software that allows parents and/or other authorized persons to monitor and/or limit the calls, texts, and other online and mobile device activities and content of children; downloadable mobile application software that allows parents and/or other authorized persons to set time limits and other constraints on the connectivity of children's mobile devices to the internet; downloadable mobile application software that enables parents and/or other authorized persons to block or limit access to specific apps and websites on children's mobile devices; downloadable mobile application software that allows parents and/or other authorized persons to monitor and track the location, motion and motor vehicle activities of children via mobile devices; downloadable software for streaming of audiovisual and multimedia content and data; downloadable software for searching, recording, organizing, transmitting, storing, viewing and recommending audiovisual and multimedia content and data; telecommunication devices, namely, apparatus for transmission of communication, wireless communication devices for voice, data or image transmission; downloadable software in the nature of a mobile application for tracking and monitoring in the field of fleet management and mobile asset tracking; computer software that provides roadway, navigation, geographic, map and travel information
Electronic transmission of voice, data, information, audio, video and television programming; electronic data transmission; transmission of sound, video and information; communication services, namely, transmission of voice, audio, graphics, images, and data by telecommunications networks, wireless communication networks, the internet, information services networks and data networks; digital network telecommunications services; television broadcasting services; wireless telecommunication services, namely, wireless voice, text and data transmission plans for mobile devices; video on demand (vod) transmission services; pay-per-view (ppv) television transmission services; rental of set-top boxes and digital voice recorders (dvrs) for use with televisions; electronic transmission and streaming of television, movies, music, live events, video, games and multimedia content for others; providing internet access; providing access to telecommunications networks; telecommunications services, namely, integrated service digital network (isdn) services; virtual private network (vpn) services and private line services, namely, providing private and secure real time electronic communication over a private or public computer network; telecommunications gateway services, namely, providing a gateway for connecting between independent telecommunications and computer networks for sharing of internet traffic; video, audio and data telephone conferencing services; telecommunications services, namely, providing voice over internet protocol services (voip); electronic messaging services; consulting in the field of telecommunications and computerized communications; teleconferencing services; video conferencing services; telecommunications gateway services; mobile telephony; advisory services relating to telecommunications; telecommunications consultation; telematic sending of information; telecommunication access services, namely, providing access to a remote call center from a vehicle to report accidents and emergency situations so that vehicle location can be determined and emergency personnel dispatched; rental of telecommunications consumer premises equipment (cpe); rental of equipment for telecommunications; internet of things (iot) telecommunications services, namely, electronic transmission of data and information between devices and machines via the use of sensors, software and communications networks; electronic and telematics transmission of data related to monitoring, locating, recovery and tracking of assets and connected devices in a variety of industries; machine to machine services, namely, electronic transmission of data via the use of sensors, software and communications networks for the purpose of vehicle fleet management, namely, the monitoring and management of fleets of commercial vehicles including delivery trucks, cabs and rental vehicles
92.
METHODS AND SYSTEMS FOR USING COMPACT OBJECT IMAGE DATA TO CONSTRUCT A MACHINE LEARNING MODEL FOR POSE ESTIMATION OF AN OBJECT
An illustrative model construction system may access object image data representative of one or more images depicting an object having a plurality of labeled keypoint features. Based on the object image dataset, the model construction system may generate a training target dataset including a plurality of training target images. Each training target image may be generated by selecting a background image distinct from the object image data, manipulating a depiction of the object represented within the object image data, and overlaying the manipulated depiction of the object onto the selected background image with the labeled keypoint features. Based on this training target dataset, the model construction system may train a machine learning model to recognize and estimate a pose of the object when the object is depicted in input images analyzed using the trained machine learning model. Corresponding methods and systems are also disclosed.
G06T 3/40 - Scaling of whole images or parts thereof, e.g. expanding or contracting
G06T 3/60 - Rotation of whole images or parts thereof
G06T 7/70 - Determining position or orientation of objects or cameras
G06T 19/00 - Manipulating 3D models or images for computer graphics
93.
SYSTEMS AND METHODS FOR PROVIDING FAIRNESS MEASURES FOR REGRESSION MACHINE LEARNING MODELS BASED ON ESTIMATING CONDITIONAL DENSITIES USING GAUSSIAN MIXTURES
A device may receive sensitive attribute data, model prediction data, and true target data associated with a regression machine learning model, and may determine quantities of Gaussian components for Gaussian mixtures. The device may generate Gaussian mixtures of the quantities of Gaussian components based on the sensitive attribute data, the model prediction data, and the true target data, and may determine parameters of estimates of conditional densities by the Gaussian mixtures based on the sensitive attribute data, the model prediction data, and the true target data. The device may calculate an independence measure, a separation measure, and a sufficiency measure of the regression machine learning model based on the Gaussian mixtures and the parameters of the estimates of the conditional densities. The device may perform actions based on one or more of the independence measure, the separation measure, or the sufficiency measure.
A network device may receive an indication that a radio access network fails to support a network slice target service level agreement for a user equipment associated with a network slice. The network device may provide, to the radio access network, a network slice identifier associated with the network slice target service level agreement not supported by the radio access network. The network device may provide, to the radio access network, an indication of whether a neighbor radio access network supports the network slice target service level agreement to cause the radio access network to redirect the user equipment to a neighbor radio access network or to move the user equipment to another network slice.
H04W 36/26 - Reselection being triggered by specific parameters by agreed or negotiated communication parameters
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04W 36/12 - Reselecting a serving backbone network switching or routing node
H04W 36/14 - Reselecting a network or an air interface
95.
SYSTEMS AND METHODS FOR RECEIVING USER EQUIPMENT ROUTE SELECTION POLICY RULES
In some implementations, a user equipment (UE) may receive, from a network node, a UE route selection policy (URSP) that includes one or more URSP rules, wherein a URSP rule, of the one or more URSP rules, indicates one or more of: a radio access technology (RAT) associated with the URSP rule, or one or more public land mobile networks (PLMNs) associated with the URSP rule. The UE may select the URSP rule. The UE may perform traffic routing based on the URSP rule.
45 - Legal and security services; personal services for individuals.
Goods & Services
Monitoring of computers, websites, computer networks and communications network systems for security purposes; providing cloud-based identification and verification services, namely, providing authentication of personal identification information for security purposes; computer security services in the nature of the authentication, issuance, validation and revocation of digital certificates and other security credentials for others; automotive vehicle fleet monitoring services through telematics for safety purposes; consultation in the field of data theft and identity theft; monitoring of computer systems for security purposes, namely, to prevent unauthorized access and data breaches and providing reports in connection therewith on networks worldwide; providing a web site featuring information in the field of security; security consultancy; security services, namely, providing security assessments of information systems, and working environments for businesses and governmental agencies; stolen vehicle recovery services; emergency monitoring services, namely, monitoring of vehicle electronic device by remote call center and arranging for dispatch of emergency personnel when accident is detected
97.
SYSTEMS AND METHODS FOR MITIGATING BIAS IN MACHINE LEARNING MODELS
A device may receive protected attribute data, observation data, and target variable data associated with a machine learning model, and may include intersectional groups in the protected attribute data to expand a quantity of demographic subgroups and to generate modified protected attribute data. The device may calculate an expected proportion of individuals with the modified protected attribute data being in a particular group and the target variable data being positive, and may calculate an observed proportion of individuals with the modified protected attribute data being in the particular group and the target variable data being positive. The device may determine observation weights based on the expected proportion and the observed proportion, and may utilize the observation data and the observation weights to train the machine learning model and generate a trained machine learning model.
In some implementations, a mobility management entity (MME) device may receive an attach request, associated with a user equipment (UE), that includes a UE state indication. The MME device may send, to an access and mobility function (AMF) device, a UE route selection policy (URSP) information request associated with the UE based on the UE state indication. The MME device may receive, from the AMF device, a URSP information response indicating URSP information associated with the UE based on the URSP information request. The MME may send, for the UE, the URSP information based on the UE state indication included in the attach request.
A system may receive, by a first network device in an access network, a request to setup a radio access bearer (RAB) for use in establishing a connection with a user equipment (UE), wherein the request includes at least one Quality-of-Service (QOS) attribute associated with the request. The first network device may determine that the at least one QoS attribute is not supported by the access network and may send a notification that RAB setup has failed to a second network device in a core network, wherein the notification includes a cause indicator that indicates that the failure is caused by an unsupported QoS. In response, the core network may modify the request to include a default quality of service attribute that is supported by the access network and may send the modified request to the first network device.
A network device may provide a network function discovery request to a network repository function (NRF), and may receive, from the NRF, a network function discovery response that identifies a unified data management (UDM) component based on the network function discovery request. The network device may provide, to the UDM component, a request for a network function registration associated with a user equipment (UE), and may receive, from the UDM component, the network function registration associated with the UE based on the request for the network function registration. The network device may subscribe to user plane function (UPF) events associated with the UE from a UPF, and may receive, from the UPF, an indication of a subscription to the UPF events associated with the UE.