A device may receive a trained model, training data utilized to train the trained model, and a query associated with generating counterfactuals, and may utilize a counterfactual model to generate counterfactuals for the trained model based on the training data and the query. The device may determine contextual parameters associated with ranking the counterfactuals, and may utilize a counterfactual ranking model to calculate a weighted metric based on the query, the counterfactuals, and the contextual parameters. The device may utilize the counterfactual ranking model to apply the weighted metric to the counterfactuals to generate ranked counterfactuals for the trained model, and may perform one or more actions based on the ranked counterfactuals.
Disclosed are systems and methods for a DSCP (Differentiated Services Code Point) marking framework. The disclosed framework provides mechanisms for managing how network requests are handled, on the client and/or server side (e.g., prior to transmission over the network, and/or upon transmission for handling by a server, for example). The disclosed framework provides functionality for dynamically determining and applying DSCP marking that enables networks, and associated network components, to maintain a consistent and reliable network experience by computationally managing how network traffic is managed and transmitted by and between network components.
A device may receive input data identifying input features associated with a user, and may process the input data, with an initial model, to predict one or more fraud stages for the user. The device may identify one or more sets of models from a plurality of models and based on the one or more fraud stages, and may process the input data, with the one or more sets of models, to determine one or more fraud parameters associated with the user. The device may identify a fraudulent activity associated with the user based on the fraud parameters, and may utilize a large language model to generate steps to resolve the fraudulent activity based on historical fraud resolutions. The device may provide the steps to resolve the fraudulent activity to a representative or the user for implementation.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
4.
SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
A network device may receive a subscription request to subscribe to a multimedia priority service (MPS) for a user device, and may generate an MPS profile for the user device based on the subscription request. The network device may store the MPS profile in a data structure, and may receive, from the user device, a request to generate an MPS token for the user device. The network device may retrieve the MPS profile from the data structure based on the request to generate the MPS token, and may generate the MPS token based on the MPS profile. The network device may provide the MPS token to the user device.
Electronic transmission of messages and data; Network transmission of sounds, images, signals and data; Broadcasting programs via a global computer network; Providing multiple-user access to a global computer information network; Provision of access to a global computer network; Transmission of sound, video and information; Transmission of information by electronic communications networks; Providing multiple use access to global computer information networks for the transfer and dissemination of a wide range of information; Provision of access to the internet; Providing user access to a global computer network; Providing telecommunications connections to the internet or databases; Streaming of data; Providing access to telecommunication networks; Internet broadcasting services; Internet access provider services; Streaming of audio, visual and audiovisual material via a global computer network; Transmission of audio content via the Internet; Audio streaming
Electronic transmission of messages and data; Network transmission of sounds, images, signals and data; Broadcasting programs via a global computer network; Providing multiple-user access to a global computer information network; Provision of access to a global computer network; Transmission of sound, video and information; Transmission of information by electronic communications networks; Providing multiple use access to global computer information networks for the transfer and dissemination of a wide range of information; Provision of access to the internet; Providing user access to a global computer network; Providing telecommunications connections to the internet or databases; Streaming of data; Providing access to telecommunication networks; Internet broadcasting services; Internet access provider services; Streaming of audio, visual and audiovisual material via a global computer network; Transmission of audio content via the Internet; Audio streaming
7.
SYSTEMS AND METHODS FOR MIMO RANK INDICATOR OVERRIDE
A device may include a processor configured to receive a multiple-input and multiple-output (MIMO) rank indicator from a user equipment (UE) device. The processor may be further configured to determine that the received MIMO rank indicator is lower than an expected MIMO rank indicator; determine that the UE device satisfies one or more criteria for a MIMO rank indicator override; and override the MIMO rank indicator for the UE device, in response to determining that the received MIMO rank indicator is lower than the expected MIMO rank indicator and determining that the UE device satisfies the one or more criteria for the MIMO rank indicator override.
Systems and methods for providing centralized authentication storage and management are described. An illustrative method includes a gateway device detecting that a first computing device connected to an on-premises network logs into a cloud-based service by way of the gateway device, stores an authentication token provided to the gateway device by the cloud-based service, and obtains authorization data indicating that a second computing device connected to the on-premises network is authorized to access the cloud-based service. The method may further include a gateway device that shares the authentication token with a second computing device.
In some implementations, a routing device may indicate, to a direct connect gateway in a cloud computing system, a default route, wherein the default route is propagated to a virtual network function (VNF) running in the cloud computing system. The routing device may create a generic routing encapsulation (GRE) tunnel between the VNF and the routing device based on the default route, wherein the GRE tunnel permits a direct peering between the VNF and a private network outside of the cloud computing system. The routing device may perform a routing between the VNF and the private network using the GRE tunnel.
A method, a device, and a non-transitory storage medium provide an enhanced emergency call outage reporting service. A network device receives an emergency call notice message. The emergency call notice message indicates that an emergency call was placed from a user equipment (UE) device using a visited network. The network device compares the emergency call notice message with outage data for a home network and reports, based on the comparing, a network outage associated with the emergency call notice message.
A device may schedule performance of an upload speed test, and may receive, from a speed test server, one or more log files generated by a user device during performance of the upload speed test. The device may generate upload results for the upload speed test based on the one or more log files, and may perform one or more actions based on the one or more log files and the upload results.
A method may include identifying, in a network, a location of a Fifth Generation (5G) node and determining, based on the location of the 5G node and capabilities associated with the 5G node, a number of areas around the 5G node, wherein each area corresponds to a bin. The method may also include identifying, in at least some of the of bins, candidate anchor nodes for the 5G node and ranking the candidate anchor nodes based on parameters associated with the candidate anchor nodes. The method may further include selecting, for the 5G node, an anchor node from the candidate anchor nodes based on the ranking.
A clamp for supporting a wire from a strand includes a first clamp portion having a first inner side and a second clamp portion having a second inner side. An opening sized to receive the strand is defined between the first inner side and the second inner side when the first clamp portion is in proximity of the second clamp portion. The first inner side and the second inner side contact the strand when the strand is received within the opening to connect the clamp to the strand. A support portion is attached to the clamp such that the wire is supported from the strand via the clamp. A fastener cooperates with the clamp and is movable from a first position to a second position to inhibit a relative motion between the strand and the clamp.
A system described herein may receive a plurality of data sets; generate, for each data set, an Eigenvector representing a maximum variance of the data set; generate, for each data set, a projected vector, wherein generating a particular projected vector includes identifying a lowest distance between respective values of the particular data set and the particular Eigenvector, wherein the particular projected vector includes values along the Eigenvector that are each a lowest distance from a corresponding value of the particular data set; compare respective projected vectors, associated with one or more data sets, with one or more other data sets of the plurality of data sets; generate a plurality of clusters based on the comparing, wherein each cluster includes one or more data sets of the plurality of data sets; and train one or more artificial intelligence/machine learning (“AI/ML”) models based on the plurality of clusters.
In some implementations, a platform as a service (PaaS) orchestrator may receive a set of values for a set of parameters of a software component template for a software component. The PaaS orchestrator may generate the software component using the set of values for the set of parameters. The PaaS orchestrator may execute the software component in a sandbox environment. The PaaS orchestrator may validate the software component for deployment. The PaaS orchestrator may deploy the software component in a deployment environment of the PaaS orchestrator. The PaaS orchestrator may detect a network event relating to the deployment environment. The PaaS orchestrator may identify a network management action associated with the network event. The PaaS orchestrator may one or more instructions to cause the network management action to be performed.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
17.
SYSTEMS AND METHODS FOR DETECTING AND ADDRESSING APPLICATIONS UTILIZING ADAPTIVE BITRATES WHEN PROVIDING VIDEO TRAFFIC
In some implementations, a network device may receive, from a server, video traffic associated with an application, wherein the application is associated with a video content provider. The network device may detect whether the application utilizes an adaptive bitrate to provide the video traffic, based on a bitrate associated with the video traffic in relation to a maximum bitrate. The network device may assist a remediation based on whether the application utilizes the adaptive bitrate.
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
18.
Systems and Methods for Implementing Contextual Cookies
An illustrative system includes a memory that stores instructions and a processor communicatively coupled to the memory and configured to execute the instructions to perform a process. The process may comprise tracking engagement information of a user while the user views user interface content, determining, based on the engagement information, a gaze point of the user with respect to the user interface content, mapping the gaze point of the user to a user interface element associated with the user interface content, and dynamically generating or updating, based on the engagement information and the mapping of the gaze point of the user to the user interface element, a contextual cookie that is configured to store user intent information associated with the user's engagement with the user interface content.
A device may include a processor. The processor may be configured to, when an Optical Network Unit (ONU) timer reaches an ONU time interval: obtain a value from a history register, in an ONU, which stores a first sum of performance monitoring data at the end of a prior ONU time interval, by issuing a first ONU Control Interface (OMCI) command to the ONU; and store, in a bin accumulation register, the obtained value. Additionally, the processor may be configured to, when a collection timer reaches a collection time interval: obtain a second sum of performance monitoring data collected by the ONU after the prior ONU time interval, by issuing a second OMCI command to the ONU; adjust a result of subtracting a reference value, stored in a reference register, from the second sum; and store the adjusted result.
In an example, a networking apparatus is provided. The networking apparatus includes a set of networking components, a housing assembly configured to house the set of networking components, a set of light sources, and a light guide disposed between the set of light sources and a first housing panel of the housing assembly. The first housing panel includes a first portion having a first thickness and a second portion adjacent the first portion and having a second thickness less than the first thickness. The light guide is configured to direct light from the set of light sources to an inner side of the second portion of the first housing panel to produce a networking icon on an outer side of the second portion of the first housing panel.
H05K 5/00 - Casings, cabinets or drawers for electric apparatus
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
21.
SYSTEMS AND METHODS FOR ACCESSING CELLULAR NETWORK VIA WIRELESS LOCAL AREA NETWORK
A device may be hosted by a cellular network. The device may include a processor. The processor may be configured to: receive a request from a User Equipment device (UE) to connect to the cellular network; and determine whether the UE includes a Fifth Generation (5G) Non-Standalone (NSA) device or a 5G Standalone (SA) device. If the UE is determined to include a 5G NSA device, the processor may perform a Fourth Generation (4G) authentication via 4G core network components included in the cellular network; and if the UE is determined to include a 5G SA device, the processor may perform a 5G authentication via 5G core network components included in the cellular network. When the 4G authentication or the 5G authentication is successful, the processor may establish a session with an endpoint in the cellular network.
In some implementations, a network device may transmit user equipment (UE) route selection (URSP) rules during a registration of a UE with a non-standalone (NSA) network, wherein the URSP rules exclude network slicing related rules based on a lack of network slicing support in the NSA network. The network device may transmit, in response to a handover of the UE from the NSA network to a standalone (SA) network that supports network slicing, updated URSP rules during a registration of the UE with the SA network, wherein the updated URSP rules include a flag in each rule that controls the mode of migration of ongoing session(s) at the UE from the NSA network to the SA network during mobility procedures.
A method, a device, and a non-transitory computer-readable storage medium are described in which a small cell aggregation service is provided. The service may include providing a global identifier for small cell devices that may be used for the transmission and reception of messages between small cell devices and core network devices. The service may include an intermediary network device, such as a gateway device or an aggregation device that uses the global identifier to transmit and receive control plane, user plane, or both types of messages, for example.
A method for monitoring an optical distribution network (ODN) in a passive optical network (PON), comprises establishing at least one data channel between an optical line terminal (OLT) and at least one optical network unit (ONU). The at least one ONU receives a live data traffic signal on at least one of the at least one data channel. The at least one ONU monitors the live data traffic signal for one or more abnormalities. The at least one ONU transmits an alert to the OLT when one or more abnormalities is detected.
H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
Disclosed are systems and methods for a computerized, network-based framework that provides enhanced algorithmic mechanisms for improving GSM location determinations for cell tower communications. The disclosed framework's operations can provide improved visit determinations/estimates and increased value for a user's wireless/cellular data, whereby optimized parameters from and/or of the signals associated with a user device (e.g., mobile device) and tower radio communications therebetween can be leveraged to discern the POIs a user has visited and/or is currently visiting. The location tracking of the user, within a predisposed uncertainty sector correlated among the user's device communications with corresponding radio towers, provides network coverage to track specific locations among POIs for which the user has visited and/or is currently located.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a data network name (DNN) replacement service. The DNN replacement service may be provided in a roaming context associated with an end device. The DNN replacement service may be implemented by a network device of a home core network of the end device. The network device may obtain a policy pertaining to a session establishment between a visited core network and a home core network. The network device may determine whether DNN replacement is applicable based on the policy. The network device may modify a message to establish the session creation by including a replacement DNN when DNN replacement is applicable.
A method, network device, system, and non-transitory computer-readable storage medium are described in relation to an dynamic user application control service that includes receiving from an application device, a request for access controls associated with a user application and an end device; generating, per the request, policies pertaining to the access controls, wherein the policies include time-based rules, location-based rules, or application type-based rules; obtaining a current location of the end device; comparing, by the network device, a current time with the time-based rules, the current location with the location-based rules, or an application type for the user application with the application-type rules; generating, per the comparing, a policy decision among the policies pertaining to the access controls; and applying, per the policy decision, the time-based rules, the location-based rules, and the application type-based rules for establishment of an application session with the end device.
A system described herein may maintain a set of policies associated with non-Internet Protocol (“IP”) messaging; maintain information associating an IP address of a User Equipment (“UE”) with a non-IP identifier of the UE; receive first traffic, that includes the IP address of the UE as a source of the first traffic, and payload information; identify, using the maintained information associating the IP address of the UE with the non-IP identifier of the UE, the non-IP identifier of the UE based on the IP address of the UE included in the first traffic; identify that the first traffic is associated with a particular policy of the set of policies; and forward second traffic, including the payload information and the non-IP identifier of the UE, to a destination device indicated in the first traffic, where forwarding the second traffic includes implementing the particular policy with respect to the second traffic.
A base station determines a latency requirement of a user equipment device (UE), and receives latency measurements associated with multiple neighboring cells or cell sectors having coverage areas within a certain proximity to the base station. The base station measures a latency associated with a first cell or cell sector, having a coverage area generated by the base station, that is currently serving the UE. The base station triggers a mobility event for the UE, based on the UE's latency requirement, the measured latency of the first cell or cell sector, and the latency measurements associated with the multiple neighboring cells or cell sectors, to a selected one of the multiple neighboring cells or cell sectors.
Systems and methods described herein enable association of an application with a line of service on Dual SIM Dual Standby (DSDS) devices. A user equipment (UE) device receives a command to execute an application that requires a mobile network connection. The UE device detects multiple available subscriber identity modules (SIMs), wherein each of the multiple available SIMs is associated with a different line of service. The UE device extracts an application identifier for the application, and determines, based on the application identifier, that the application is associated with a designated line of service. The UE devices initiates a session connection request for the application using a SIM, of the multiple available SIMs, associated with the designated line of service.
One or more computing devices, systems, and/or methods for performance indicator acquisition and processing for a communication network are provided. A compiler generates a package with compiler objects specifying how a normalizer is to process performance indicator data from a network element. The package is injected into the normalizer. The normalizer receives incoming performance indicator data from the network element over a message bus. The compiler objects are used to process the incoming performance indicator data to create and persistently store performance indicators records.
One or more computing devices, systems, and/or methods for providing near zero downtime during database upgrades for a computing environment are provided. A first database instance of a first version of a database may be hosted within a computing environment. A second database instance of a second version of the database may be deployed within the computing environment. The database instances are configured with triggers used to propagate data changes amongst the database instances. Requests to the database are routed based on a plurality of routing rules. A first routing rule routes a first portion of the requests to the first database instance and a second portion of the requests to the second database instance. The second database instance is monitored to determine whether to progress to a second routing rule of the plurality of routing rules.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A device, such as a Subscriber Identification Module (“SIM”) device, may maintain a set of profiles that each include a respective set of authentication credentials for connecting to one or more wireless networks. The device may maintain a set of policies associating respective events with respective profiles of the set of profiles, may receive an indication of a particular event, and may identify, based on the set of policies, that the particular event is associated with a particular profile. The device may select the particular profile as an active profile, and may output a refresh command after selecting the particular profile as the active profile. The device may receive, based on outputting the refresh command, a request for the active profile, and may output, based on the request for the active profile, the set of authentication credentials associated with the selected particular profile.
A system described herein may identify traffic associated with a User Equipment (“UE”) that is connected to a first network. The UE may maintain a plurality of UE identities via one or more SIM (“Subscriber Identification Module”) cards, Universal Integrated Circuit Cards (“UICCs”), etc. The system may determine, based on one or more policies, that the traffic is not authorized via the first network. In some situations, the traffic may not be authorized if the first network does not support a type, service, etc. of the traffic. The system may identify a second network, based on the one or more policies, via which the traffic is authorized, and may indicate the second network to the UE. The UE may automatically (e.g., without user intervention) switch to a particular UE identity that is associated with the second network, and may output the traffic via the second network using such UE identity.
In some implementations, the techniques described herein relate to a method including: receiving a set of communication events from a user equipment to a base station; obtaining a set of geocoordinates corresponding to the user equipment; calculating an angular mean for the set of geocoordinates; sorting the set of geocoordinates based on distances between the set of geocoordinates and a location of the base station to generate an ordered list of geocoordinates; calculating a k-th order statistic of the ordered list of geocoordinates; generating a predicted location based on the angular mean and the k-th order statistic; and assigning the predicted location as a current location of the user equipment in a cellular core network.
A device may receive channel data associated with digital channels utilized by a customer, and may identify, in the channel data, potential issues and sequential events for the potential issues. The device may generate a causal relationship graph based on the sequential events and the potential issues, and may process the causal relationship graph, with a machine learning model, to identify issues of the customer and events associated with the issues. The device may apply causal inference to identify causal relationships between the issues and the events, and may calculate an inference score for the issues and the events based on the causal relationships. The device may modify, based on the inference score, a customer journey defined by the events to generate a modified customer journey, and may perform one or more actions based on the modified customer journey.
A system described herein may receive traffic from a User Equipment (“UE”) via a radio unit (“RU”), may identify one or more attributes of the traffic, and may select a first Central Unit (“CU”), from a group of CUs that includes the first CU and a second CU, based on the one or more attributes of the traffic. The one or more attributes may include a network slice. The device may further route the traffic to the selected first CU, wherein the CU aggregates received traffic and routes the aggregated traffic to a user plane gateway. The device may include a Distributed Unit (“DU”) of a radio access network (“RAN”) that includes the first and second CUs. The first and second CUs may include a first CU-User Plane (“CU-UP”) and a second CU-UP. The DU and the CUs may be configured by a CU-Control Plane (“CU-CP”) of the RAN.
A device may receive historical input data associated with trips traversed by a plurality of vehicles with vehicle tracking units (VTUs), and may process the historical input data to generate training data. The device may train a neural network model, with the training data, to generate a trained neural network model that provides a latent space representation of vectors, and may cluster the latent space representation of vectors to generate clusters. The device may receive input data associated with a trip traversed by a vehicle of the plurality of vehicles with the VTUs, and may process the input data to generate time series data. The device may compare the time series data and the clusters to determine whether the trip is anomalous or not anomalous, and may perform one or more actions based on the determination of whether the trip is anomalous or not anomalous.
In some implementations, the techniques described herein relate to a method including: receiving a network request from a second network function, the network request including a parameter; validating the parameter upon receipt of the network request to determine a status of the network request, the status indicating a valid or invalid request; processing, by a first network function, a resource managed by the first network function based on the network request and returning a network response when the status indicates a valid request; and denying the network request and returning an error code when the status indicates an invalid request.
In some implementations, a device may receive a multimedia content file. The device may divide the multimedia content file into a set of logical entities. The device may generate a set of embeddings for each logical entity of the set of logical entities. The device may compare groups of logical entities, of the set of logical entities, to generate a similarity metric. The device may selectively merge, based on the similarity metric satisfying a threshold, a pair of logical entities, in a group of logical entities of the groups of logical entities, to generate one or more logical entity sets. The device may process the one or more logical entity sets to generate one or more metadata tags for the one or more logical entity sets. The device may store a metadata file including the one or more metadata tags.
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
41.
SYSTEMS AND METHODS FOR USING EXTERNAL IDENTIFIERS FOR ROUTING
A device may include a processor. The processor may be configured to receive, via a wireless connection, from an application server that provided a source external identifier to a source User Equipment device (UE), a routing request that includes data and an identifier for a destination UE. The processor may also be configured to look up a target external identifier for the destination UE; and route the data to a target application server that issued the target external identifier.
A system described herein may identify Key Performance Indicators (“KPIs”) associated with User Equipment (“UEs”) that are connected to a radio access network (“RAN”). Each KPI may be associated with wireless communications between a respective UE and the RAN. The system may identify a plurality of service categories associated with the plurality of UEs, where each particular UE is associated with a respective service category. The system may determine, based on the KPIs and the service category associated with each UE of the plurality of UEs, a radio resource partitioning configuration for the RAN. The particular radio resource partitioning configuration may specify that different portions of a set of radio resources, implemented by the RAN, are associated with different network slices. The RAN may implement the radio resource partitioning configuration by sending and receiving traffic, associated with respective network slices, via a corresponding portion of the set of radio resources.
A system described herein may maintain and distribute precision time across diverse locations and network types, including wired and wireless networks. A particular device may receive topology information indicating a particular set of time synchronization nodes, out of a plurality of time synchronization nodes of a time synchronize network; communicate with the particular set of time synchronization nodes on an ongoing basis, wherein the device and the plurality of devices maintain precision time information based on the ongoing communication; receive a request for precision time information from a particular time synchronization client, wherein the particular time synchronization client is assigned to the device based on attributes of the time synchronization client and the device; and output, to the particular time synchronization client and in response to the request, the requested precision time information.
A device may include a processor. The processor may be configured to send first control signals to optical switches to optically connect embedded optical time domain reflectometers (OTDRs), of an optical network, to optical fibers of the optical network; send second control signals to the OTDRs to measure attenuations of optical signals in the optical fibers; receive measurement data from the OTDRs as results of measuring the attenuations of the optical signals in the optical fibers; process the measurement data; and determine whether the optical fibers meet a performance requirement based on the processed measurement data.
G01M 11/00 - Testing of optical apparatusTesting structures by optical methods not otherwise provided for
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
45.
SYSTEMS AND METHODS OF MULTIMODAL USER INTERFACE AUTOMATION
Systems and methods provide user interface (UI) automation for multiple types of devices and applications. A computing device stores an objective for automated manipulation of a UI of a user device and conducts an iterative sequence to achieve the objective. The iterative sequence includes capturing current state information of the UI, wherein the current state information includes text and an image of the UI; sending multimodal input to a generative artificial intelligence (AI) system, wherein the multimodal input includes the image of the UI, a text prompt, and the objective; receiving, from the AI system, a predicted next action for the UI based on the multimodal input; initiating a programmatic action to implement the predicted next action on the UI; and recording the programmatic action. The computing device generates, based on the iterative sequence, a UI automation model associated with achieving the objective on the UI.
G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
In some implementations, a network node a radio access network (RAN) may receive, from a user equipment (UE), an indication of a traffic descriptor associated with an application running on the UE. The network node may allocate, using a RAN scheduling function associated with the network node, resources for the application based on an intra-user flow priority, wherein different applications associated with the UE are allocated with different amounts of resources based on the intra-user flow priority.
In some implementations, a network device may receive a group command associated with data transfers for a plurality of user equipments (UEs). The network device may transmit, based on the group command, a wakeup signal to a subset of UEs, of the plurality of UEs, in a target area, wherein the wakeup signal is associated with a control of data transfers for the subset of UEs based on a number of UEs in the target area and a load condition level associated with the target area.
A method may include receiving, by an access and mobility management function (AMF), a registration request from a user equipment (UE) device. The method may also include obtaining subscriber-related information associated with the UE device, wherein the subscriber-related information includes UE policy association information, and determining, based on the subscriber-related information, whether a UE policy association is enabled for the UE device. The method may further include transmitting, in response to determining that the UE policy association is enabled for the UE device, policy information to the UE device.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
49.
SYSTEMS AND METHODS FOR SCHEDULING RESOURCES OF A RADIO ACCESS NETWORK BASED ON PER-USER EQUIPMENT FACTORS
A system described herein may identify a plurality of radio Key Performance Indicators (“KPIs”) associated with a plurality of User Equipment (“UEs”) that are connected to a radio access network (“RAN”). Each radio KPI may be associated with wireless communications between a respective UE and the RAN. The system may identify a plurality of service categories associated with the plurality of UEs, wherein each particular UE is associated with a respective service category. The system may determine, based on the radio KPIs and the service category associated with each UE of the plurality of UEs, a respective priority weight for each UE. The system may schedule traffic, between the RAN and the plurality of UEs, based on the determined priority weights for the plurality of UEs.
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a coordinated domain-based L4S service. The service may enable end-to-end congestion control based on a predetermined order of domains, which are associated with L4S devices that support a packet flow, for which congestion control responses are to be provided. The service may provide independent feedback loops of state information from each domain and associated L4S device. The feedback loops may operate on different timescales. The service may coordinate congestion control among domains of an end-to-end path that support the packet flow and prevent fragmented or contentious congestion control responses between the domains.
A device may maintain, as a member of a two blockchain networks respective first and second blockchains. The first blockchain may include one or more sets of operations, and the second blockchain may include cross-chain authorization information. The device may identify a request to invoke a particular set of operations included in the first blockchain, where the request includes a set of input parameters and an identifier. The device may determine that the identifier satisfies the cross-chain authorization information included in the second blockchain, and may accordingly communicate with the second blockchain network to execute the particular set of operations. Executing the particular set of operations may include generating a set of output parameters. The device may output the set of output parameters in response to the request.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
52.
SYSTEMS AND METHODS FOR ADAPTIVE POLICY CONTROL IN CELLULAR NETWORKS
A device may include a processor configured to collect user behavior data associated with a user equipment (UE) device and determine a user behavior pattern for the UE device based on the collected user behavior data. The processor may be further configured to generate a policy in a core network for the UE device based on the determined user behavior pattern for the UE device, wherein the core network manages a communication session for the UE device via a Radio Access Network (RAN), and provide the generated policy to a Policy Control Function (PCF) in the core network to apply to the communication session for the UE device.
In some implementations, a network device may transmit an indication of physical properties associated with a user equipment (UE), wherein the physical properties include a route associated with the UE. The network device may receive a metric associated with a line-of-sight (LOS) of the UE with a base station, wherein the LOS is while the UE is traveling along the route. The network device may transmit a message to enable dual connectivity for the UE based on the metric and one or more other slice parameters.
A method, an end device, and a non-transitory computer-readable storage medium are described in relation to a multi-subscriber identification module (SIM) network slice mapping service. The multi-SIM network slice mapping service may be used by an end device with multiple SIMs. The service may include mapping a SIM to use for an end device application session and a network slice based on user equipment (UE) route selection policies (URSP) stored by the end device, a request from the end device application, setting information configured by a user, and/or a network device.
H04L 45/302 - Route determination based on requested QoS
H04M 1/72409 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
In some implementations, a service communication proxy (SCP) network function device may receive, from a first network function device, a service request associated with a second network function device. The SCP network function device may transmit an access token request to a network repository function (NRF) network function device. The SCP network function device may receive, based on the access token request, an access token associated with the first network function device. The SCP network function device may transmit the service request to the second network function device, wherein the service request is transmitted to the second network function device with an indication of the access token.
A device may include a processor. The processor may be configured to: receive, from one or more network components, key performance indicators (KPIs) and parameters that are associated with a User Equipment device; select a scheduling strategy, for data communications over a wireless link between the device and the UE, based on the KPIs and the parameters; apply the selected scheduling strategy to schedule data for transmission to the UE; and transmit the data to the UE based on the scheduling.
A method may include identifying an event in a network and identifying a template in response to the event. The template may identify actions to be performed to service data traffic associated with the event. The method may also include determining, by an event controller, that at least one wireless station in the network has capacity to service data traffic associated with the event and transmitting, by the event controller and based on the identified template, instructions to at least one device to implement changes to the least one wireless station. The method may further include instantiating the changes to the at least one wireless station.
A device described herein may maintain a model associating sets of traffic attributes with respective sets of attributes of user interface (“UI”) elements; receive a request to associate a particular UI element with a particular set of Quality of Service (“QoS”) parameters; identify a first set of attributes of the particular UI element; identify that the first set of attributes, of the particular UI element, matches a second set of attributes of UI elements included in the model; and identify a particular set of traffic attributes indicated in the model as being associated with the second set of attributes of UI element attributes. The device may identify traffic associated with the particular set of traffic attributes; and may process the identified traffic in accordance with the particular set of QoS parameters indicated in the request, based on identifying that the traffic is associated with the particular set of traffic attributes.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
59.
SYSTEM AND METHOD FOR DYNAMIC AUTHORIZATION OF PRIORITY-BASED SESSION
A method, network device, system, and non-transitory computer-readable storage medium are described in relation to priority-based service authorization, including receiving, via an application service, a session request from a user equipment device (UE), wherein the session request includes a priority service subscription indicator associated with invoking a priority service session with the UE; determining, based on an applicable policy, a first authorization of the application service for the priority service; obtaining, from a user data function and based on the first authorization, a subscriber profile associated with the UE; sending, to an authenticator, a request for a second authorization of the UE for the priority service based on a verification of the priority service subscription indicator to the subscriber profile; receiving, from the authenticator, a verification message of the second authorization; and notifying, based on the verification message, the application service of the invoking of the priority service session.
A system described herein may monitor Key Performance Indicators (“KPIs”) of a radio access network (“RAN”) that implements a first radio access technology (“RAT”), such as a Fifth Generation (“5G”) RAT. The system may determine, based on monitoring the KPIs of the RAN, that a particular RAN condition has occurred, and may notify a Fixed Wireless Access (“FWA”) device, that is wirelessly connected to the RAN via the first RAT and that is also wirelessly connected to a plurality of client devices via a second RAT, such as a WiFi RAT, that the particular RAN condition has occurred. The FWA device may implement one or more policies for communications between the FWA device and the plurality of client devices based on receiving the notification that the particular RAN condition has occurred.
A Fixed Wireless Access (FWA) gateway (GW), wirelessly connected to a mobile network, receives user equipment device (UE) Route Selection Policy (URSP) information that includes UE policy rules. The FWA GW determines UEs that are connected to the FWA GW and determines policy rules for each of the connected UEs based on the received URSP UE policy rules. The FWA GW distributes the determined policy rules to each of the connected UEs for policy application at each of the connected UEs.
One or more systems and/or methods are provided for identifying one or more target roads of a point of interest (POI) and/or identifying impressions of the POI. In an example, a first target road of a POI may be identified, wherein the POI is viewable from the first target road. A plurality of locations of a User Equipment (UE) may be determined. A set of locations, of the plurality of locations, that are within a threshold distance of a road object corresponding to the first target road may be identified. It may be determined that the UE is associated with the impression based upon the set of locations meeting a threshold amount of locations.
A device may receive text data, may extract phrases from the text data, and may calculate question scores for the phrases. The device may determine whether the phrases are associated with single answers or multiple answers, may calculate, single answer scores for the phrases associated with the single answers, and may calculate multiple answer scores for the phrases associated with the multiple answers. The device may extract, from the phrases, phrase data identifying grammar data, start tag data, and end tag data, and may process the phrase data, the single answer scores, and the multiple answer scores, with a machine learning model, to generate valid sentence scores for the text data. The device may identify, as a valid sentence, a group of phrases of the text data associated with a highest one of the valid sentence scores, and may add punctuation to the valid sentence to generate a final sentence.
A device may receive user activity data identifying activities of a user, and content data identifying text transcripts associated with the user. The device may generate a first custom embedding associated with the user based on the user activity data, and may process the first custom embedding, with a machine learning model, to generate an intent of the user and a next action for the user based on the intent. The device may process the content data to generate a second custom embedding for the user and an end user vector based on the second custom embedding, and may generate a document vector for the user based on the next action for the user. The device may process the document vector and the end user vector, with a language model, to generate a document for the user, and may perform one or more actions based on the document.
In some implementations, a first device may obtain first channel state information (CSI) of a second device. The first device may determine that a variance of the first CSI exceeds a variance threshold. The first device may determine that a motion event has occurred based on determining that the variance, of the first CSI, exceeds the variance threshold. The first device may determine a location of the motion event based on the first CSI and second CSI of a third device. The first device may adjust an operation of one or more devices associated with the location based on determining the motion event.
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
66.
SYSTEM AND METHOD FOR PROVIDING REAL TIME RECOMMENDATIONS FOR MULTIPLE TASKS
The present teaching relates to recommendation. Current event information and historic sequence data are received. The former characterizes a current event involving a user and user's interactions with a user interface (UI). The latter includes UIs and corresponding user interactions thereon with corresponding performance data. A task sentence is created with multiple tokens, each of which corresponds to a task. The current event information, the historic sequence data, and the task sentence are used for predicting a next item to be recommended via a mixture of expert (MoE) prediction model, trained via multi-task learning. The next item is recommended to the user on the UI.
A device may receive data identifying network slices and applications permitted on the network slices, and data identifying addresses of the applications permitted on the network slices. The device may provide, to a UE, a list of the network slices and the applications permitted on the network slices, and may receive, from the UE, a UE identifier and subscribed to applications from the list. The device may create rules for the subscribed to applications and corresponding network slices, and may associate the rules for the subscribed to applications and the corresponding network slices with the UE identifier. The device may receive, from a network function, a request for the rules associated with the UE identifier, the subscribed to applications, and the corresponding network slices, and may provide, based on the request, the rules to the UE via the network function.
A device may receive user criteria associated with a route for network performance testing of a network, network data associated with the network, and cartographic data associated with a location of the network. The device may calculate network spatial data based on the user criteria and the network data, and may perform feature extraction of the network spatial data to calculate network statistics and to extract network event locations. The device may generate waypoint criteria based on the network statistics and the network event locations, and may map the network spatial data to valid roadways identified in the cartographic data to generate mapped data. The device may identify a list of viable waypoints based on comparing the mapped data and the waypoint criteria, and may process the list of viable waypoints, the network data, and the cartographic data, with a clustering model, to generate the route.
A system described herein may identify a particular value that was wirelessly received by a User Equipment (“UE”) at a first time. The particular value may have been recorded to a blockchain, along with a second time, at which the particular value was outputted by a base station of a wireless network. The particular value may include a randomly generated number. The system may determine a location of the base station from which the particular value was outputted. The location of the UE may be determined based on a delay time associated with the particular value, which may be determined based on a difference between the first and second times. The location of the UE may further be determined (e.g., using triangulation techniques) based on values outputted by other base stations, for which the blockchain includes records indicating times at which such values were outputted by the other base stations.
In some implementations, a device may identify a network node that supports a first radio access technology (RAT), wherein the network node is associated with sessions with user equipments (UEs). The device may calculate a percentage of traffic from the sessions that is associated with the first RAT and not a second RAT. The device may determine that the network node is associated with a score based on the percentage of traffic associated with the first RAT not satisfying a threshold. The device may collect, based on the network node being associated with the score, device data associated with the UEs. The device may determine a network issue associated with the network node based on the device data. The device may determine a root cause for the network issue. The server may transmit an indication of the root cause.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 43/062 - Generation of reports related to network traffic
A method, an end device, and a non-transitory computer-readable storage medium are described in relation to an application and network slice mapping service. The application and network slice mapping service may include mapping an end device application to multiple application categories of the connection capabilities component of the traffic descriptors associated with route selection policies. For example, the end device application may be separated into multiple application traffic characteristics or different application categories. The mapping service may map the application categories to one or multiple network slices. The mapping service may assign a quality of service identifier value to each application category. The mapping service may apply a scheduling algorithm to the application categories that share the same network slice.
In the various embodiments, systems and methods are disclosed for determining user engagement with an application based on network traffic data corresponding to network traffic on a network. An aspect of the present disclosure is a method comprising obtaining network traffic data for a period of time, the network traffic data including a plurality of host calls; determining a host call sequence from the plurality of host calls, the host call sequence including one or more of the plurality of host calls; identifying an application corresponding to the host call sequence based on an augmented dataset; and determining a number of users of the application for the period of time based on a number of times the host call sequence repeats in the network traffic data.
In some implementations, a radio access network (RAN) may obtain data rate information from a device. The device may be associated with an application and the data rate information may be associated with the application. The RAN may determine, based on the data rate information, one or more data rate parameters associated with the application. The one or more data rate parameters may include at least one of one or more radio frequency parameters, one or more network loading parameters, one or more mobility parameters, or an available data rate parameter. The RAN may transmit, to the device, the one or more data rate parameters.
H04L 47/25 - Flow controlCongestion control with rate being modified by the source upon detecting a change of network conditions
H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
74.
SYSTEMS AND METHODS FOR NETWORK-BASED PROVISIONING OF COMBINED SECURITY SERVICES FOR SUBSCRIBERS
A device may receive control traffic that includes a plurality of provisioning events associated with a network, and may identify provisioning events, of the plurality of provisioning events, that are associated with a service. The device may calculate a quantity of the provisioning events that are associated with the service, and may determine whether the quantity of the provisioning events satisfies a quantity threshold. The device may provide the quantity of the provisioning events to network devices that provide the service to subscribers based on the quantity of the provisioning events failing to satisfy the quantity threshold, or may calculate a remaining quantity of the provisioning events that are associated with the service based on the quantity of the provisioning events satisfying the quantity threshold.
A system described herein may receive a first authentication request that includes a first identifier of a User Equipment (“UE”), and a second identifier of a second device. The system may output a second authentication request to a wireless network with which the UE is associated, which may include the first identifier of the UE. The system may receive, in response to the second authentication request an indication that the UE has been authenticated, and location information associated with the UE. The system may identify one or more services associated with the received location of the UE, and may output, to the second device and based on the response to the second authentication request, traffic associated with the identified one or more services.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 67/52 - Network services specially adapted for the location of the user terminal
H04L 67/75 - Indicating network or usage conditions on the user display
76.
SYSTEMS AND METHODS FOR UTILIZING GENERATIVE ARTIFICIAL INTELLIGENCE TECHNIQUES TO CORRECT TRAINING DATA CLASS IMBALANCE AND IMPROVE PREDICTIONS OF MACHINE LEARNING MODELS
A device may receive first data associated with a first class and second data associated with a second class that is different than the first class, and may process the first data, with a generative adversarial network model, to generate synthetic data. The device may train a variational autoencoder (VAE) model using the second data, to generate a trained VAE model, and may utilize the first data, the second data, and the synthetic data with the trained VAE model to generate anomaly scores. The device may combine the anomaly scores with the first data, the second data, and the synthetic data to generate final data, and may train a machine learning model with the final data to generate a trained machine learning model. The device may perform one or more actions based on the trained machine learning model.
In some implementations, a call session control function (CSCF) may receive, from a user equipment (UE), a message associated with a text message sent from the UE to an emergency number. The CSCF may add, based on the message being associated with the text message sent to the emergency number, an enhanced 911 (e911) attribute to the message, wherein the e911 attribute provides prioritized handling for the message during network congestion in relation to messages without the e911 attribute. The CSCF may transmit the message having the e911 attribute.
A system described herein may receive a request to configure a load-balanced service in a containerized environment. The system may include an indication of a particular network with which the load-balanced service should communicate. The system may generate a load balancer proxy node. Generating the load balancer proxy node may include associating the load balancer proxy node with a first interface associated with the particular network and with a second interface associated with the containerized environment. The system may generate a set of service node instances, which may include associating the set of service node instances with a third interface associated with the containerized environment. The system may associate the second interface with the third interface and may deploy, in response to the request, the set of load balancer proxy node instances and the set of service node instances to the containerized environment.
A device may receive session data of a communication session between an artificial intelligence (AI) communication device and a first user device. The device may analyze the session data to determine one or more portions of the session data and may identify a portion, of the one or more portions, for processing based on one or more criteria associated with the portion. The portion may include a plurality of entries including communications from the first user device and from the AI communication device. The device may analyze the plurality of entries to identify an entry including information regarding an escalation and may analyze one or more additional entries, of the plurality of entries, to determine a category associated with a cause of the escalation. The device may cause the AI communication device to be configured to address the cause based on the one or more additional entries and the category.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Systems and methods described herein providing consumer-driven access to network slices. A network device receives, from a user device, a slice selection to associate an application on the user device with a network slice. A slice recommender device generates a slice recommendation based on at least one of device parameters or network parameters. The network device provides, to the user device, the slice recommendation for presentation to the user.
H04W 48/18 - Selecting a network or a communication service
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
H04W 48/16 - DiscoveringProcessing access restriction or access information
81.
SYSTEMS AND METHODS FOR OPTIMAL NETWORK SLICE SELECTION
A device may include a processor. The processor may be configured to: receive, from an external device outside a cellular network, a request to provide network slice information for an application which is to receive a service from a network slice when the application is installed and running on a User Equipment device (UE); select optimum network slices for providing the service to the application; and provide the network slice information to the external device, wherein the network slice information identifies the optimum network slices. The external device may be configured to download the application to the UE.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04W 24/02 - Arrangements for optimising operational condition
82.
SYSTEMS AND METHODS FOR HYPER-PRECISE TIME OPERATIONS
Disclosed are systems and methods for a computerized Hyper-precise time (HPT) framework that accurately and efficiently provides precise time data for all sorts of network-based and local operations. The disclosed HPT framework can, among other benefits, provide sub-nanosecond time accuracy for operations involving, but not limited to, precise positioning, ambiguity resolution, mitigation of signal delays, maintaining continuous and accurate tracking for dynamic applications, improved convergence for accurate solutions, and the like. The framework can be utilized for Real-Time Kinematic (RTK), such that the determined HPT can directly contribute to achieving the high levels of accuracy and reliability required in RTK applications.
One or more computing devices, systems, and/or methods for providing multi-screen navigation for an application such as a mobile application are provided. An instance of the application is hosted on a mobile device. A primary display interface is populated with a first screen of the application for display through the mobile device. In response to detecting a trigger through the application, a secondary display interface is generated and populated with a second screen of the application for display through the mobile device while the primary display interface is being displayed through the mobile device. A first backstack of the application is utilized to track user navigation amongst screens of the application through the primary display interface. A second backstack of the application is utilized to track user navigation amongst the screens of the application through the secondary display interface.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A device may receive, from a first device, first tracking data that includes first temporal data and first location data, and may receive, from a second device, second tracking data that includes second temporal data and second location data. The device may generate a first spatio-temporal object based on the first tracking data, and may generate a second spatio-temporal object based on the second tracking data. The device may calculate a matching score associated with the first spatio-temporal object and the second spatio-temporal object, and may determine whether the matching score satisfies a score threshold. The device may determine that the first device is associated with the second device based on determining that the matching score satisfies the score threshold, and may perform one or more actions based on determining that the first device is associated with the second device.
According to disclosed embodiments, as discussed below, a cell broadcasting framework is provided including receiving a request from a Network Function (NF) consumer by a service communication proxy (SCP) on a network, the request including a set of parameters, identifying a plurality of target NF producers corresponding to the set of parameters, transmitting the request to the plurality of target NF producers, receiving a plurality of successful request responses corresponding to some or all of the plurality of target NF producers, transmitting one of the plurality of successful request response to the NF consumer, and discarding all other successful request responses.
In some implementations, a first network device may encode Internet Protocol version 4 (IPv4) network layer reachability information (NLRI) using Internet Protocol version 6 (IPv6) next hop encoding to generate encoded IPv4 NLRI. The first network device may include information indicating border gateway protocol (BGP) labeled unicast (BGP-LU) in the encoded IPv4 NLRI. The first network device may advertise the encoded IPv4 NLRI. The first network device may establish a communication session with a second network device, wherein the communication session is established via an IPv6 core network. The first network device may forward, via the communication session, one or more IPv4 packets using the encoded IPv4 NLRI.
H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
H04L 61/251 - Translation of Internet protocol [IP] addresses between different IP versions
H04L 101/659 - Internet protocol version 6 [IPv6] addresses
H04L 101/686 - Types of network addresses using dual-stack hosts, e.g. in Internet protocol version 4 [IPv4]/Internet protocol version 6 [IPv6] networks
87.
METHOD AND SYSTEM FOR MACHINE LEARNING MODEL GENERATION AND ANOMALOUS EVENT DETECTION
One or more computing devices, systems, and/or methods for machine learning model generation and/or anomalous event detection are provided. In an example, one or more datasets having first fields are identified. Significance scores associated with the first fields are determined. Second fields are selected from the first fields based upon the significance scores. Field combinations are generated based upon the second fields. Based upon the field combinations, a plurality of machine learning models is generated. The plurality of machine learning models include a first machine learning model associated with a first field combination of the field combinations, and a second machine learning model associated with a second field combination of the field combinations. The plurality of machine learning models is deployed in a data monitoring pipeline. Using the plurality of machine learning models, an anomalous event is detected based upon data passing through the real-time data monitoring pipeline.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
88.
SYSTEM AND METHOD FOR PROVIDING EMERGENCY MESSAGES TO EMERGENCY CONTACTS
In an example, an emergency communication session request is received from a first user equipment (UE). In response to the emergency communication session request, a communication session between the first UE and a first public safety answering point (PSAP) may be established. In response to the emergency communication session request, a first emergency message may be provided to an emergency contact of the first UE.
H04W 76/50 - Connection management for emergency connections
H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
A device described herein may establish a communication session with a first Security Edge Protection Proxy (“SEPP”) of a first network, and further with a second SEPP of a second network. The device may be or may implement an intermediary gateway between the SEPPs. The communication session may be associated with an N32-F interface that includes the SEPPs, the intermediary gateway, and one or more other intermediary gateways. The device may receive traffic from the first SEPP, and may determine that the traffic satisfies one or more error conditions. The device may identify an error reporting policy associated with the identified error condition, and may output, to the first SEPP and/or to the second SEPP (e.g., in accordance with the error reporting policy), an indication that the traffic satisfies the one or more error conditions.
Disclosure are techniques for allocating aggregation devices in a lawful intercept system. In an embodiment, a method includes maintaining a list of point of interception aggregation (PAG) functions in a network function repository function (NRF) of a cellular network upon instantiation of the PAG functions; receiving a lawful intercept (LI) request; querying the NRF to determine a respective PAG function; and associating a point of interception (POI) function with the respective PAG function.
A method, a network device, a system, and a non-transitory computer-readable storage medium are described in relation to an device status intelligence function service. The device status intelligence function service may include event monitoring and notification services. The device status intelligence function service may include generating policies based on application requirements pertaining to an application and an end device. The application requirements may include end device criteria that may be specified by a third party application network device. The device status intelligence function service may include generating a communication profile, based on the policies, that enable end device criteria monitoring in a network. The device status intelligence function service may provide notifications to the third party application network device when requested events occur.
In some implementations, a network element may receive information indicating a list of user equipments (UEs) that are off a wireless network. The network element may receive a verification request to verify a call received by the wireless network. The network element may determine, in response to the verification request and based on the information, whether a UE authorized to use a calling number associated with the call is on the wireless network. The network element may transmit an indication of whether the UE is on the wireless network.
In some implementations, the techniques described herein relate to a method including: receiving an expected object and a candidate object; computing a similarity coefficient between the expected object and the candidate object; computing an edit distance between the expected object and the candidate object; computing an embedding similarity between the expected object and the candidate object; and computing a matching score between the expected object and the candidate object based on the similarity coefficient, the edit distance, and the embedding similarity, the matching score representing a likelihood that the candidate object has replaced the expected object.
In some implementations, a first network device may receive, from a user equipment (UE), a request for a network resource. The first network device may determine, based on the request for the network resource, a prioritization associated with the UE, wherein the prioritization relates to a quality of service (QoS) attribute of the UE or a message priority of a message associated with the request for the network resource. The first network device may determine that a resource availability of resources at the first network device is less than an availability threshold. The first network device may transmit a preemption message to at least one of the UE or a second network device, wherein the preemption message indicates an interruption to one or more network resources associated with the UE or one or more other UEs associated with the second network device.
Systems and methods provide for application-enabled multicast control. A network device receives first parameters for an application executed on a first user equipment (UE) device and receives second parameters for the application executed on a second UE device. The network device detects, based on the first and second parameters, a multicast opportunity for the application and provides, to an application server for the first UE device and the second UE device, a multicast target address to initiate multicast streaming to the first UE device and the second UE device.
A network device determines at least one of throughput variation and latency variation associated with at least one flow transiting a network slice of a mobile network. The network device compares the at least one of the throughput variation and the latency variation with performance requirements of the network slice, and determines, based on the comparing, network slice resources needed for capacity planning of the network slice. The network device adds or removes network slice resources from the network slice based on the determined network slice resources.
A device may include a processor configured to receive a data stream connection request via a WIFI connection or a wired connection and establish a cellular wireless connection with a base station based on the data stream connection request. The processor may be further configured to determine a cellular wireless Quality of Service (QOS) class or network slice assigned to the cellular wireless connection by a core network associated with the base station; map the cellular wireless QoS class or network slice to a priority class associated with the WIFI connection or the wired connection; assign the priority class to a data stream associated with the data stream connection request; and process data units associated with the data stream based on the assigned priority class.
A system described herein may maintain information indicating groups of wireless trip devices. The system may maintain information associating each wireless trip device, of a plurality of wireless trip devices, with respective edge computing devices. The system may receive a wireless alert from a particular wireless trip device, which indicates an electrical fault condition. The system may identify a particular group of wireless trip devices with which the wireless alert is associated, and may identify a particular set of edge computing devices that are associated with respective wireless trip devices of the group of wireless trip devices. The system may output, to each edge computing device of the identified particular set of edge computing devices, a notification based on the wireless alert, and each edge computing device may wirelessly communicate respective wireless trip devices based on the wireless alert received from the particular wireless trip device.
In some implementations, a server may receive a plurality of signal measurements associated with a coverage area, wherein the plurality of signal measurements are collected over a measurement period by a device within the coverage area while the device is associated with a fixed location. The server may identify a signal measurement from the plurality of signal measurements, wherein the signal measurement represents a baseline radio frequency (RF) environment for the coverage area without a threshold amount of interference or transient changes in the coverage area. The server may provide an output based on the baseline RF environment.