H04L41/0246

Methods and systems for service policy orchestration in a communication network
11336526 · 2022-05-17 · ·

Methods and systems are provided for service policy orchestration in a communication network. Orchestrating a service policy in a communication network may include, in response to receiving a service instance object and a first service event object; updating a service repository with the first service event object and the service instance object; selecting based on a first mapping table, at least one operator access domain linked to the first service event object for executing a service linked to the service policy; sending the first service event object and an operator specific service identifier to the selected at least one operator access domain, to allow the at least one operator access domain to update its service repository; receiving a first feedback data set from the at least one operator access domain; and updating a second mapping table with at least some data from the first feedback data set.

METHODS AND SYSTEMS FOR SERVICE POLICY ORCHESTRATION IN A COMMUNICATION NETWORK
20230254212 · 2023-08-10 ·

Methods and systems are provided for service policy orchestration in a communication network. Executing a service policy in the communication network may include, at a service policy execution factory (SPEF), initiating a service policy request, evaluating the service policy request, selecting a unique service event identifier (ID) from a service repository, creating, based on the evaluating, a distributed service event object, where the creating includes defining dynamic elements to be included in the distributed service event object, sending the distributed service event object with the unique service event ID to an event broker that forwards, based on the distributed service event object, operator specific event data to one or more operator access domains, and in response to receiving from the event broker a new service event object, processing the received new service event object, and updating information associated with a corresponding operator access domain (OAD) based on the processing.

METHODS AND SYSTEMS FOR SERVICE POLICY ORCHESTRATION IN A COMMUNICATION NETWORK
20230254212 · 2023-08-10 ·

Methods and systems are provided for service policy orchestration in a communication network. Executing a service policy in the communication network may include, at a service policy execution factory (SPEF), initiating a service policy request, evaluating the service policy request, selecting a unique service event identifier (ID) from a service repository, creating, based on the evaluating, a distributed service event object, where the creating includes defining dynamic elements to be included in the distributed service event object, sending the distributed service event object with the unique service event ID to an event broker that forwards, based on the distributed service event object, operator specific event data to one or more operator access domains, and in response to receiving from the event broker a new service event object, processing the received new service event object, and updating information associated with a corresponding operator access domain (OAD) based on the processing.

DYNAMIC EXECUTION RESOURCE SELECTION FOR CUSTOMIZED WORKFLOW TASKS
20230247090 · 2023-08-03 · ·

A representation of a workflow comprising a plurality of tasks is obtained. An execution of an instance of the workflow is initiated. The execution comprises selecting, with respect to a particular task of the workflow, a particular execution resource option from a set comprising at least a first execution resource option and a second resource execution option. A result of the execution is stored.

DISTRIBUTED, SELF-ADJUSTING AND OPTIMIZING CORE NETWORK WITH MACHINE LEARNING
20230308361 · 2023-09-28 ·

A system and method for dynamically creating distributed, self-adjusting and optimizing core network with machine learning is disclosed. The method includes receiving a request to access one or more services and establishing a secure real time communication session with one or more client devices and a set of service layers based on the received request. The method further includes determining one or more service parameters based on the received request and sending one or more handshake messages to each of the set of service layers. Further, the method includes determining one or more environmental parameters and determining best possible service layer capable of processing the received request by using a trained service based ML model. The method includes processing the request at the determined best possible service layer and terminating or transferring the secure real time communication session after the request is processed.

DISTRIBUTED, SELF-ADJUSTING AND OPTIMIZING CORE NETWORK WITH MACHINE LEARNING
20230308361 · 2023-09-28 ·

A system and method for dynamically creating distributed, self-adjusting and optimizing core network with machine learning is disclosed. The method includes receiving a request to access one or more services and establishing a secure real time communication session with one or more client devices and a set of service layers based on the received request. The method further includes determining one or more service parameters based on the received request and sending one or more handshake messages to each of the set of service layers. Further, the method includes determining one or more environmental parameters and determining best possible service layer capable of processing the received request by using a trained service based ML model. The method includes processing the request at the determined best possible service layer and terminating or transferring the secure real time communication session after the request is processed.

Distributed transaction system
11227265 · 2022-01-18 · ·

A financial transaction system providing a financial switching engine, the financial transaction system comprising: a distributed plurality of different physical data centres implemented at different respective physical locations, connected together via a private network; a plurality of plugins each configured to perform a different respective function of the financial transaction system; and an operating system on which the plugins run, the plugins being configured to communicate messages with one another in order to perform financial transactions; wherein the plugins are distributed amongst some or all of the data centres and the operating system is configured to abstract the plugins from the distributed data centres, such that the plugins communicate said messages with one another via the operating system without needing to specify particular ones of said data centres as destinations of the messages, while the operating system handles routing of the messages between the data centres over the private network without the plugins needing visibility of the routing.

SYSTEM FOR CENTRALIZED MONITORING AND CONTROL OF IOT DEVICES
20210359897 · 2021-11-18 ·

A system for centralized monitoring and control of Internet of Things (IoT) devices comprises an abstraction module development utility and an IoT device management system. The abstraction module development utility determines one or more device-specific user interface (UI) interactions for performing an action for each of a plurality of different IoT device types and generates an abstraction module for each of the different IoT device types. The IoT device management system is configured to generate one or more non-device-specific API calls for performing the action with respect to a particular IoT device, determine an IoT device type from among the plurality of different IoT device types for the particular IoT device, and direct the one or more non-device-specific API calls for performing the action to the abstraction module for the determined IoT device type for execution against the particular IoT device.

Method and device for automatically implementing IOAM encapsulation and storage medium

Disclosed are a method and a device for automatically implementing IOAM encapsulation, and a storage medium. The method comprises: sending, at an IOAM ingress node, a first message carrying IOAM configuration request information to an IOAM centralized configuration point; receiving, at the IOAM ingress node, a second message carrying IOAM configuration information of IOAM transmission nodes sent from the IOAM centralized configuration point; and performing, at the IOAM ingress node, IOAM encapsulation on a service data message according to the IOAM configuration information of the IOAM transmission nodes.

System and method for detecting surreptitious packet rerouting
11178107 · 2021-11-16 ·

Systems and methods of detecting network traffic tampering by monitoring the network traffic for network packets that arrive outside of an allowable error band and rejecting those packets for which transit times are outside the control limits due to possible tampering are provided.