Patent classifications
H04L41/5029
Flow Tagging for Service Policy Implementation
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
Methods and systems for managing edge web services
In one aspect, a computerized method for implementing edge web services includes the step of providing an edge device. The edge device is provided for free to a customer. The method includes the step of monitoring a usage on the edge device by the customer. The method includes the step of charging an edge-device entity based on the usage of the edge device and an application in the edge device. An orchestrator communicates the edge device usage statistics to an enterprise system that provided the edge device to the customer.
System, Network, Device and Stacked Spectrum Method for Implementing Spectrum Sharing of Multiple Contiguous and Non-Contiguous Spectrum Bands Utilizing Universal Wireless Access Gateways to Enable Dynamic Security and Bandwidth Policy Management
A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining spectrum bands consisting of several different RF channels, common air interfaces, and radio channel protocols in the radio frequency channel domain to form IP Virtual Radio Channels (IP-VRCs) in the packet data domain. This virtual spectrum stacking technique combines the transmissions of contiguous and non-contiguous RF channels with differing physical layers into IP-VRCs. This technique enables simultaneous parallel high-speed wireless transmission; virtual radio channel hopping for enhanced security; and customized security schemes for different IP-VRC Groups. The deployment of the combination of IP-VRC Groups; Universal “Small Cell” Base Stations; and Universal Wireless End-Point Devices allows the aggregation of all available spectrum bands for use within a building environment. Some benefits of this deployment include expansion of spectrum utilization, service quality, security, applications and transmission throughput for wireless end-point devices.
METHODS OF AND DEVICES FOR EXECUTING POLICY RULES ON A PER APPLICATION BASIS IN A TELECOMMUNICATIONS SYSTEM
Implementation of an application rule for an application to be accessed by a User Equipment, UE, in a user session in a Service Based Architecture, SBA, domain in a core network of a telecommunications system is disclosed. The SBA, among others, comprises a Policy Control Function, PCF (6), an Application Function, AF (5), and a Session Management Function, SMF (9). The method comprising the steps of receiving, by the PCF (6), an application rule comprising an AF Identifier, AF-ID, identifying the application rule, an Application Identifier, App-ID, identifying the application, and at least one service requirement for processing the application in the SBA domain. The PCF (6) instructing the SMF (9) to execute the at least one service requirement to all present and future user sessions pertaining to the respective application. Complementary methods of supporting the execution of the application rule and devices are also presented.
MULTI-NETWORK MANAGEMENT SYSTEM AND METHOD
A network interface system defines standardized network service requests and related abstracted tasks. In examples, commands needed to configure particular network elements are dependent on the network being utilized and/or the network element(s) being utilized. The network interface system may include a standardization layer, an abstraction layer, and an application programming interface for each of a variety of available networks. Upon a request for a network service, the related abstracted tasks may be translated into network-specific commands to configure network elements of disparate networks to provide the requested service.
Systems and methods for real-time service assurance
Service assurance using real-time monitoring, management and maintenance capabilities is enabled to provide customers and vendors with information related to the state of the service. The service assurance domain implements end-to-end functionality with a level of granularity sufficient to diagnose issues to the device and call/session level.
System, Network, Device and Stacked Spectrum Method for Implementing Spectrum Sharing of Multiple Contiguous and Non-Contiguous Spectrum Bands Utilizing Universal Wireless Access Gateways to Enable Dynamic Security and Bandwidth Policy Management
A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining spectrum bands consisting of several different RF channels, common air interfaces, and radio channel protocols in the radio frequency channel domain to form IP Virtual Radio Channels (IP-VRCs) in the packet data domain. This virtual spectrum stacking technique combines the transmissions of contiguous and non-contiguous RF channels with differing physical layers into IP-VRCs. This technique enables simultaneous parallel high-speed wireless transmission; virtual radio channel hopping for enhanced security; and customized security schemes for different IP-VRC Groups. The deployment of the combination of IP-VRC Groups; Universal “Small Cell” Base Stations; and Universal Wireless End-Point Devices allows the aggregation of all available spectrum bands for use within a building environment. Some benefits of this deployment include expansion of spectrum utilization, service quality, security, applications and transmission throughput for wireless end-point devices.
Virtual data centers
Various example implementations are directed to circuits, apparatuses, and methods for providing virtual computing services. One example involves a data storage device and a set of computing servers communicatively coupled to the data storage device. The set of computer servers provide a respective virtual data center for each of a plurality of accounts, and the respective virtual data center for each account provides virtual services specified in a respective settings file for the account stored in the data storage device. The virtual data center for at least one of the accounts includes a set of virtual desktops and a set virtual servers, including at least one Voice-over-IP (VoIP) server. The VOIP server provides VOIP service for a plurality of users of the account.
COORDINATING CELLULAR AND CABLE/FIBER BROADBAND NETWORKS
Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit-small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit – small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.
Data processing systems for fulfilling data subject access requests and related methods
Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request.