Patent classifications
H04L41/0886
Systems and methods for non-destructive testing online stores
A method includes receiving data characterizing digital content from a repository of digital content. The method also includes receiving data characterizing a right to use the digital content from a store configured to sell a right to use the digital content to a customer associated with a non-destructive testing device. The method further includes performing an inspection of machinery using the non-destructive testing device based on the received digital content and the received right to use the digital content. The inspection can be performed by one or more of executing, using, and displaying the digital content. Related systems, devices, and non-transitory computer-readable mediums are also described.
Operational network risk mitigation system and method
A computer network risk mitigation system includes a computerized platform configured to utilize gathered contextual data regarding cyber-risk metrics in are operational technology network. The computerized platform is configured to conduct network configuration changes in accordance with the gathered contextual data in order to mitigate cyber-security threats. Methods for refining a network attack graph and for utilizing risk score evaluation are also described.
System and method for prescriptive diagnostics and optimization of client networks
At least one aspect is directed to the monitoring and management of in-home broadband subscriber computer networks allowing for automatic network issue detection and resolution. The systems and methods described herein can monitor the network utilization, subscriber information, and subscriber devices using protocols such as TR-069 and SNMP. The systems described herein are service provider and vendor agnostic, being compliant with the TR-098 and TR-131 protocols to allow for remote management, diagnosis, and configuration of subscriber devices. The systems and methods described herein can reduce the number of home visits by service provider technicians by providing a remote network management solution capable of automatically diagnosing and resolving network issues with an issue detection model. The system can be non-intrusive and executed from a cloud computing environment to allow access to millions of devices.
Systems and methods for exposing network slices for third party applications
A system includes one or more devices. The devices are configured to: receive a message indicating that a network slice has been deployed in a network, wherein the message includes information related to the network slice; send the information to an application that provides services to User Equipment (UE) devices subscribed to the network; and initiate updates to UE route selection policies (URSPs) in the network based on the information, allowing communications from UE devices to reach the network slice.
Network adaptation based on assessment of meteorological impact
A network-management system capable of reducing negative impacts of natural disasters on network services. In an example embodiment, in response to an indication of potential failure of one or more network resources in a meteorological event, the network controller operates to orchestrate re-hosting of affected VNFs and perform SDN-based reconfiguration of switches to adapt the traffic flows to the re-hosted VNFs. The indication of potential failure can be provided, e.g., by a specialized application capable of estimating the probabilities of failure for individual network resources based on a plurality of inputs, such as digital weather forecasts for the corresponding geographical area, geographical locations of individual network resources, tolerances of different network resources to specific environmental conditions, previous history of network damage in the same geographical area, alerts from power suppliers, etc. Upon reconfiguration, the network may beneficially have a lower likelihood of service disruptions and/or outages during the meteorological event.
CONFIGURATION CHANGE CONTROL FOR COMPUTING ENVIRONMENTS
Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.
TUNNELING FOR NETWORK DECEPTIONS
Provided are systems, methods, and computer-program products for providing network deceptions using a network tunnel. In various implementations, a network device on a first network can be configured as a projection point. A projection point can be configured as one endpoint of a network tunnel. The other end of the network tunnel can terminate at a deception farm. The deception farm can host a second network, where the second network includes network devices configured as deception mechanisms. By assigning a deception mechanism a network address from the first network, the network address and the network tunnel enable the deception mechanism to appear as a node in the first network.
HYBRID SOFTWARE-DEFINED NETWORKING AND MOBILE AD-HOC NETWORKING ROUTING IN MESH NETWORKS
A network controller is configured to cause a network to implement a primary network configuration of a network and a secondary network configuration as a backup to the primary network configuration. The network controller may be configured to receive information from a plurality of nodes of a network and information related to the client data to be transmitted through the network. Based on the node information, the network controller is configured to determine available nodes and possible links in the network and then determine a topology of the network. The primary network configuration is determined based on the topology. The network controller then sends instructions to the plurality of nodes of the network to implement the primary network configuration and to switch to a secondary network configuration where a failure of the primary network configuration occurs, wherein the secondary network configuration implements mobile ad-hoc networking in the determined topology.
TELECOMMUNICATION SYSTEM AND METHOD FOR RECONFIGURING IT
A telecommunication system monitors, for a plurality of services, a number of service requests from users and quality of service perceived by the users while using the services. A self-organizing network module determines a correlation between at least one configuration parameter, the number of service requests and the quality of service perceived, and, based on the correlation, a target number of service requests, and a target quality of service, determines an updated value for the at least one configuration parameter. Then the self-organizing network module commands the telecommunication system to implement reconfiguration thereof based on the updated value of the at least one configuration parameter.
HIGH EFFICIENCY REMOTE PROCEDURE CALL FOR CPE DEVICES
In one embodiment, a method for remote management of a consumer premises equipment (CPE) via a network by use of an equipment management system includes an equipment management system including a processor and rendering on a display a field that accepts an input for a query by an operator. The equipment management system maintaining an associated database of characteristics of the plurality of consumer premises equipment including a serial number, a model, and a firmware. The equipment management system searching the database based upon the input from the query from the operator that includes the serial number, the model, and the firmware. The equipment management system in response to determining a match based upon the query rending information regarding a matching consumer premises equipment on the display.