H04L47/808

USER ACCESS AND IDENTITY LIFE-CYCLE MANAGEMENT

A method and processing system for managing user access to one or more resources is disclosed. A central service may receive an access change request message regarding a user. The access change request message may include a user identifier, a user role, and an access action for the user. Example access actions may include adding or removing user access with respect to a resource. The central service may determine which resources are associated with the user role and transmit one or more event messages to the resources to implement the access actions. The resources may send acknowledgement messages to the central service to confirm that the access actions have been completed.

Service control method for machine type communications device and related apparatus and system

A service control method for a machine type communications (MTC) device and a related apparatus, where the method includes receiving, by an access-network network element, a paging request message from a core-network network element, wherein the paging request message carries device type indication information of a paged user equipment (UE), determining a device type of the UE according to the device type indication information of the UE, and paging the UE using a dedicated paging resource allocated to an MTC device when the UE is the MTC device.

Device-Assisted Services for Protecting Network Capacity
20210067359 · 2021-03-04 ·

Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.

Method and server for displaying access content
10965781 · 2021-03-30 · ·

Methods, apparatuses, and devices, including computer programs encoded on computer storage media for displaying webpage content are provided. One of the methods includes: receiving an access request of a first user to access a webpage; determining webpage content according to the access request of the first user; determining a second user identifier comprised in the webpage content based on the webpage content; determining a presentation identifier from one or more presentation identifiers corresponding to the second user according to the determined second user identifier and the webpage content, wherein the one or more presentation identifiers are configured to identify the corresponding second user; and returning the webpage content to the first user, wherein the webpage content comprises the determined presentation identifier corresponding to the determined second user identifier.

Cloud quality of service management
10931595 · 2021-02-23 · ·

A computer-implemented method of allocating cloud resources is provided that comprises: receiving, by a cloud host, data that identifies, for an application, a relationship between consumption of a first resource type and consumption of a second resource type; determining, by the cloud host, a consumption level of the first resource type of the application; and allocating, by the cloud host, one or more resources of the second resource type based on the identified relationship.

Determining hardware requirements for a wireless network event using crowdsourcing

Systems and methods for determining hardware requirements for a wireless network event are disclosed. In embodiments, a method comprises obtaining, by a computing device, social user data over a period of time from a plurality of mobile devices associated with a social event at a location; obtaining, by the computing device, bandwidth usage data for each of the plurality of mobile devices based on the social user data; obtaining, by the computing device, crowd density and traffic pattern data related to the social event; determining, by the computing device, participant movement data for the social event based on the crowd density and traffic pattern data; deriving, by the computing device, a social bandwidth density model based on the bandwidth usage data and the participant movement data; and determining, by the computing device, bandwidth requirements within a geo-spatial boundary associated with the social event from the social bandwidth density model.

Centrally managing data for distributed identity-based firewalling

In an embodiment, a computer-implemented method comprises receiving, by at least one broker computing devices, identity awareness data from a plurality of directory services in a federation; posting, by the at least one broker computing device, the identity awareness data to a distributed data repository; establishing, at a networking hardware device having a first type, firewall rules using the identity awareness data from the distributed data repository; controlling, by the networking hardware device having the first type, network traffic based on the identity awareness data.

Access management system with a resource-ownership policy manager

Methods, systems, and computer storage media for providing access to computing environments are provided. Based on a resource-ownership policy manager (i.e., a self-service engine and a runtime policy evaluation engine) that provides resource-ownership policy operations executed to apply a resource owner's policies only on resource owned by the resource owner. In operation, at runtime, a first resource instance is identified and an entity is determined to be the resource owner of the first policy and first resource instance. The first policy is applied to the first resource instance because the entity owns both the first policy and the first resource instance. A second resource instance is identified and the entity is determined not to be the resource owner of the second resource instance. A second resource policy of the entity is not applied to the second resource instance because the entity is not the owner of the second resource instance.

SOFTWARE DISTRIBUTED, HARDWARE AGGREGATED HIERARCHICAL TRAFFIC MANAGEMENT

In one embodiment, a system comprises an interface to receive a plurality of packets; and a plurality of processor units to execute a plurality of transmission sub-interfaces, each transmission sub-interface to perform hierarchical quality of service (HQoS) scheduling on a distinct subset of the plurality of packets, wherein each transmission sub-interface is to schedule its subset of the plurality of packets for transmission by a network interface controller by assigning the packets of the subset to a plurality of transmission queues that each correspond to a distinct traffic class.

System and method for managing network resources

Methods and systems for managing network resources enabling network services over a network and for managing maintenance of network resources. The method comprises determining a desired performance level for the network services, the desired performance level being associated with service metrics that establish compliance with a service level agreement; accessing internal data relating to operations of the network and external data not relating to operations of the network; generating a prediction of a network service pattern based on the desired performance level of the network services, the internal data and the external data; identifying a decision scenario for orchestration of the network resources, the decision scenario establishing a configuration of the network resources, the decision scenario being generated based on a correlation of the prediction of the network service pattern and availability of the network resources; and causing to adapt the network resources based on the decision scenario.