H04L47/808

Radio network node, user equipment (UE), system and methods performed therein for handling communication in a wireless communication network

According to an embodiment herein a method performed by a radio network node for handling communication of data for a user equipment, UE, served in a service area associated with the radio network node in a wireless communication network is herein provided. The radio network node receives an indication from the UE, wherein the indication indicates a priority level for bandwidth allocation compared to other UEs. The radio network node further allocates a first bandwidth out of a total bandwidth to the UE for communication, wherein the first bandwidth is allocated in size based on the indication.

User access and identity life-cycle management

A method and processing system for managing user access to one or more resources is disclosed. A central service may receive an access change request message regarding a user. The access change request message may include a user identifier, a user role, and an access action for the user. Example access actions may include adding or removing user access with respect to a resource. The central service may determine which resources are associated with the user role and transmit one or more event messages to the resources to implement the access actions. The resources may send acknowledgement messages to the central service to confirm that the access actions have been completed.

Access control for named domain networking

The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.

System for automated cross-network monitoring of computing hardware and software resources

A system is provided for automated cross-network monitoring of computing hardware and software status. In particular, the system may track the status of various computing resources using process automation-based operations to simulate calls made by users to the various resources that the users are authorized to access. Based on said operations, the system may assess whether the authorized pathways to the resources and/or their respective components are properly functioning by capturing information regarding the resource, its associated components, and the current status of the resource. The results of these operations may be aggregated to provide an overview of which resources and/or systems are functioning and which are not. In this way, the system may provide a detailed view of the statuses of the individual resources and components within an entity's complex computing network.

CLOUD DATA CENTER TENANT-LEVEL OUTBOUND RATE LIMITING METHOD AND SYSTEM

A cloud data center tenant-level outbound rate limiting method includes: starting a timer, receiving and generating statistics of outbound packets of tenants in a current period, obtaining local traffic rate information of the tenants based on all the outbound packets of the tenants in the current period, and generating local bandwidth demand frames of the tenants based on the local traffic rate information of the tenants; when a timing of the timer reaches the end of the current period, sending the local bandwidth demand frames of the tenants to a switch; receiving a global bandwidth demand frame sent by the switch, and computing bandwidth budgets of the tenants based on the local traffic rate information of the tenants and the global bandwidth demand frames of the tenants; modifying rate limiting parameters, and limiting the rate of the outbound packets of the tenants in a next period.

COMMUNICATION EXCHANGES AND METHODS OF USE THEREOF
20230022670 · 2023-01-26 ·

In some embodiments, the instant invention provides for a computer-implemented method that includes the following steps: administering, by a first specifically programed computer system of a communications exchange, an electronic delivery of a first electronic distribution from a first sender to a first recipient, where the mediating includes: receiving from a first source of a plurality of sources, a first electronic distribution of the first sender, receiving from the first sender, a plurality of sender attributes of the first sender and a plurality of sender rules of the first sender that define how electronic distributions of the first sender to be delivered; receiving the plurality of recipient attributes of the first recipient and the plurality of recipient rules of the first recipient; matching the first electronic distribution of first sender to the first recipient; transmitting, the first electronic distribution of first sender to first channel of the first recipient.

DYNAMIC ALLOCATION OF COMPUTING RESOURCES

The exemplary embodiments disclose a method, a computer program product, and a computer system for allocating computing resources. The exemplary embodiments may include collecting data of one or more users, wherein the collected data comprises calendar data of the one or more users, extracting one or more features from the collected data, and allocating one or more computing resources to one or more of the users based on the extracted one or more features and one or more models.

System for request aggregation in cloud computing services

Cloud-based computing systems, although claimed to have virtually unlimited resources, could get oversubscribed due to budget constraints of cloud users. The disclosed invention proposes a mechanism to identify various types of “mergeable” tasks. The system also determines when it is appropriate to aggregate tasks and how to allocate them so that the QoS of other tasks is not affected. Experimental results under real-world workload settings show that the disclosed system can improve robustness of the system in the face of oversubscription and also saves the overall time of using cloud services by more than 14%.

Secure onboarding of computing devices using blockchain

Systems and methods are described for onboarding a new device to a blockchain secured network. A trusted device that is already enrolled on the blockchain can receive information from a new device. The new device can send an onboarding request to a server through a non-blockchain secured Application Programming Interface (“API”). The trusted device can send an onboarding request for the new device through a blockchain secured API. The server can receive the requests and match them. The server can authenticate the two devices and send a request to a blockchain consensus to add the new device to the blockchain with the trusted device as a referral. The blockchain consensus can add the new device to the blockchain and notify the server. The server can notify the new device, and the new device can begin communicating through the blockchain secured API or directly with other devices on the blockchain.

Cloud infrastructure planning assistant via multi-agent AI

Cloud infrastructure planning systems and methods can utilize artificial intelligence/machine learning agents for developing a plan of demand, plan of record, plan of execution, and plan of availability for developing cloud infrastructure plans that are more precise and accurate, and that learn from previous planning and deployments. Some agents include one or more of supervised, unsupervised, and reinforcement machine learning to develop accurate predictions and perform self-tuning alone or in conjunction with other agents.