Patents Assigned to NEC LABORATORIES EUROPE GMBH
-
Patent number: 11809977Abstract: A method for reinforcement machine learning uses a reinforcement learning system that has an environment and an agent. The agent has a policy providing a mapping between states of the environment and actions. The method includes: determining a current state of the environment; determining, using the policy, a current policy output based on the current state; determining, using a knowledge function, a current knowledge function output based on the current state; determining an action based on the current policy output and the current knowledge function output; applying the action to the environment resulting in updating the current state and determining a reward; and updating the policy based on at least one of the current state and the reward.Type: GrantFiled: February 10, 2020Date of Patent: November 7, 2023Assignee: NEC LABORATORIES EUROPE GMBHInventors: Mauricio Fadel Argerich, Jonathan Fuerst, Bin Cheng
-
Patent number: 11727248Abstract: A method extracts human-interpretable entity profiles from a text-labeled data graph of a system having a plurality of entities. The data graph includes nodes representing the entities and edges between the nodes representing links between the entities. A plurality of text is respectively associated with the corresponding edges. The method includes: constructing neural network layers configured such that each of the edges between a pair of the nodes is modeled as a function of the associated text and cluster representations of the pair of the nodes; for each one of the pair of nodes, performing machine learning to learn a tensor to capture patterns among the associated text and the pair of nodes, and extracting the entity profiles from the tensor.Type: GrantFiled: April 7, 2020Date of Patent: August 15, 2023Assignee: NEC LABORATORIES EUROPE GMBHInventors: Zhao Xu, Giuseppe Serra
-
Patent number: 11500888Abstract: A method for anomaly detection of cloud services based on mining time-evolving graphs includes steps of receiving tracing data for a plurality of micro-services of the deployed cloud service, wherein the tracing data defines relationships between the plurality of micro-services of the deployed cloud service at a plurality of different time intervals, computing a functional graph based on the tracing data for each of the plurality of different time intervals, wherein nodes of each functional graph include the plurality of micro-services and wherein links between the nodes represent relationships between the plurality of micro-services, comparing the functional graphs for each of the plurality of time intervals to determine an anomaly score for each of the functional graphs, and detecting a presence of one or more anomalies based on the anomaly scores.Type: GrantFiled: August 7, 2020Date of Patent: November 15, 2022Assignee: NEC LABORATORIES EUROPE GMBHInventors: Josep Xavier Salvat Lozano, Andres Garcia-Saavedra, Xi Li, Xavier Costa Perez
-
Patent number: 11310107Abstract: A method for operating a multi-access edge computing (MEC) system includes establishing, between two or more MEC providers, an agreement that defines mutual access policies that specify which MEC platforms and which MEC applications and/or services running on the MEC platforms are allowed to be exposed among each other and/or to other tenants. The MEC platforms are provisioned with appropriate configurations in accordance with the access policies of the agreement. A discovery process is executed for discovering a MEC platform within a MEC stack of another tenant and a communication link is established with the other tenant's MEC platform.Type: GrantFiled: June 20, 2018Date of Patent: April 19, 2022Assignee: NEC LABORATORIES EUROPE GMBHInventors: Fabio Giust, Vincenzo Sciancalepore, Xi Li
-
Patent number: 11296875Abstract: A method for cryptographic key provisioning includes, via a main authentication server (MAS), generating a first secret key and registering a client by performing a first portion of a first instance of a distributed threshold oblivious pseudo-random function. The first instance of the function results in the client obtaining a root secret key and the MAS obtaining a corresponding root public key. The method includes authenticating the client to the MAS by performing a first portion of a second instance of the distributed threshold oblivious pseudo-random function. The second instance of the function results in the client obtaining the root secret key. Information stored by the client, the first secret key, and a second secret key generated by a support authentication server are inputs to at least one of the first and second instances of the distributed threshold oblivious pseudo-random function.Type: GrantFiled: March 27, 2020Date of Patent: April 5, 2022Assignees: NEC LABORATORIES EUROPE GMBH, IMDEA SOFTWARE INSTITUTEInventors: Claudio Soriente, Antonio Faonio, Maria Isabel Gonzalez Vasco, Angel Perez del Pozo
-
Method and network for managing and orchestrating virtual network functions and network applications
Patent number: 11070442Abstract: A method for managing and orchestrating virtual application functions jointly with virtual network functions is done through a single management and orchestration (MANO) framework within a network. The method includes creating, by a system for (virtual) application function and virtual network function management and orchestration, at least one service or service chain that considers or comprises at least one (virtual) network application and/or at least one virtual network function. A virtual application function (VAF) entity is provided as a container for network applications together with a VAF manager (VAFM) for the VAF.Type: GrantFiled: November 24, 2015Date of Patent: July 20, 2021Assignee: NEC LABORATORIES EUROPE GMBHInventors: Fabio Giust, Konstantinos Samdanis, Faqir Zarrar Yousaf -
Patent number: 11051210Abstract: A method of allocating network slices of a network infrastructure includes receiving a network slice request for network resources of the network infrastructure in a form of a network slice. The network slice request includes a service level agreement (SLA) and an associated payoff. It is determined whether to accept the network slice based on whether it is expected that a utility function will be better served by accepting the network slice request or waiting for a further network slice request. It is determined whether the SLA would be fulfilled prior to allocating the network slice. The network slice is allocated and installed in the network infrastructure. Whether the utility function is better served can be determined using a value iteration algorithm or an adaptive algorithm.Type: GrantFiled: February 27, 2018Date of Patent: June 29, 2021Assignee: NEC LABORATORIES EUROPE GMBHInventors: Vincenzo Sciancalepore, Xavier Costa Perez, Albert Banchs, Marco Gramaglia
-
Patent number: 11012311Abstract: A method for operating an SDN-based mobile communication system, which includes a mobile network having a control plane and a data plane, with a network controller being implemented therebetween, includes: providing a control plane function that possesses information from an access network about location and/or proximity of devices and information about rules and/or policies for setting up sessions for the devices; and the network controller, by collaborative operations with the control plane function, selecting one or multiple data plane nodes that are, based on a particular device's request for session establishment, suitable to act as policy enforcement points for enforcing rules in the data plane that are for enabling connectivity for the particular device.Type: GrantFiled: June 21, 2016Date of Patent: May 18, 2021Assignee: NEC LABORATORIES EUROPE GMBHInventors: Fabio Giust, Marco Liebsch
-
Patent number: 10906535Abstract: A method for detecting vulnerable road users (VRUs) using wireless signals includes receiving, by a wireless receiver, wireless signals from mobile devices and determining received signal strength indication (RSSI) levels of the wireless signals. The wireless signals and the RSSI levels of the wireless signals received by the wireless receiver are analyzed so as to determine at least one location of the VRUs. A notification is issued to the vehicle or a driver of the vehicle based on the at least one determined location of the VRUs.Type: GrantFiled: August 8, 2018Date of Patent: February 2, 2021Assignee: NEC LABORATORIES EUROPE GMBHInventors: Guerkan Solmaz, Miguel Garcia Galvao Almeida
-
Patent number: 10831931Abstract: A method for preserving privacy in an HTTP communication between a client and a server includes: intercepting an HTTP request that is sent from the client to the server; extracting a cookie from the HTTP request, the cookie including a cookie name and a cookie value; splitting the cookie value into information segments; and modifying one or more of the information segments based on predefined modification rules.Type: GrantFiled: March 31, 2016Date of Patent: November 10, 2020Assignee: NEC LABORATORIES EUROPE GMBHInventors: Roberto Gonzalez Sanchez, Miriam Marciel, Lili Jiang
-
Method and system for wireless localization data acquisition and calibration with image localization
Patent number: 10834532Abstract: A method performs wireless localization data acquisition and calibration using a visual 3D model. The method includes: receiving image data and transmitter measurement data from a device; localizing the image data in the visual 3D model to determine a device location in a physical space; and using the device location and the transmitter measurement data to perform at least one of: determining transmitter fingerprint localization data and storing the transmitter fingerprint localization data in a fingerprint database; or calibrating a radio frequency (RF) propagation model for proximity estimation.Type: GrantFiled: August 23, 2019Date of Patent: November 10, 2020Assignee: NEC LABORATORIES EUROPE GMBHInventors: Jonathan Fuerst, Guerkan Solmaz, Ernoe Kovacs, Kaifei Chen -
Patent number: 10810723Abstract: A method for object density monitoring includes receiving, by a processing server, an input image captured by an image sensor. The method further includes providing an annotated dataset with a target object to be identified in the input image, and providing, by the processing server as output, an object density map generated from the input image. The processing server provides the object density map by using a deep neural network having one or more pairs of a compression layer and a decompression layer connected by gated shortcuts.Type: GrantFiled: November 15, 2018Date of Patent: October 20, 2020Assignee: NEC LABORATORIES EUROPE GMBHInventors: Daniel Onoro-Rubio, Mathias Niepert
-
Patent number: 10694484Abstract: A communication apparatus for supporting a registration procedure for an inbound roamer user equipment, ‘UE’, in a visited public land mobile network, ‘VPLMN’ that includes a transceiver and a controller. The controller is configured to: control the transceiver to receive, from a communicator of the VPLMN, a request for authentication information; retrieve the authentication information from a communicator of a home public land mobile network, ‘HPLMN’; and control the transceiver to transmit the authentication information to the serving CSCF of the VPLMN for use in the registration procedure.Type: GrantFiled: October 28, 2016Date of Patent: June 23, 2020Assignee: NEC LABORATORIES EUROPE GMBHInventors: Andreas Kunz, Genadi Velev, Iskren Ianev, Filipe Alexandre-Rodrigues de Moura Leitao
-
Publication number: 20200084128Abstract: A method performs round-trip time determination between a source element and a target element, the source element is a forwarding element of a software defined network, which also includes a software defined network controller for controlling the forwarding elements. The method includes: instructing the source element to install a low priority detection rule, the low priority detection rule being triggerable by an incoming pong probe packet; instructing the source element to install at least one high priority detection rule having a timeout period, the high priority detection rule being triggerable by the incoming pong probe packet; instructing the source element to send a ping probe packet from the source element to the target element; deriving an estimate range for the round-trip time based on the detection rule being triggered by the pong probe packet received by the source element from the target element in response to the ping probe packet.Type: ApplicationFiled: December 13, 2016Publication date: March 12, 2020Applicant: NEC Laboratories Europe GmbHInventors: Fabian SCHNEIDER, Anton MATSIUK, Dimitrios GKOUNIS
-
Publication number: 20200021519Abstract: A software-defined networking (“SDN”) capable forwarding switch includes ports for receiving and/or outputting data packets and a packet pipeline including a forwarding table. The forwarding table is configured to contain a number of flow table entries (“FTEs”), that determine the forwarding switch's configuration and control behavior. The switch further includes a control engine configured to manipulate the forwarding switch's forwarding tables by adding, updating, and/or removing FTEs in the forwarding tables. An FTE of a forwarding table is configured to contain a specific action part that includes an action instruction to create a control packet and to send it to the control engine. The control packet includes embedded control instructions that cause the control engine to change the forwarding switch's configuration and/or control behavior.Type: ApplicationFiled: March 23, 2017Publication date: January 16, 2020Applicant: NEC Laboratories Europe GmbHInventors: Fabian SCHNEIDER, Andreas RIPKE, Peer HASSELMEYER
-
Publication number: 20190384689Abstract: A method for operating a monitoring entity (ME) for a distributed system includes receiving, by the ME, an action message from a computing device which has information about an action it performed. The ME, generates, deletes and/or updates a node of a data structure stored in a memory of the ME to provide an updated state of the data structure, by: processing the information of the received message, and storing the processed information into the data structure. The data structure represents knowledge about behavior of the distributed system. Each node specifies a policy by a formula, a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by the ME, and nodes with a same formula are mutually linked by triggers. Verdict information indicating an action violating a policy is computed based on the updated state.Type: ApplicationFiled: December 6, 2017Publication date: December 19, 2019Applicant: NEC Laboratories Europe GmbHInventor: Felix KLAEDTKE
-
Publication number: 20190014005Abstract: A method for operating a network includes combining modules, which are lower-level service functions of the network, to compose a service, which is a higher-level service function of the network. At least two modules of the modules interact according to a policy for providing and/or monitoring and/or optimizing the service. The modules have an awareness, that includes a location-awareness and/or a proximity-awareness, with respect to at least one other module for deciding and/or varying: the amount and/or kind of interaction between the modules and/or the at least one other module; and/or a location of at least one of the at least one other module and/or the modules, at runtime depending on the awareness of a location and/or a proximity and on the policy.Type: ApplicationFiled: January 8, 2016Publication date: January 10, 2019Applicant: NEC Laboratories Europe GmbHInventor: Johannes LESSMANN
-
Publication number: 20190014061Abstract: A stateful network packet processing system includes first and second stateful stages and a distribution mechanism. The first stateful stage includes a first state table and a first FSM table. The second stateful stage includes a second state table and a second FSM table. The distribution mechanism defines when a flow should be processed by either the first stateful stage or the second stateful stage or by a combination of the first stateful stage and the second stateful stage. At least one of the first or second FSM tables is extended with states and transitions that support the distribution mechanism.Type: ApplicationFiled: March 31, 2016Publication date: January 10, 2019Applicant: NEC Laboratories Europe GmbHInventors: Roberto BIFULCO, Anton MATSIUK
-
Publication number: 20180205571Abstract: A method for operating one or more service systems includes receiving, by an input interface of the AE, one or more control requests for controlling one or more resources of one or more service systems, anticipating, by the AE, one or more future control requests (ACR), based on the one or more received control requests (RCR), prior stored control requests, and/or served control requests, and assessing, by the AE, an impact on the one or more service systems by checking an effect of selected control requests (CR), on resources of the one or more service systems, wherein the CR include at least one of the RCR, one or more already served control requests (SCR), and the ACR, when the CR would be performed on one or more of the resources of the at least one of the one or more service systems.Type: ApplicationFiled: April 18, 2016Publication date: July 19, 2018Applicant: NEC LABORATORIES EUROPE GMBH LTDInventors: Mischa Schmidt, Anett Schuelke
-
Publication number: 20180191786Abstract: A communication entity includes a Proxy Call Session Control Function (P-CSCF). The P-CSCF includes a transceiver and a controller. The transceiver is operable to receive a register request from a user equipment (UE) in a visited public land mobile network (VPLMN). The controller is operable to: retrieve a network identifier (PLMN ID) for the VPLMN by requesting the PLMN ID where the UE is currently located from a Policy Control Rule Function (PCRF); access a database to obtain a list of local emergency numbers for the VPLMN; and include the retrieved PLMN ID in the register request before forwarding the register request to a Call Session Control Function (CSCF).Type: ApplicationFiled: June 30, 2016Publication date: July 5, 2018Applicant: NEC LABORATORIES EUROPE GMBHInventors: Andreas Kunz, Genadi Velev, Iskren Ianev