Abstract: A method is provided for granting access, for user equipment registered in a home mobile network to a wireless local area network. In this method, a probe request is received by an access network server located in the wireless local area network, wherein this probe request includes first information allowing to identify the home mobile network of the user equipment. The access network server determines then at least one access point of the wireless local area network to which the user equipment is allowed to connect, based on the identification of the home mobile network from the first information and sends a response message including at least one access identifier identifying the at least one access point of the wireless local area network.
Abstract: A method for providing certificates is described, the method implemented by a virtualized computing platform comprising a root of trust, a hypervisor and at least one virtual machine, the hypervisor implementing one virtualized root of trust per virtual machine and offering root of trust services. The method includes establishing a first secure channel between the hypervisor and a verification entity, sending certification data of the hypervisor in the first secure channel to the verification entity, reception by the hypervisor, in the first secure channel, from the verification entity, of at least one piece of cryptographic data, establishing a second secure channel between each virtual machine and the verification entity, and ending certification data of each virtual machine in the second secure channel established for the virtual machine, depending on the associated virtualized root of trust.
Abstract: An incident reporting method implemented by a computer. The method includes: generating, at a processing structure, a piece of incident reporting information depending on incident reporting data relative to the incident and generated at one or more user terminals and including at least geolocation data of the incident, selecting one or more recipients of the received incident reporting data depending on the incident reporting data, the recipient or recipients being selected from a database of recipients of the processing structure, and transmitting the incident reporting information to the selected recipient or recipients.
Abstract: A method is described for proving knowledge of a first data item by a user registered to a blockchain, the first data item belonging to the user, the method being implemented by a trusted entity registered on the blockchain. The method includes obtaining the first data item outside the blockchain, generating a second data item from the first data item, outside the blockchain, the second data item to the user, and publishing the second data item in the blockchain after the second data item has been published in the blockchain by a terminal of the user.
Abstract: A method for access to a communication network, implemented by a terminal. The method includes: receiving system information broadcast by the network, the system information including an identification of at least one time-frequency resource capable of carrying a piece of information relative to a unique terminal identifier; transmitting to the network an access request, the access request carrying a first piece of information representative of a unique identifier of the terminal, transmitted on one of the time-frequency resources identified on the basis of the system information, called specific resource; and authorizing access to the network in the case of reception of a response to the access request carrying a second piece of information representative of the unique identifier of the terminal.
Abstract: A method for managing time hops when playing back a multimedia content item received by a playback device via a communication network. The method includes obtaining a plurality of broadcast channels for the same content item, the respective broadcast times being spaced in time, wherein, during rendering of the content item via a channel, called first channel, receipt of a time hop command for a time hop in the content item brings about: a step of selecting a second broadcast channel, different from the first broadcast channel; and during a hop, a step of rendering images broadcast on broadcast channels belonging to the plurality of broadcast channels.
Abstract: A method and device for detecting the reachability of a terminal previously served by a first access device of a registration area of a communication network. The first access device is unable to manage sleep and waking periods of the terminal. The terminal is then served by a second device of the registration area, which is able to manage the periods. The method is implemented by a management entity of the network, which has not been informed of the change of access device. The method includes: exchanging messages with the terminal for registration and negotiation of the sleep and waking periods of the terminal; obtaining an item of information relating to data to be transmitted to the terminal; and sending a contact-establishment request message to the terminal during a determined waking period of the terminal.
Abstract: A method for allocating resources of a network infrastructure in order to provide a telecommunication service is disclosed. The method includes receiving, by a resource orchestrator, a request to instantiate virtualized functions on servers; determining servers to be allocated and resources of the network infrastructure enabling connectivity between the servers, based on the instantiation request; sending, to the determined resources, a configuration request enabling connectivity between the determined servers; and sending, to the determined servers, a request to allocate computing means on the determined servers.
Abstract: A method for coordinating mitigation of a cyber attack, an associated device and system. The coordination method is implemented by a device managing resources in a computing domain, wherein the resources are protected by a plurality of services protecting against cyber attacks. The method includes: producing mitigation plans implemented by protection services from the plurality of protection services in response to a cyber attack targeting at least one of the resources in the computing domain; and following a detection of at least one incompatibility between the mitigation plans produced, coordinating an adjustment to all or some of the incompatible mitigation plans, among the protection services that have implemented the incompatible mitigation plans, so as to eliminate the incompatibility.
Abstract: A wireless communication device is described, having an analogue-digital hybrid architecture comprising passive phase shifters. The device includes a control module configured to control means for switching the communication device, such that the device is capable of alternating between three separate modes: a first/second mode in which each passive phase shifter is integrated into a transmission/reception chain, and a third mode in which each passive phase shifter is integrated into a transmission line.
Type:
Grant
Filed:
May 12, 2021
Date of Patent:
October 1, 2024
Assignee:
ORANGE
Inventors:
Dinh Thuy Phan Huy, Philippe Ratajczak, Dominique Barthel
Abstract: A method for controlling a flow of data associated with a process and routed in a shared data path, including a plurality of flows, of a communication network. The method is implemented in a device of the path and includes: receiving, from a supervision entity, information identifying the flow to be controlled; configuring at least one flow control parameter, the parameter relating to the process corresponding to the received information; and executing an operation of controlling the data flow on the basis of at least one configured parameter.
Abstract: A method for access by a communication device to a network connectivity provided by a third party via an operator network. The method includes: sending, to a management device, a request for attachment to the operator network, including an identifier of the third-party; receiving, from the management device, a message containing contact information of a software control gateway controlling access to a network slice allocated by the operator to the third party and associated with the third party identifier, the contact information including a reachability address of the software control gateway or an identifier of the network slice to which access is controlled by the software control gateway, the message inviting the communication device to attach to the software control gateway; requesting attachment to the software control gateway using the contact information; and accessing to the network connectivity via the slice of the operator network allocated to the third party.
Abstract: A method and a device for enabling a spatio-temporal navigation of content. In response to a request, from a client, for a content comprising a first content of a first type, the device transmits to the client: the first content; a second content of a second type generated from the first content; synchronization metadata associating each word of one of the contents with a time marker to the other content; and a script, for execution at the client, configured to re-establish at least one of the contents and offer a navigation of said content depending on the type of content re-established by using at least one among: the first content, the second content, and the synchronization metadata.
Abstract: A method for managing an urgency state of a first vehicle, implemented by a managing system. The method includes: receiving a first indication of the urgency state of the first vehicle; determining a list of potential itineraries including at least one potential itinerary of the first vehicle; and sending an alert message to at least one detecting element, located at a traffic lane, the at least one detecting element being determined as a function of the at least one potential itinerary of the first vehicle.
Abstract: A method of automatic setup by a first device of a session complying with a dynamic routing protocol with a second device. The setup method includes, subsequent to detection by the first device of existence of a connectivity with the second device, the first device being associated with a first autonomous system number and not knowing any autonomous system number associated with the second device: an exchange with the second device including announcement to the second device of the first autonomous system number, and discovery of a second autonomous system number with which the second device is associated; or allocation to the second device of a third autonomous system number and announcement to the second device of the third autonomous system number which has been allocated to it; and setup with the second device of a session according to the routing protocol by using the autonomous system numbers exchanged.
Abstract: A method for connecting a terminal outside the range of its home network, to a network of a visited area covered by a plurality of networks. The method includes sending a request relating to the connection, including an identifier relating to the visited area, receiving a response message to the request, including a list of at least one network of the plurality of networks, to which the terminal should connect in priority, disconnecting the terminal and connecting the terminal to the priority network of the list. A processing method includes receiving the request including an identifier relating to the visited area, obtaining, on the basis of the identifier, the list of at least one network from the plurality of networks, to which the terminal should connect in priority, and sending a response message to the request, including the list.
Abstract: A method for managing downloading of images associated with image jumps liable to be implemented during accelerated playback of content. The content is able to be downloaded from a communications network. According to the method at least one image associated with a jump is downloaded in advance.
Abstract: A uterine manipulator includes: a main body coupled at one end thereof to a handle and extending in one direction to be inserted into the vagina; a mount coupled to the other end of the main body and having a guide hole formed therethrough in a longitudinal direction of the main body; a support disposed on the mount to support the uterine cervix; a slider inserted into the guide hole to be coupled at one end thereof to the main body and extending in one direction to be inserted into the uterine corpus; an adjuster coupled to both the one end of the slider and the main body; and a head disposed at the other end of the slider.
Abstract: A method for mediating a plurality of user applications via an application relating to a Stream Control Transport Protocol, called a generic application. The method is implemented in an agent device, capable of establishing a connection based on the Stream Control Transport Protocol with a terminal device. The method includes: receiving from the terminal device a request packet of the Stream Control Transport Protocol comprising a data fragment containing an identifier of a user application requested by the terminal device and further comprising a header containing a destination port identifier dedicated to the generic application; verifying that the requested user application is an application of the plurality; and in the case where the requested user application is an application of the plurality, transmitting to the terminal device an agreement message.
Abstract: A method for selection by an ambient backscatter system including a source as well as transmitting and receiving devices, the source being associated with a precoder for focusing signals towards the devices. Furthermore, the method includes, for a plurality of values ?_1, . . . , ?_N: a phase-shift, by the source, of one of the components of the precoder according to the value ?_i, so as to obtain a precoder Q_i; an emission, by the source, using the precoder Q_i; an acquisition, by the receiving device, of power measurements during non-backscattering and backscattering states, a determination, by the receiving device, of a value D1_i representative of a power deviation between the measurements. The method also includes a selection, by the receiving device, of a maximum value among the values D1_1, . . . , D1_N.