Abstract: Method for managing access to a plurality of bots, in which the following are performed by a search interface run on a first terminal. During a first access by a user to the search interface: receiving an identifier associated with a target mobile terminal and an indication of the user's consent; storing, on the first terminal, the identifier associated with the target mobile terminal and the indication of consent; and receiving a request to launch a lookup operation with a view to selecting a bot and opening a conversation between the latter and the target mobile terminal. The method includes during a subsequent access: pre-displaying the stored identifier and indication of consent; and receiving a new request to launch the lookup operation with a view to selecting a new bot and opening a conversation between the latter and the target mobile terminal.
Abstract: Different frequency channel allocation techniques exist for transmissions. These frequency channel allocation techniques do not explicitly take into account the position of the terminal equipment and the antenna characteristics associated therewith. In addition, these techniques consume significant calculation power in order for the frequency channels to be allocated in the best possible way between the various terminal devices. The communication method is based on the selection of a single current transmission frequency using a metric referred to as metric representative of an overlap of collecting surfaces. The overlap metric evaluates an interference level associated with a spatial overlap between collecting surfaces of a first terminal device and an interfering device for a radio signal transmission frequency.
Abstract: A method for detection of an anomaly in paths for routing data to an address prefix in a network composed of autonomous systems, where the paths are announced to a local autonomous system by neighboring autonomous systems. The method includes: a) receiving information representative of at least one part of the paths during a time interval; b) generating a matrix comprising elements representative of path segments respectively connecting pairs of autonomous systems located on the paths; c) repeating a) and b) to obtain a sequence of matrices according to b); d) analyzing a similarity between the matrices; and e) in a case where at least one of the matrices differs from other matrices, detecting a routing anomaly.
Abstract: A method for wireless communication between a client object and a server object. The method includes the implementation by a proxy of steps of: detecting advertising packets broadcast by the server object; establishing a first connection between the proxy and the server object so as to block the broadcasting by the server object of advertising packets, and retrieving identification information from the server object; and establishing a second connection between the proxy and the client object, by using as proxy identification information the retrieved identification information of the server object, so as to simulate with the client object a connection with the server object.
Type:
Grant
Filed:
August 5, 2020
Date of Patent:
November 19, 2024
Assignee:
ORANGE
Inventors:
Eric Bouvet, Thibaut Deshaies, Fabrice Fontaine
Abstract: A method for controlling the authentication of a user by an authentication device, the authentication being implemented by verification, by the authentication device, that a code entered by the user on an interaction interface of the authentication device corresponds to a predetermined code associated with the user is disclosed. A signal representative of a radio signal characteristic of an interaction of the user on the interaction interface of the authentication device is received by the user's terminal. The radio signal is transmitted by an antenna of the authentication device via a channel using electromagnetic wave conduction capacities of the user's body when the user enters the code. It is verified that the radio signal corresponds to a previously stored reference signal, and, in the event of a positive verification, a piece of data representative of the user's identity is transmitted to the authentication device for verification with the user's identity.
Type:
Grant
Filed:
May 4, 2020
Date of Patent:
November 12, 2024
Assignee:
Orange
Inventors:
Philippe Michel Levionnais, Olivier Lepetit
Abstract: A method for routing data of a session initialized between a terminal and a server, over a first network slice corresponding to a set of data-processing functions of a communication infrastructure, implemented by the terminal. This method includes receiving from the server at least one routing identifier determined as a function of at least one communication parameter of the session, configuring session information as a function of the at least one identifier received, and emitting to the server subsequent data routed over at least one second slice corresponding to the configured information.
Type:
Grant
Filed:
August 29, 2023
Date of Patent:
November 12, 2024
Assignee:
ORANGE
Inventors:
Gael Fromentoux, Frederic Fieau, Emile Stephan
Abstract: An optronic transceiver module is disclosed. The optronic transceiver module includes an m to n main optical coupler capable of splitting a downlink signal into n downlink optical signals of the same power to be transmitted in n optical fibres, a first uplink optical coupler capable of splitting an uplink signal into two optical signals split according to a predetermined reference power ratio and delivering a low-power signal and a high-power signal, a first power measurement photodiode delivering a power measurement associated with a first low-power signal, the main optical coupler being capable of aggregating the high-power optical signal and a second uplink optical signal representative of an optical signal received via a second optical fibre, into an aggregated uplink optical signal.
Abstract: A synchronized adaptation of a virtual subset of a telecommunication network, referred to as a “network slice”, dedicated to an elementary service of a set of services is disclosed. A more encompassing service is generally composed of several elementary services to which separate respective slices are dedicated. The telecommunication network includes a plurality of network slices, and these slices are configured according to a plurality of configuration parameters. In particular, at least one second configuration parameter of at least one second slice dedicated to a second elementary service of a set of services is modified on the basis of at least one modification of a first configuration parameter of a first slice dedicated to a first elementary service of the set of services.
Abstract: A method is provided for granting access, for user equipment registered in a home mobile network to a wireless local area network. In this method, a probe request is received by an access network server located in the wireless local area network, wherein this probe request includes first information allowing to identify the home mobile network of the user equipment. The access network server determines then at least one access point of the wireless local area network to which the user equipment is allowed to connect, based on the identification of the home mobile network from the first information and sends a response message including at least one access identifier identifying the at least one access point of the wireless local area network.
Abstract: A method, a gateway, a synchronization server, a corresponding terminal and a system for transmitting a message intended for a first terminal, referred to as a destination terminal, from a second terminal, referred to as a source terminal, to at least one third terminal, referred to as an associated terminal, sharing a same identifier with the destination terminal. The method includes, following reception of the message by a gateway, transmitting from the gateway to a synchronization server the message by using a first signaling protocol and recovering by the at least one associated terminal the message intended for the destination terminal from the synchronization server by using a first synchronization message.
Abstract: A method for providing certificates is described, the method implemented by a virtualized computing platform comprising a root of trust, a hypervisor and at least one virtual machine, the hypervisor implementing one virtualized root of trust per virtual machine and offering root of trust services. The method includes establishing a first secure channel between the hypervisor and a verification entity, sending certification data of the hypervisor in the first secure channel to the verification entity, reception by the hypervisor, in the first secure channel, from the verification entity, of at least one piece of cryptographic data, establishing a second secure channel between each virtual machine and the verification entity, and ending certification data of each virtual machine in the second secure channel established for the virtual machine, depending on the associated virtualized root of trust.
Abstract: A system and method for facilitating communication between a control server and robotic devices are provided. An integration engine of the system identifies protocol schemes and message schemes that are supported by the control server and robotic devices. When the protocol schemes and message schemes of the control server and the robotic devices are same, the integration engine facilitates transmission and reception of instructions between the control server and the robotic devices through identified communication interfaces. When the protocol schemes and message schemes of the control server and the robotic devices are different, the integration engine translates the protocol schemes and message schemes that are received from one of the control server and the robotic devices to facilitate communication between the control server and the robotic devices through identified communication interfaces.
Type:
Grant
Filed:
September 23, 2022
Date of Patent:
October 29, 2024
Assignee:
Grey Orange Incorporated
Inventors:
Siddharth Malhotra, Mohit Kumar, Jai Thakkar, Sumit Kumar Tiwary
Abstract: An incident reporting method implemented by a computer. The method includes: generating, at a processing structure, a piece of incident reporting information depending on incident reporting data relative to the incident and generated at one or more user terminals and including at least geolocation data of the incident, selecting one or more recipients of the received incident reporting data depending on the incident reporting data, the recipient or recipients being selected from a database of recipients of the processing structure, and transmitting the incident reporting information to the selected recipient or recipients.
Abstract: A method for managing time hops when playing back a multimedia content item received by a playback device via a communication network. The method includes obtaining a plurality of broadcast channels for the same content item, the respective broadcast times being spaced in time, wherein, during rendering of the content item via a channel, called first channel, receipt of a time hop command for a time hop in the content item brings about: a step of selecting a second broadcast channel, different from the first broadcast channel; and during a hop, a step of rendering images broadcast on broadcast channels belonging to the plurality of broadcast channels.
Abstract: A method for access to a communication network, implemented by a terminal. The method includes: receiving system information broadcast by the network, the system information including an identification of at least one time-frequency resource capable of carrying a piece of information relative to a unique terminal identifier; transmitting to the network an access request, the access request carrying a first piece of information representative of a unique identifier of the terminal, transmitted on one of the time-frequency resources identified on the basis of the system information, called specific resource; and authorizing access to the network in the case of reception of a response to the access request carrying a second piece of information representative of the unique identifier of the terminal.
Abstract: A method is described for proving knowledge of a first data item by a user registered to a blockchain, the first data item belonging to the user, the method being implemented by a trusted entity registered on the blockchain. The method includes obtaining the first data item outside the blockchain, generating a second data item from the first data item, outside the blockchain, the second data item to the user, and publishing the second data item in the blockchain after the second data item has been published in the blockchain by a terminal of the user.
Abstract: A method and device for detecting the reachability of a terminal previously served by a first access device of a registration area of a communication network. The first access device is unable to manage sleep and waking periods of the terminal. The terminal is then served by a second device of the registration area, which is able to manage the periods. The method is implemented by a management entity of the network, which has not been informed of the change of access device. The method includes: exchanging messages with the terminal for registration and negotiation of the sleep and waking periods of the terminal; obtaining an item of information relating to data to be transmitted to the terminal; and sending a contact-establishment request message to the terminal during a determined waking period of the terminal.
Abstract: A method for allocating resources of a network infrastructure in order to provide a telecommunication service is disclosed. The method includes receiving, by a resource orchestrator, a request to instantiate virtualized functions on servers; determining servers to be allocated and resources of the network infrastructure enabling connectivity between the servers, based on the instantiation request; sending, to the determined resources, a configuration request enabling connectivity between the determined servers; and sending, to the determined servers, a request to allocate computing means on the determined servers.
Abstract: A method for coordinating mitigation of a cyber attack, an associated device and system. The coordination method is implemented by a device managing resources in a computing domain, wherein the resources are protected by a plurality of services protecting against cyber attacks. The method includes: producing mitigation plans implemented by protection services from the plurality of protection services in response to a cyber attack targeting at least one of the resources in the computing domain; and following a detection of at least one incompatibility between the mitigation plans produced, coordinating an adjustment to all or some of the incompatible mitigation plans, among the protection services that have implemented the incompatible mitigation plans, so as to eliminate the incompatibility.