Patents by Inventor Ioannis Broustis
Ioannis Broustis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160100330Abstract: A scalable virtualized network core is provided to allow for incrementally adjusting network resources in response to changing demand, and for improved flexibility in network management and control. The scalable virtualized network core provides a cloud evolved packet core that has virtual machines performing the functions of the individual server elements. As demand for network resources changes, additional virtual machines can be brought online or virtual machines can be terminated to efficiently address the demand. An abstraction agent can be provided to facilitate the physical to logical connections so that to the perspective of elements in a radio access network, no changes have been made. The abstraction agent also facilitates network control and management of the virtual machines.Type: ApplicationFiled: October 3, 2014Publication date: April 7, 2016Inventors: Ioannis Broustis, Rittwik Jana, Sarat Puthenpura, Nemmara K. Shankaranarayanan
-
Patent number: 9301167Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.Type: GrantFiled: September 25, 2015Date of Patent: March 29, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
-
Publication number: 20160088492Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.Type: ApplicationFiled: November 25, 2015Publication date: March 24, 2016Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
-
Patent number: 9240881Abstract: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.Type: GrantFiled: April 30, 2012Date of Patent: January 19, 2016Assignee: Alcatel LucentInventors: Ioannis Broustis, Violeta Cakulev
-
Publication number: 20160014622Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.Type: ApplicationFiled: September 25, 2015Publication date: January 14, 2016Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
-
Patent number: 9232387Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.Type: GrantFiled: October 22, 2013Date of Patent: January 5, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
-
Patent number: 9173106Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.Type: GrantFiled: November 25, 2013Date of Patent: October 27, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
-
Patent number: 9166778Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.Type: GrantFiled: July 13, 2012Date of Patent: October 20, 2015Assignee: Alcatel LucentInventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
-
Publication number: 20150146514Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Applicant: AT&T Intellectual Property I, L.P.Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
-
Publication number: 20150110008Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.Type: ApplicationFiled: October 22, 2013Publication date: April 23, 2015Applicant: AT&T Intellectual Property I, L.P.Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
-
Patent number: 8849203Abstract: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.Type: GrantFiled: June 27, 2012Date of Patent: September 30, 2014Assignee: Alcatel LucentInventors: Violeta Cakulev, Ioannis Broustis, Semyon B. Mizikovsky
-
Patent number: 8769259Abstract: There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.Type: GrantFiled: January 6, 2012Date of Patent: July 1, 2014Assignee: Alcatel LucentInventors: Ioannis Broustis, Violeta Cakulev, Ganapathy Subramanian Sundaram
-
Patent number: 8650619Abstract: An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service.Type: GrantFiled: August 19, 2010Date of Patent: February 11, 2014Assignee: Alcatel LucentInventors: Ganapathy Sundaram, Semyon B. Mizikovsky, Ioannis Broustis
-
Publication number: 20140004796Abstract: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: ALCATEL-LUCENT USA INC.Inventors: Violeta Cakulev, Ioannis Broustis, Semyon B. Mizikovsky
-
Publication number: 20130343538Abstract: A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.Type: ApplicationFiled: June 20, 2012Publication date: December 26, 2013Inventors: Semyon Mizikovsky, Ioannis Broustis, Violeta Cakulev
-
Publication number: 20130290696Abstract: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.Type: ApplicationFiled: April 30, 2012Publication date: October 31, 2013Applicant: Alcatel-Lucent USA Inc.Inventors: Ioannis Broustis, Violeta Cakulev
-
Publication number: 20130291100Abstract: An example method includes receiving at a network node a packet destined for an intended destination. The network node determines whether the packet is associated with a machine-to-machine communication. The network node determines whether forwarding of the packet to the intended destination is prohibited, wherein forwarding of the packet is prohibited when the packet is originated from a first machine-to-machine device and is destined to a first host other than a machine-to-machine server associated with machine-to-machine communications. The network node forwards the packet to the intended destination when forwarding the packet is not prohibited.Type: ApplicationFiled: April 30, 2012Publication date: October 31, 2013Inventors: Sundaram S. Ganapathy, Ioannis Broustis
-
Publication number: 20130254277Abstract: At least one example embodiment discloses a method of controlling communications between first and second user equipments (UEs) by a base station in a network. The method includes obtaining an indication, the indication indicating if the first and second UEs are within a communication range of each other and controlling a direct communication link between the first and second UEs if the first and second UEs are within a communication range of each other. The controlling includes allocating at least a first portion of an uplink channel of the network to the direct communication link.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Applicant: ALCATEL-LUCENT USA INC.Inventors: Subramanian Vasudevan, Ioannis Broustis, Violeta Cakulev, Semyon Mizikovsky, Ganesh Sundaram
-
Publication number: 20130182848Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.Type: ApplicationFiled: July 13, 2012Publication date: July 18, 2013Applicant: Alcatel-Lucent USA Inc.Inventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
-
Publication number: 20130179951Abstract: Embodiments address various methods and apparatuses that attempt to minimize the time that the security communication between group members may be at risk due to a user joining or leaving. For example, embodiments include methods of minimizing the time for which a joining member receives a secure commonly shared key and other embodiments include methods of minimizing the time that a user leaving the group has access to data shared within the group through updating the secure commonly shared key.Type: ApplicationFiled: January 6, 2012Publication date: July 11, 2013Inventors: Ioannis Broustis, Violeta Cakulev, Ganapathy Subramanian Sundaram