Patents by Inventor Ioannis Broustis

Ioannis Broustis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160100330
    Abstract: A scalable virtualized network core is provided to allow for incrementally adjusting network resources in response to changing demand, and for improved flexibility in network management and control. The scalable virtualized network core provides a cloud evolved packet core that has virtual machines performing the functions of the individual server elements. As demand for network resources changes, additional virtual machines can be brought online or virtual machines can be terminated to efficiently address the demand. An abstraction agent can be provided to facilitate the physical to logical connections so that to the perspective of elements in a radio access network, no changes have been made. The abstraction agent also facilitates network control and management of the virtual machines.
    Type: Application
    Filed: October 3, 2014
    Publication date: April 7, 2016
    Inventors: Ioannis Broustis, Rittwik Jana, Sarat Puthenpura, Nemmara K. Shankaranarayanan
  • Patent number: 9301167
    Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: March 29, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
  • Publication number: 20160088492
    Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.
    Type: Application
    Filed: November 25, 2015
    Publication date: March 24, 2016
    Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
  • Patent number: 9240881
    Abstract: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: January 19, 2016
    Assignee: Alcatel Lucent
    Inventors: Ioannis Broustis, Violeta Cakulev
  • Publication number: 20160014622
    Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.
    Type: Application
    Filed: September 25, 2015
    Publication date: January 14, 2016
    Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
  • Patent number: 9232387
    Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.
    Type: Grant
    Filed: October 22, 2013
    Date of Patent: January 5, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
  • Patent number: 9173106
    Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: October 27, 2015
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
  • Patent number: 9166778
    Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: October 20, 2015
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
  • Publication number: 20150146514
    Abstract: To efficiently mitigate cell coverage disruptions caused by either unplanned equipment failures or planned outages during maintenance activities, an efficient cell site outage mitigation system is provided to calculate an optimal configuration for neighboring cell site devices before adjusting the cell site configuration settings to cover the coverage gap. The optimal configuration is determined using an offline model learner. Radio frequency propagation models and user demand and distribution models can be used to determine the offline solution. The optimal configuration setting learnt using an offline model is then implemented when an outage is determined to have occurred in the operational field.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Ajay Mahimkar, Ioannis Broustis, Zihui Ge, Sarat Puthenpura, Leonid Razoumov, Aman M. Shaikh, Nemmara K. Shankaranarayanan, Jia Wang, Xing Xu, He Yan
  • Publication number: 20150110008
    Abstract: Multiple access wireless communication networks/infrastructures are virtualized in telecommunications environments. A system replicates a cell identifier associated with a macro base station device to create a virtual base station device presence for a set of network devices included in the multiple access wireless communication network and thereafter facilitates communication with the multiple access wireless communication network, the set of network devices, and a mobile device through the created virtual base station presence.
    Type: Application
    Filed: October 22, 2013
    Publication date: April 23, 2015
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Sarat Puthenpura, Ioannis Broustis, Leonid Razoumov, Eric Rozner
  • Patent number: 8849203
    Abstract: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: September 30, 2014
    Assignee: Alcatel Lucent
    Inventors: Violeta Cakulev, Ioannis Broustis, Semyon B. Mizikovsky
  • Patent number: 8769259
    Abstract: There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.
    Type: Grant
    Filed: January 6, 2012
    Date of Patent: July 1, 2014
    Assignee: Alcatel Lucent
    Inventors: Ioannis Broustis, Violeta Cakulev, Ganapathy Subramanian Sundaram
  • Patent number: 8650619
    Abstract: An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service.
    Type: Grant
    Filed: August 19, 2010
    Date of Patent: February 11, 2014
    Assignee: Alcatel Lucent
    Inventors: Ganapathy Sundaram, Semyon B. Mizikovsky, Ioannis Broustis
  • Publication number: 20140004796
    Abstract: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: ALCATEL-LUCENT USA INC.
    Inventors: Violeta Cakulev, Ioannis Broustis, Semyon B. Mizikovsky
  • Publication number: 20130343538
    Abstract: A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.
    Type: Application
    Filed: June 20, 2012
    Publication date: December 26, 2013
    Inventors: Semyon Mizikovsky, Ioannis Broustis, Violeta Cakulev
  • Publication number: 20130290696
    Abstract: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Ioannis Broustis, Violeta Cakulev
  • Publication number: 20130291100
    Abstract: An example method includes receiving at a network node a packet destined for an intended destination. The network node determines whether the packet is associated with a machine-to-machine communication. The network node determines whether forwarding of the packet to the intended destination is prohibited, wherein forwarding of the packet is prohibited when the packet is originated from a first machine-to-machine device and is destined to a first host other than a machine-to-machine server associated with machine-to-machine communications. The network node forwards the packet to the intended destination when forwarding the packet is not prohibited.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Inventors: Sundaram S. Ganapathy, Ioannis Broustis
  • Publication number: 20130254277
    Abstract: At least one example embodiment discloses a method of controlling communications between first and second user equipments (UEs) by a base station in a network. The method includes obtaining an indication, the indication indicating if the first and second UEs are within a communication range of each other and controlling a direct communication link between the first and second UEs if the first and second UEs are within a communication range of each other. The controlling includes allocating at least a first portion of an uplink channel of the network to the direct communication link.
    Type: Application
    Filed: March 21, 2012
    Publication date: September 26, 2013
    Applicant: ALCATEL-LUCENT USA INC.
    Inventors: Subramanian Vasudevan, Ioannis Broustis, Violeta Cakulev, Semyon Mizikovsky, Ganesh Sundaram
  • Publication number: 20130182848
    Abstract: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.
    Type: Application
    Filed: July 13, 2012
    Publication date: July 18, 2013
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Ganapathy S. Sundaram, Ioannis Broustis, Violeta Cakulev
  • Publication number: 20130179951
    Abstract: Embodiments address various methods and apparatuses that attempt to minimize the time that the security communication between group members may be at risk due to a user joining or leaving. For example, embodiments include methods of minimizing the time for which a joining member receives a secure commonly shared key and other embodiments include methods of minimizing the time that a user leaving the group has access to data shared within the group through updating the secure commonly shared key.
    Type: Application
    Filed: January 6, 2012
    Publication date: July 11, 2013
    Inventors: Ioannis Broustis, Violeta Cakulev, Ganapathy Subramanian Sundaram