Patents by Inventor Moshiur Rahman
Moshiur Rahman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11387991Abstract: Aspects of the subject disclosure may include, for example, determining that quantum entanglement be established between first and second nodes of a service provider network including a software defined network (SDN) that facilitates delivery of a service to a subscriber and identifying a path between the first node and the second node based on pre-provisioned information supplied by the SDN. A path length of the path is estimated based on the pre-provisioned information supplied by the SDN, and a repeater node is selected responsive to the path length exceeding a threshold, wherein the path includes a first segment having a segment length that does not exceed the threshold. A quantum entanglement state is shared between the first and second nodes based on transportation of a first photon of a first entangled pair of photons via the first segment. Other embodiments are disclosed.Type: GrantFiled: December 6, 2019Date of Patent: July 12, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, Robert D. Boudreau, Jr.
-
Publication number: 20220216924Abstract: Aspects of the subject disclosure may include, for example, monitoring a security status of a wireless communication session comprising a back-haul link supporting a classical communication channel between a wireless access point and a wireless mobility core network. The classical communication channel is adapted to transport underlying data of the wireless communication session and, responsive to determining a change in the security status, associating with the wireless communication session a quantum communication channel adapted to transport information via qubits. Information is exchanged between the wireless access point and the mobility core network via the qubits of the quantum communication channel, wherein the exchanging of the information via the qubits enhances a security level of the wireless communication session in view of a perceived threat. Other embodiments are disclosed.Type: ApplicationFiled: January 4, 2021Publication date: July 7, 2022Applicant: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Publication number: 20220215279Abstract: Aspects of the subject disclosure may include, for example, obtaining instructions for implementing a quantum algorithm adapted to obtain a computational result according to a quantum mechanical process. A sequence of quantum operations is generated according to the instructions for implementing the quantum algorithm, wherein the sequence of quantum operations is adapted to physically manipulate a plurality of quantum bits according to the quantum mechanical process. The sequence of quantum operations is provided to a geographically separated quantum central module, via a communication channel, the geographically separated quantum central module implements the quantum mechanical process to obtain a computational result. The computational result is received from the geographically separated quantum central module via the communication channel. Other embodiments are disclosed.Type: ApplicationFiled: January 4, 2021Publication date: July 7, 2022Applicant: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Publication number: 20220188387Abstract: The present disclosure provides systems and methods for timed unlocking and locking of hardware intellectual properties obfuscation. One such method includes determining whether received key inputs match a functional key sequence of an integrated circuit or a test key sequence of the integrated circuit; permanently enabling operation of the integrated circuit responsive to the received key inputs being determined to be a functional key sequence for permanently enabling operation of the integrated circuit; temporarily enabling operation of the integrated circuit responsive to the received key inputs being determined to be the test key sequence for temporarily enabling operation of the integrated circuit to perform testing of the functionality and disable thereafter; and locking sequential logic and combinational logic of the integrated circuit if the received key inputs are determined to not be either the functional key sequence or the test key sequence. Other systems and methods are also provided.Type: ApplicationFiled: December 13, 2021Publication date: June 16, 2022Inventors: Swarup Bhunia, Abdulrahman Alaql, Aritra Dasgupta, Md Moshiur Rahman
-
Patent number: 11362886Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for distinguishing between network- and device-based sources of service failures in service networks. For instance, in one example, a method includes merging a first set of data with a second set of data to produce a merged data set. The first set of data relates to a customer device connected to a service network and the second set of data relates to the service network. A failure is predicted in the delivery of a service from the service network to the customer device, based on the merged set of data. It is determined whether a source of the failure is rooted in the customer device or in the service network.Type: GrantFiled: November 30, 2020Date of Patent: June 14, 2022Assignee: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Publication number: 20220173805Abstract: The concepts and technologies disclosed herein are directed to quantum tampering threat management. According to one aspect of the concepts and technologies disclosed herein, a quantum security manager (“Q-SM”) can monitor a plurality of quantum channels for tampering. The Q-SM can detect tampering on a quantum channel of the plurality of quantum channels. The Q-SM can provide tampering monitoring statistics to a software-defined network (“SDN”) that, in turn, notifies a quantum security operations center (“Q-SOC”) about the tampering on the quantum channel. The Q-SM can receive threat mitigation instructions from the Q-SOC. The threat mitigation instructions can instruct the Q-SM how to counter the tampering on the quantum channel. The Q-SM can perform one or more actions in accordance with the threat mitigation instructions to counter the tampering on the quantum channel.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, Daniel Solero, William Trost
-
Publication number: 20220173896Abstract: The concepts and technologies disclosed herein are directed to quantum key distribution (“QKD”) networking as a service. According to one aspect disclosed herein, a microservices controller can establish a plurality of quantum connections with a plurality of virtual quantum connection managers (“vQCMs”) deployed in association with a set of quantum user nodes (“QUNs”) in a QKD network. The microservices controller can receive a request to initialize the QKD network. The microservices controller can coordinate with the plurality of vQCMs to handle initialization of the QKD network. The microservices controller can receive a QKD service request from a QKD network operator. The microservices controller can invoke a plurality of microservices to handle the QKD service request.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero, Daniel Sheleheda
-
Publication number: 20220174095Abstract: The concepts and technologies disclosed herein are directed to quantum security enhancement for IPsec protocol. According to one aspect disclosed herein, a quantum resource manager (“Q-RM”) can find a recommended quantum routing path for routing data from a first data center to a second data center via a pair of entangled quantum particles. The Q-RM can instruct a first quantum node (“QN”) associated with the first data center and a second QN associated with the second data center to establish a quantum channel that facilitates the recommended quantum routing path. The Q-RM can prepare an IPsec encrypted tunnel to carry a qubit associated with the pair of entangled quantum particles from the first data center to the second data center. The Q-RM can find the recommended quantum routing path responsive to an issue detected with the IPsec encrypted tunnel previously established between the first data center and the second data center.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero
-
Publication number: 20220166610Abstract: Quantum key distribution network security survivability can be provided by receiving, at a software defined networking controller operating in a control layer of a network, a recommendation from a global analytics service operating in an application layer of the network, the recommendation for replacing a failed communication link in a quantum key distribution layer of the network, the failed communication link being detected by a quantum edge computing device operating in the quantum key distribution layer. The software defined networking controller can generate a command to cause a quantum key distribution resource to perform an action to mitigate impact from the failed communication link. The command can be sent to the quantum key distribution resource and the quantum key distribution resource can perform the action to mitigate the impact from the failed communication link.Type: ApplicationFiled: November 20, 2020Publication date: May 26, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero
-
Publication number: 20220159535Abstract: Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.Type: ApplicationFiled: November 19, 2020Publication date: May 19, 2022Applicant: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Publication number: 20220132360Abstract: On-demand quality of service guarantees are provided in a wireless network environment. The system determines an on-demand quality of service for a segment of a communication path between a user equipment communicating with a radio access network connected to a core network and an external network connected to the core network. The system then determines if the on-demand quality of service for the segment meets a quality of service requirement. If the on-demand quality of service for the segment does not meet the quality of service requirement, the system identifies an alternate communication path between the user equipment and the external network, wherein the alternate communication path differs from the communication path. The system can then setup the alternate communication path for traffic between the user equipment and the external network.Type: ApplicationFiled: January 3, 2022Publication date: April 28, 2022Inventors: Moshiur RAHMAN, Paritosh BAJPAY
-
Patent number: 11310148Abstract: In a network, intelligent content delivery is accomplished by receiving, at an edge server, performance measures from a plurality of local edge servers. Routing policies from an analytics application in a software defined network are received in the edge server that stores address and routing information and the routing policies. The routing policies are distributed to the local edge servers. The local edge servers periodically query the edge server for any changes to the routing policies and when there is a change distributing the change to the routing policies to the local edge servers. When an anomaly is detected at the local edge server, a notification is sent to the edge server that then instructs an orchestrator server to implement the routing policies responsive to the anomaly notification.Type: GrantFiled: June 3, 2019Date of Patent: April 19, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, Lucia Otto
-
Patent number: 11296977Abstract: A central analytics server can be utilized to analyze health data associated with one or more radio access networks (RANs) that has been aggregated from one or more mobile edge computing (MEC) servers, to determine throughput available at a radio link interface associated with a user equipment (UE). Further, the central analytics server can determine, based on the available throughput, a recommendation for an action that can be performed by a content server to optimize content delivery to the UE. In an example, the central analytics server can convey the recommendation to the content server(s) via a “window size” field within a header segment of a transmission control protocol (TCP) via in-band and/or out-of-band signaling. In one aspect, the recommendation can comprise instructions to adapt a bit stream and/or comprise instructions indicative of an optimal data transmission route.Type: GrantFiled: June 18, 2020Date of Patent: April 5, 2022Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Moshiur Rahman
-
Patent number: 11240702Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing on-demand quality of service guarantees in a wireless network environment. The system determines an on-demand quality of service for a segment of a communication path between a user equipment communicating with a radio access network connected to a core network and an external network connected to the core network. The system then determines if the on-demand quality of service for the segment meets a quality of service requirement. If the on-demand quality of service for the segment does not meet the quality of service requirement, the system identifies an alternate communication path between the user equipment and the external network, wherein the alternate communication path differs from the communication path. The system can then setup the alternate communication path for traffic between the user equipment and the external network.Type: GrantFiled: February 3, 2020Date of Patent: February 1, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, Paritosh Bajpay
-
Publication number: 20210409118Abstract: An architecture for surveillance of hybrid fiber coaxial (HFC) 5th generation (5G) Long Term Evolution (LTE) small cell devices using mobile edge computing techniques hosted by a HFC device is disclosed. A method can comprise receiving first data representing a quality of service value associated with a small cell device of a first group of 5G small cell devices; retrieving second data representing a historical quality of service value associated with a second group of 5G small cell devices; as a function of the first data and the second data, generating a change value for the small cell device; and based on the change value, facilitating an adjustment in an operation of the small cell device.Type: ApplicationFiled: September 9, 2021Publication date: December 30, 2021Inventor: Moshiur Rahman
-
Patent number: 11212181Abstract: A processing system including at least one processor may obtain first network analytics data from a plurality of zones of a telecommunication network, generate a set of policies from the first network analytics data via an apriori algorithm, where each policy in the set of policies comprises a pattern matching rule, and deploy policies of the set of policies to a plurality of edge devices in respective zones of the plurality of zones of the telecommunication network. The processing system may further receive, from at least one of the plurality of edge devices in one of the plurality of zones, a first alert of a first policy trigger of a first policy of the set of policies, and transmit a notification to a software defined network controller of the first policy trigger.Type: GrantFiled: July 13, 2020Date of Patent: December 28, 2021Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Moshiur Rahman, Robert D. Boudreau, Jr., Narayan Sahoo
-
Patent number: 11195522Abstract: Devices and techniques are generally described for rejecting false invocations of speech processing skills. In various examples, utterance data comprising automatic speech recognition (ASR) data and natural language understanding (NLU) data may be received. In some examples, ASR confidence data indicating a confidence level of the ASR data may be received. In further examples, NLU confidence data indicating a confidence level of the NLU data may be received. A machine learning model may determine, based at least in part on the ASR confidence data and the NLU confidence data, first false invocation data indicating a likelihood of false invocation of a speech processing skill. In some examples, a first directive may be sent to the speech processing system based at least in part on the first false invocation data. The first directive may be effective to cause the speech processing system to end a current dialog session.Type: GrantFiled: June 17, 2019Date of Patent: December 7, 2021Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Sumit Makashir, Adrien Carre, Jack FitzGerald, Cong Zhang, Piyush Bhargava, Chandrashekar Nagaraju, Md Moshiur Rahman, Xin Liang
-
Publication number: 20210360447Abstract: Method and system for performance assurance in a network slice subset instance (NSSI) or a network slice instance (NSI) of a network. The method comprises receiving, at a network management function (OAM) of the network, a trigger indicating a network performance deficiency; based on the trigger, determining, by a data analytics (DAM) function of the OAM (OAM DAM) in coordination with a network analytics function of one of the core network and a radio access network (RAN) , an NSI/NSSI modification; and implementing, by the OAM, a change in at least one of: NSI/NSSI policies, configurations in at least one of core network functions, the RAN and network resources, in accordance with the NSF NSSI modification.Type: ApplicationFiled: May 31, 2021Publication date: November 18, 2021Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Remziye Irem BOR-YALINIZ, Nimal Gamini SENARATH, Mohammad Moshiur RAHMAN, Chengchao LIANG
-
Patent number: 11146333Abstract: An architecture for surveillance of hybrid fiber coaxial (HFC) 5th generation (5G) Long Term Evolution (LTE) small cell devices using mobile edge computing techniques hosted by a HFC device is disclosed. A method can comprise receiving first data representing a quality of service value associated with a small cell device of a first group of 5G small cell devices; retrieving second data representing a historical quality of service value associated with a second group of 5G small cell devices; as a function of the first data and the second data, generating a change value for the small cell device; and based on the change value, facilitating an adjustment in an operation of the small cell device.Type: GrantFiled: September 10, 2020Date of Patent: October 12, 2021Assignee: AT&T Intellectual Property I, L.P.Inventor: Moshiur Rahman
-
Patent number: 11140568Abstract: Systems and methods described for providing capacity and coverage hole analysis in next generation wireless networks (e.g. 5G networks). Provided is a network function comprising a network interface for receiving data from, and transmitting data to, a plurality of network functions connected to a within a communication network; a processor; and a non-transient memory for storing instructions executable by the processor to cause the network function to receive a request for capacity and coverage hole (CCH) information from a capacity and coverage hole analysis (CCHA) consumer, collect the CCH information responsive to the request; and determine a capacity and coverage hole profile that is indicative of at least one of a network coverage sufficiency and coverage service quality based at least in part on the CCH information.Type: GrantFiled: August 15, 2019Date of Patent: October 5, 2021Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Mohammad Moshiur Rahman, Nimal Gamini Senarath, Remziye Irem Bor Yaliniz, Hang Zhang