Venson Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
Abstract: Aspects of the subject disclosure may include, for example, a method including receiving from a first network slice comprising a first set of virtual network functions instantiated in a network, a first request to chain the first network slice to a second network slice comprising a second set of virtual network functions instantiated in the network to cooperatively facilitate providing a service to a first communication device, transmitting a second request to the first network slice to route a portion of user plane communication traffic associated with the first communication device to the second network slice, and transmitting a third request to the second network slice to receive the portion of the user plane communication traffic associated with the first communication device from the first network slice and to cooperatively facilitate providing a service to the first communication device via the first network slice and the second network slice. Other embodiments are disclosed.
Abstract: Remote provision of a drone resource is disclosed. A user equipment (UE) can generate a request for drone resources that can be employed to find an appropriate drone from a set of drones. The drone can be automatically provisioned to allow access to the drone resource in accord with the request. The set of drones can comprise different tiers of drones. A response can be generated indicating the state of provisioning a drone in accord with the request. The user equipment can make the request available to a drone allocation component via a communication framework that can comprise a wireless interface. Provisioning of the drone can similarly be accomplished via the communication framework. As such, the set of drones can be distributed and can be provisioned from a UE located remotely from the drone allocation component and/or the drones comprising the set of drones.
Abstract: A processing system of a cellular network having a processor may receive, from an endpoint device via one of a first radio access infrastructure or a second radio access infrastructure of the cellular network, a request to establish a connection to a packet data network via the cellular network. The processing system may establish, in response to the request, a first session for the endpoint device via the first radio access infrastructure, and a second session for the endpoint device via the second radio access infrastructure of the cellular network, where the connection to the packet data network includes the first session and the second session. The processing system may further configure the first session or the second session for control plane signaling for the connection, and configure the first session, the second session, or both the first session and the second session for user plane communications for the connection.
Abstract: Robots, users, or a central controller may leverage Geo analytics and/or augmented reality to search for, discover, access and use robots. The robots may perform tasks to provide selective services on-demand within medicine, agriculture, military, entertainment, manufacturing, personal, or public safety, among other things.
Abstract: Concepts and technologies disclosed herein are directed to master service orchestration of virtual network functions (“VNFs”). According to one aspect of the concepts and technologies disclosed herein, a network functions virtualization (“NFV”) platform includes a hardware resources layer including a plurality of hardware resources, a plurality of VNF resource pools, a plurality of service controllers corresponding to the plurality of VNF resource pools, and a master service orchestrator. The master service orchestrator can, when executed by at least a portion of the plurality of hardware resources, causes the master service orchestrator to perform operations. In particular, the master service orchestrator can receive, from a user equipment (“UE”), a service request.
Abstract: Aspects of the subject disclosure may include, for example, a method including enabling, by a system comprising a processor, a first modification of a first user profile at a secondary data repository of a communication network; the first modification is directed by a first application operating at a first communication device of the communication network. A usage event is identified that is associated with the first communication device according to the first modification to the first user profile. A second modification to a second user profile is replicated at a primary data repository according to a change in operation of a second application associated with the usage event that is identified to the first communication device; the replication is performed according to an update policy for the primary data repository. Other embodiments are disclosed.
Abstract: Aspects of the subject disclosure may include, for example, detecting a request for access to a wireless network via an access point. Responsive to a first determination that the identifier corresponds to an entry in the list, access is facilitated to the wireless network via the access point without the equipment of the requesting user providing credentials to the wireless network. The list includes a first set of entries corresponding to a first set of users having unrestricted access and a second set of entries corresponding to a second set of users having restricted access. Responsive to a second determination that the identifier does not correspond to any of the entries, a message is transmitted to equipment of the host regarding the request, and responsive to receiving approval, the list is updated to include the identifier. Other embodiments are disclosed.
Abstract: Aspects of the subject disclosure may include, for example, detecting a request for a network service between two network nodes and identifying a network path between the two network nodes, wherein the network path is realized by equipment performing a number of network functions. A first network function of the number of network functions is associated with a first number of redundant virtualized network resources performing at least a similar network function as the first network function. Usage metrics are determined corresponding to the first number of redundant virtualized network resources and a first virtualized network resource of the first number of redundant virtualized network resources is assigned to the network path based on the usage metrics to obtain a first assigned virtualized network resource. The network service is provided between the two network nodes using the first assigned virtualized network resource. Other embodiments are disclosed.
Abstract: In 5G Non-Standalone (NSA), to balance the load on 5G users and 4G users effectively, the disclosed technology selects the proper secondary cell group (SCG), when the master cell group (MCG) is provided by 4G infrastructure. E-UTRAN New Radio-Dual Connectivity (ENDC) allows users to connect to a 4G MCG and a 5G SCG (SCG). The technology selects the SCG based on each user's application's attributes such as UL/DL data volume, speed or bandwidth.
Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register a connected device with the 5G network, monitor the connected device by the computing device associated with the 5G network, and detect or determine that the connected device is at risk of a cyber-attack based on one or more conditions. The conditions can include detecting that the connected device is obsolete or unmaintained, the connected device fails to respond to status checks, or a service provider associated with the connected device is not supporting the connected device or is out of business. In response to detecting or determining that the connected device is at risk of the cyber-attack, the system can deauthorize the connected device.
Abstract: Aspects of the subject disclosure may include, for example, determining a first group of virtual network functions of a first network slice instantiated within a software defined network and adapted to perform a first activity that facilitates delivery of a service to wireless equipment of a first user. Access is facilitated to a second group of virtual network functions of a second network slice responsive to a determination of an occurrence of a condition. The second group of virtual network functions, when instantiated within the software defined, network are configured to deliver the service to the wireless equipment of the first user. The second network slice is further adapted to perform another activity that facilitates delivery of another service. Other embodiments are disclosed.
Abstract: Robots may be instantiated on-demand and may be adaptive in response to an environment, application, or event change. The adapted robot may switch functions in order to perform selective operations within medicine, agriculture, military, entertainment, or manufacturing, among other things.
Abstract: Aspects of the subject disclosure may include, for example, receiving a first service request via a network, transmitting a query to service layer equipment, and receiving, from the service layer equipment, first service requirements to fulfill the first service request. Responsive to receiving the first service requirements, a request for network resource capacity information is transmitted to instantiated software defined network (SDN) controllers. Network capacity information is received from the instantiated SDN controllers and an insufficiency thereof is determined according to the service requirements and the network capacity information. Another software defined network controller is instantiated into the network, responsive to the determined insufficiency, to fulfill the first service request. The first service requirements are met, in part, by the instantiated software defined network controllers that are instantiated and, in part, by the other software defined network controller.
Abstract: Aspects of the subject disclosure may include, for example, a method comprising providing services over a network to a device, and constructing device capability and usage profiles. A level of service quality for the device is adjusted by adjusting a latency criterion regarding connection of the device to the network; adjusting a speed of transmissions to or from the device; and altering a routing of transmissions to or from the device. The network can be partitioned so that the adjusted service quality level is provided by a network portion having a predetermined level of resources. The adjusted service quality level can comprise a first level while the device is active and a second level while the device is inactive; the first level is higher than the second level. The first and second levels are lower than a service quality level provided by another network portion. Other embodiments are disclosed.
April 12, 2021
July 29, 2021
AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
Abstract: Aspects of the subject disclosure may include, for example, accessing first information for a first wireless access device associated with a first wireless access network in first communication with a portable communication device and accessing second information for a second wireless access device associated with a second wireless access network. A determination is made according to the first information and the second information, to facilitate second communication between the portable communication device and the second wireless access network via the second wireless access device. A first portion of a first geographic area associated with the second wireless access device is covered via a directional capability responsive to a determination to facilitate the second communication between the portable communication device and the second wireless access network. The directional capability facilitates the second communication between the portable communication device and the second wireless access device.
Abstract: The functionality of Internet enabled devices, also referred to as Internet of Things (IoT) devices, is dependent upon network connectivity with application servers hosted in the cloud. The disclosed Internet enabled device application service chaining orchestrator (Orchestrator) may manage application servers according to application server parameters and may assist a network in managing communications between Internet enabled devices and their respective application servers in the cloud. The application server parameters for a particular application server may be assigned based on the IoT device that the particular application server supports (e.g., the device capabilities or network performance requirements). Exemplary application server parameters may include Industry Vertical (IV), which may be a designation for an industry or technical field that the IoT device and the application server supports. Each IV may include multiple Class of Service (CoS) (e.g., CoS1, CoS2, CoS3 . . .
Abstract: The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a 5G wireless network. The method can include receiving a communication from a wireless device. The communication can include metadata, which includes contextual information about the wireless device. The contextual information is compared with a threshold to generate an output indicating a context of the communication. In response to the output, the network access node can simulate a vulnerability of the network access node that allows an unauthorized activity on the 5G wireless network. The network access node can detect that the wireless device seeks to exploit the simulated vulnerability to perform the unauthorized activity, and then quarantines access of the wireless device such that the unauthorized activity is thwarted at the network access node.
Abstract: Facilitating machine to machine communication solutions is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations that can comprise establishing a first communication link between a first communication device associated with a first data center rack of a data center and a second communication device of a central controller device of the data center. The operations can also comprise establishing a second communication link between the first communication device and a third communication device associated with a second data center rack of the data center. Further, the operations can comprise establishing a third communication link between the second communication device and the third communication device.
Abstract: Concepts and technologies disclosed herein are directed to intelligent drone traffic management via a radio access network (“RAN”). As disclosed herein, a RAN node, such as an eNodeB, can receive, from a drone, a flight configuration. The flight configuration can include a drone ID and a drone route. The RAN node can determine whether capacity is available in an airspace associated with the RAN node. In response to determining that capacity is available in the airspace associated with the RAN node, the RAN node can add the drone ID to a queue of drones awaiting use of the airspace associated with the RAN node. When the drone ID is next in the queue of drones awaiting use of the airspace associated with the RAN node, the RAN node can instruct the drone to fly through at least a portion of the airspace in accordance with the drone route.
Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. A first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.