Abstract:
Systems and methods herein represent an IoT device as an endpoint of private cloud. A virtualization service receives an IoT identifier for an IoT device and a network address for a virtual endpoint for the IoT device. The virtual endpoint for the IoT device is included in a host cloud platform. The virtualization service maps the IoT identifier to the network address in a distributed data structure for the service provider network and provides instructions, for an edge node for the service provider network, to provide network-layer access controls based on the mapping. The edge node for the service provider network receives an access request from the IoT device, applies a network-layer access control for the IoT device based on the instructions, receive IoT data from the IoT device when the edge node permits access by the IoT device, and forwards the IoT data to the virtual endpoint.
Abstract:
A method includes determining a radio frequency (RF) fingerprint mapping to an indoor floor plan for an indoor area. The method includes clustering Wi-Fi access point devices deployed in the indoor area into groups of Wi-Fi access point devices based on RF fingerprint data received by at least one reference point device. The method includes selecting a Wi-Fi access point device from each group of Wi-Fi access point devices and determining a RF fingerprint based on the selected Wi-Fi access point devices. The method includes receiving a request for a location associated with a mobile device. The request includes a sampled RF fingerprint associated with the mobile device. The method also includes comparing the RF fingerprints based on the selected Wi-Fi access point devices with the sampled RF fingerprint associated with the mobile device to determine a location of the mobile device within the indoor area.
Abstract:
A method includes determining a radio frequency (RF) fingerprint mapping to an indoor floor plan for an indoor area. The method includes clustering Wi-Fi access point devices deployed in the indoor area into groups of Wi-Fi access point devices based on RF fingerprint data received by at least one reference point device. The method includes selecting a Wi-Fi access point device from each group of Wi-Fi access point devices and determining a RF fingerprint based on the selected Wi-Fi access point devices. The method includes receiving a request for a location associated with a mobile device. The request includes a sampled RF fingerprint associated with the mobile device. The method also includes comparing the RF fingerprints based on the selected Wi-Fi access point devices with the sampled RF fingerprint associated with the mobile device to determine a location of the mobile device within the indoor area.
Abstract:
A network device receives a request for a selected video from a first user at a client device, and determines similarities between a second user associated with the first user and other parents in a collaborative community, wherein the similarities are determined based on the second user's, and the other users', prior censoring of videos. The network device obtains all exclusions applied by the second user, and the other users, in the collaborative community to the selected video, wherein each of the exclusions comprises a portion of the selected video identified for censoring by one of the users in the collaborative community. The network device further selectively applies each of the determined exclusions to the selected video based on the determined similarities, and sends the selected video, with the selectively applied exclusions, to the requesting first user at the client device.
Abstract:
Systems and methods herein represent an IoT device as an endpoint of private cloud. A virtualization service receives an IoT identifier for an IoT device and a network address for a virtual endpoint for the IoT device. The virtual endpoint for the IoT device is included in a host cloud platform. The virtualization service maps the IoT identifier to the network address in a distributed data structure for the service provider network and provides instructions, for an edge node for the service provider network, to provide network-layer access controls based on the mapping. The edge node for the service provider network receives an access request from the IoT device, applies a network-layer access control for the IoT device based on the instructions, receive IoT data from the IoT device when the edge node permits access by the IoT device, and forwards the IoT data to the virtual endpoint.
Abstract:
An exemplary method includes an unintended-dialing detection and prevention system 1) determining, based on an unintended-dialing detection heuristic, a phone dialing pattern associated with a phone dialing event of a phone device, 2) determining, based on the unintended-dialing detection heuristic, that the phone dialing pattern associated with the phone dialing event matches a predefined phone dialing pattern indicative of unintended dialing, and 3) automatically performing, in response to the determining that the phone dialing pattern associated with the phone dialing event matches the predefined phone dialing pattern indicative of the unintended dialing, an operation configured to prevent a placement of a phone call by the phone device in response to the phone dialing event. Corresponding methods and systems are also disclosed.
Abstract:
An exemplary method includes an unintended-dialing detection and prevention system 1) determining, based on an unintended-dialing detection heuristic, a phone dialing pattern associated with a phone dialing event of a phone device, 2) determining, based on the unintended-dialing detection heuristic, that the phone dialing pattern associated with the phone dialing event matches a predefined phone dialing pattern indicative of unintended dialing, and 3) automatically performing, in response to the determining that the phone dialing pattern associated with the phone dialing event matches the predefined phone dialing pattern indicative of the unintended dialing, an operation configured to prevent a placement of a phone call by the phone device in response to the phone dialing event. Corresponding methods and systems are also disclosed.
Abstract:
A device may receive content to be provided to a plurality of receiver devices. The device may encrypt the content to form encrypted content. The device may provide the encrypted content to the plurality of receiver devices. The device may determine a plurality of respective latency values for the plurality of receiver devices. A latency value, of the plurality of latency values, may identify a length of time between the device sending information to a respective receiver device, of the plurality of receiver devices, and the information being received by the respective receiver device. The device may provide, to the plurality of receiver devices, a security key for decrypting the encrypted content. The security key may be provided, based on the plurality of latency values, to cause the plurality of receiver devices to receive the security key substantially simultaneously.
Abstract:
An approach is provided for location-based TCP throughput predictions and carrier-assisted video rate adaptation, including predicting a future location of a user device based on one or more location parameters associated with the device, a user of the device, or a combination thereof, predicting a transmission control protocol (TCP) throughput for at least one segment of a multimedia file based on the future location of the device, and transmitting the at least one segment based on the predicted TCP throughput.
Abstract:
A system may be configured to multiplex traffic, on a per-application basis, over multiple networks. The traffic may be multiplexed based on weights, associated with each application, and key performance indicators (“KPIs”) associated with the networks. The system may output a first proportion of traffic, associated with the application, via a first network, and may output a second proportion of traffic, associated the application, via the second network.