-
11.
公开(公告)号:US12101652B2
公开(公告)日:2024-09-24
申请号:US16582925
申请日:2019-09-25
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Luis Alberto Campos , Bernardo Huberman , Jason W. Rupe , Martha Lurie Lyons , Philip Rosenberg-Watt
IPC: H04W24/04 , H04L41/0668 , H04L41/0686 , H04L45/00 , H04W40/22 , H04W76/50 , H04W84/22 , H04W88/04
CPC classification number: H04W24/04 , H04L41/0668 , H04L41/0686 , H04L45/22 , H04W40/22 , H04W76/50 , H04W84/22 , H04W88/04
Abstract: An ad-hoc wireless network is implemented by a plurality of wireless access points to detect and report failure of a concurrently implemented conventional network. The wireless access points collect and store network status information of the conventional network and send the network status information to a centralized emergency manager when failure of the conventional network is detected. The ad-hoc wireless network may also provide backhaul connectivity to a wireless access point of the failed conventional network for emergency communication.
-
12.
公开(公告)号:US11956351B1
公开(公告)日:2024-04-09
申请号:US18126995
申请日:2023-03-27
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Jing Wang , Bernardo Huberman , Luis Alberto Campos , Zhensheng Jia
CPC classification number: H04L9/0855 , H04B10/27 , H04L9/0891 , H04L9/14 , H04L2209/80
Abstract: A first node of a network includes a quantum receiver, a classical transceiver, and an initial-key generator that cooperate with a second node of the network to receive an initial key via the quantum receiver. The first node includes a key-series generator that (i) decrypts, with the initial key, a first encrypted key of a series of encrypted keys to generate a first unencrypted key of a respective series of unencrypted keys and (ii) decrypts each subsequent encrypted key of the series of encrypted keys with a preceding unencrypted key of the series of unencrypted keys to generate a subsequent unencrypted key of the series of unencrypted keys. The first node includes one or both of a decryptor and an encryptor. The decryptor decrypts encrypted data using a last unencrypted key of the series of unencrypted keys. The encryptor encrypts unencrypted data using the last unencrypted key.
-
公开(公告)号:US11949783B1
公开(公告)日:2024-04-02
申请号:US18108787
申请日:2023-02-13
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Jing Wang , Bernardo Huberman
CPC classification number: H04L9/0855 , G02F1/313 , G06N10/00 , H04B10/50 , H04B10/66 , H04B10/70 , H04L9/0819 , H04L9/083 , H04L9/0894 , G02F2201/30 , H04B10/27
Abstract: Methods, systems, and devices for quantum key distribution (QKD) in passive optical networks (PONs) are described. A PON may be a point-to-multipoint system and may include a central node in communication with multiple remote nodes. In some cases, each remote node may include a QKD transmitter configured to generate a quantum pulse indicating a quantum key, a synchronization pulse generator configured to generate a timing indication of the quantum pulse, and filter configured to output the quantum pulse and the timing indication to the central node via an optical component (e.g., an optical splitter, a cyclic arrayed waveguide grating (AWG) router). The central node may receive the timing indications and quantum pulses from multiple remote nodes. Thus, the central node and remote nodes may be configured to communicate data encrypted using quantum keys.
-
公开(公告)号:US11894677B1
公开(公告)日:2024-02-06
申请号:US17396860
申请日:2021-08-09
Applicant: Cable Television Laboratories, Inc.
Inventor: Bernardo Huberman , Scott H. Clearwater , Scott L. Caruso
IPC: H04Q9/00 , H02J13/00 , H04L67/12 , H04L41/0681
CPC classification number: H02J13/00006 , H02J13/00002 , H04L41/0681 , H04L67/12
Abstract: A system and method for data collection and aggregation using a distributed network of communications enabled sensors connected to another primary network to achieve a secondary out-of-band monitoring perspective, for example, in power grids. The data collection system includes an aggregation and processing server configured to collect data from a variety of sensors adjacent to the monitored network each sensor includes secondary power such that it can continue data transmission even during power grid outages. The data collection system includes a method for secure real-time data ingest, machine learning enabled analysis, risk assessment, and anomaly detection on a broad geographic scale irrespective of isolated network boundaries.
-
公开(公告)号:US20230130053A1
公开(公告)日:2023-04-27
申请号:US18088720
申请日:2022-12-26
Applicant: CABLE TELEVISION LABORATORIES, INC
Inventor: Belal Hamzeh , Bernardo Huberman
Abstract: A wireless communication network includes a plurality of first electronic devices configured for wireless communication, at least one second electronic device configured for wireless communication, and at least one access point configured to wirelessly receive client data from, and transmit network data to, the plurality of first electronic devices and the at least one second electronic device. The wireless communication network further includes a virtual private wireless communication sub-network that includes the plurality of first electronic devices and excludes the at least one second electronic device. The virtual private wireless communication sub-network is configured to enable each of the plurality of first electronic devices to automatically connect with the wireless communication network.
-
公开(公告)号:US11540129B2
公开(公告)日:2022-12-27
申请号:US16271683
申请日:2019-02-08
Applicant: CABLE TELEVISION LABORATORIES, INC
Inventor: Belal Hamzeh , Bernardo Huberman
IPC: H04L9/32 , H04L29/06 , H04W12/08 , H04W76/11 , H04L9/40 , H04W12/04 , H04W12/033 , H04W12/73 , H04W84/12
Abstract: A wireless communication network includes a plurality of first electronic devices configured for wireless communication, at least one second electronic device configured for wireless communication, and at least one access point configured to wirelessly receive client data from, and transmit network data to, the plurality of first electronic devices and the at least one second electronic device. The wireless communication network further includes a virtual private wireless communication sub-network that includes the plurality of first electronic devices and excludes the at least one second electronic device. The virtual private wireless communication sub-network is configured to enable each of the plurality of first electronic devices to automatically connect with the wireless communication network.
-
公开(公告)号:US11444862B2
公开(公告)日:2022-09-13
申请号:US17020286
申请日:2020-09-14
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Bernardo Huberman , Scott H. Clearwater
IPC: H04L43/0882 , H04L41/0896
Abstract: A method for predicting network-traffic bursts includes identifying, in data received by a networking device, a plurality of network-traffic bursts, each of the plurality of network-traffic bursts occurring at a respective one of plurality of burst-times {tN, tN−1, . . . , t0}. The method includes determining a time-interval τn of a next burst occurring at τn after burst-time t1 by determining respective values of τn, a parameter ξ, and a parameter η, that minimize, to within a tolerance, a quantity (ƒk(ξ,η,k)−(τn−tk)) for at least three values of a integer k. Parameters ξ and η are, respectively, a real and imaginary part of a power-law exponent of a power law relating predicted time-interval τn to any of the plurality of burst-times. The method includes determining, from a cumulative distribution function of a normal distribution of previously-identified network-traffic bursts, a time-duration during which the networking device may reallocate bandwidth.
-
公开(公告)号:US11343854B2
公开(公告)日:2022-05-24
申请号:US16945466
申请日:2020-07-31
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Thomas Sandholm , Belal Hamzeh , Bernardo Huberman
Abstract: A novel method that dynamically changes the contention window of access points based on system load to improve performance in a dense Wi-Fi deployment is disclosed. A key feature is that no MAC protocol changes, nor client side modifications are needed to deploy the solution. Setting an optimal contention window can lead to throughput and latency improvements up to 155%, and 50%, respectively. Furthermore, an online learning method that efficiently finds the optimal contention window with minimal training data, and yields an average improvement in throughput of 53-55% during congested periods for a real traffic-volume workload replay in a Wi-Fi test-bed is demonstrated.
-
公开(公告)号:US12219401B1
公开(公告)日:2025-02-04
申请号:US17459633
申请日:2021-08-27
Applicant: Cable Television Laboratories, Inc.
Inventor: Sayandev Mukherjee , Bernardo Huberman
IPC: H04W28/18
Abstract: A method for market-based allocation of communication network resources includes (1) receiving, at an allocation controller, respective bids for communication network resources from a plurality of clusters of network serving devices, and (2) allocating respective communication network resources among the plurality of clusters of network serving devices at least partially based on an amount of the respective bid from each cluster. A method for market-based mitigation of communication link deterioration includes (1) receiving, at a first client device, a communication network resource budget, (2) determining that deterioration of a first communication link between the first client device and a first network serving device has reached a threshold value, and (3) in response to determining that deterioration of the first communication link has reached the threshold value, generating a bid for additional communication network resources.
-
公开(公告)号:US11936780B1
公开(公告)日:2024-03-19
申请号:US17346130
申请日:2021-06-11
Applicant: CABLE TELEVISION LABORATORIES, INC.
Inventor: Bernardo Huberman
CPC classification number: H04L9/0858 , G06N10/00 , H04L9/0894 , H04L9/3215
Abstract: A transaction discovery protocol determines when a value r is less than a value a without learning the value of r or a. The protocol (1) receives, at a first computer via a secure communication channel, value ax, where x is a secret key unknown to the first computer; (2) generates vector B where a first entry is the value r, and subsequent entries are equal to the previous entry plus a predefined resolution; (3) generates vector By from the vector B using secret key y, unknown to a second computer, and sends vector By to the second computer; (4) receives vector Byx from the second computer and generates value axy; and (5) completes an agreement between the first computer and the second computer when the value axy is equal to one of the entries in the vector Byx, indicating that the value r is less than the value a.
-
-
-
-
-
-
-
-
-