-
31.
公开(公告)号:US20250085871A1
公开(公告)日:2025-03-13
申请号:US18960326
申请日:2024-11-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.
-
公开(公告)号:US12250110B2
公开(公告)日:2025-03-11
申请号:US18164763
申请日:2023-02-06
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Sridhar Narahari , John Gibbons , Michael Satterlee
IPC: H04L41/0659 , H04L41/0631 , H04L41/0677 , H04L43/04 , H04L43/065
Abstract: Architectures and techniques are presented that provide an improved mechanism for a subscriber entity to report to a network provider a network issue that affects the performance of an application that uses a service provided by the network provider. The improved mechanism can enable fine granularity with respect to the network issue by identifying the issue on a per-session basis. In response to feedback data that is reported by the subscriber entity, the network provider can perform self-healing or other upgrade techniques to rapidly remedy the network issue.
-
公开(公告)号:US20250080461A1
公开(公告)日:2025-03-06
申请号:US18747894
申请日:2024-06-19
Inventor: Yaron KORAL , Simon TEE , Steven A. MONETTI , Tzuu-Yi WANG , Jennifer REXFORD , Ziaoqi CHEN , Shir Landau FEIBISH
IPC: H04L47/11 , H04L43/062 , H04L43/16 , H04L47/125 , H04L47/2483 , H04L47/32
Abstract: Systems, methods, and apparatuses provide a scalable framework for analyzing queuing and transient congestion in network switches. The system reports which flows contributed to the queue buildup and enables direct per-packet action in the data plane to prevent transient congestion. The system may be configured to analyze queuing in legacy network switches.
-
公开(公告)号:US20250078378A1
公开(公告)日:2025-03-06
申请号:US18953150
申请日:2024-11-20
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Nigel Bradley , Eric Zavesky , James Pratt , Ari Craine , Robert Koch
IPC: G06T13/40 , G06F3/04815 , G06T19/00
Abstract: The disclosed technology relates to detection of attention exhibited by a second user to a first user's avatar in a virtual reality environment. A first user's avatar activity and the second user's activity are evaluated to determine the second user's (e.g., via another avatar) attention level directed towards first user's avatar. Information can be sent to notify the first user that the second user's attention level has satisfied attention-level criterion data. For example, if the second user is viewing and/or is within audio range of the first user for too long of a time or too frequently, then the first user can be notified and/or other action taken. Remedial action is available for negative attention, such blocking the second user from experiencing the first user in the environment. Detection of attention for positive purposes is available, such as to reward an influencer whose avatar is receiving significant attention from followers.
-
35.
公开(公告)号:US12245137B2
公开(公告)日:2025-03-04
申请号:US17702865
申请日:2022-03-24
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Yupeng Jia , Hongyan Lei
IPC: H04W48/16 , H04W72/542 , H04W72/566 , H04B17/318 , H04W72/12
Abstract: Aspects of the subject disclosure may include, for example, obtaining a first portion of a communication service via a first signal having a first frequency within a first band of frequencies, subsequent to the obtaining of the first portion of the communication service, obtaining data associated with a plurality of parameters, analyzing at least the data to identify when a scan for a second signal having a second frequency within a second band of frequencies should be performed, wherein the second band of frequencies is different from the first band of frequencies, and scanning for the second signal based on the analyzing. Other embodiments are disclosed.
-
公开(公告)号:US12242921B1
公开(公告)日:2025-03-04
申请号:US18493485
申请日:2023-10-24
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Brittany Louise Mason , Jasmine Chung , Holly Smith , Paul Taylor , Robert Oakley, Jr. , Laura Trujillo
Abstract: Aspects of the subject disclosure may include, for example: receiving, from a first mobile communication device of a first user, first information associated with a computer-readable indicia that has been scanned by the first mobile communication device, wherein the computer-readable indicia had been displayed by a second mobile communication device of a second user at a time of being scanned by the first mobile communication device; responsive to receiving of the first information, obtaining from one or more first databases first characterizing data that is descriptive of one or more characteristics of the second user; and sending to the first mobile communication device the first characterizing data, wherein the sending facilitates a presentation by the first mobile communication device of the one or more characteristics of the second user. Other embodiments are disclosed.
-
公开(公告)号:US20250071131A1
公开(公告)日:2025-02-27
申请号:US18943639
申请日:2024-11-11
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Arthur L. Zaifman , John Mark Mocenigo
IPC: H04L9/40 , G06F16/955 , G06N7/01 , G06N20/00 , H04L67/125 , H04L67/50
Abstract: Facilitating web page spectroscopy in a communications network is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise receiving first data that describes a first communication packet flow and second data that describes a second communication packet flow. The operations can also comprise training a model based on the first data and the second data, as a result of which the model is trained to detect respective behaviors represented by the first data and the second. Further, the operations can comprise extracting a common parameter from third data that describes a third communication packet flow and fourth data that describes a fourth communication packet flow based on the model.
-
公开(公告)号:US20250071081A1
公开(公告)日:2025-02-27
申请号:US18947027
申请日:2024-11-14
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Nigel Bradley , James Pratt , Eric Zavesky , Ari Craine , Robert Koch
IPC: H04L51/212 , H04L51/224
Abstract: The disclosed technology is generally directed towards monitoring electronic communications to detect content in a communication that is attempting to influence the user in some way. A user can specify influential intent preference data, such as which electronic communications services/applications to monitor for such influential intent content, and the types of the influential intent to monitor for, e.g., political influence types, advertisement influence types, and so on. A user also can specify remedial or other actions to take upon detection, e.g., block such content, alert on detecting such content and so on. An electronic influence manager server and/or application program can perform the monitoring and/or take the actions. Also described is reporting on the communications with influential intent, user actions with respect thereto. Reputation data can also be collected and used with respect to sources of communications with influential intent.
-
公开(公告)号:US20250063393A1
公开(公告)日:2025-02-20
申请号:US18938750
申请日:2024-11-06
Applicant: AT&T Intellectual Property I, L.P.
Inventor: YARON KORAL
Abstract: Excessive signaling by devices against a radio access network (RAN) can be detected and mitigated. A security management component (SMC) can determine whether a total number of control signals received by a base station from devices satisfies a threshold total number of control signals indicative of excessive signaling. If so, SMC can identify a device associated with the base station based on analyzing communication conditions associated with the device. SMC can determine whether to classify the device as an excessive signaling device based on whether the number of control signals received from the device by the base station satisfies a threshold number of control signals indicative of excessive signaling. If so, SMC can determine the device is an excessive signaling device. In response, SMC can perform or facilitate performing a mitigation action to mitigate excessive signaling or can generate statistics relating to the excessive signaling.
-
公开(公告)号:US12231958B2
公开(公告)日:2025-02-18
申请号:US17939793
申请日:2022-09-07
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Zhi Cui , Xiaowen Mang
IPC: H04W28/08 , H04W28/24 , H04W72/563
Abstract: Adaptable resiliency for a virtualized radio access network (vRAN) framework is disclosed. A resiliency management component can determine vRAN topological adaptations that can reflect resiliency requirements of service instance(s). Accordingly, sufficient redundant vRAN components to satisfy the resiliency requirements can be deployed. However, unlike conventional redundancy techniques that can determine a highest level of redundancy and then apply that relative to all supported services, the disclosed subject matter can avoid over-deploying redundant vRAN components, e.g., redundant components exceeding the resiliency requirement of a service instance, resulting in lowered monetary and non-monetary costs to maintain a vRAN. Moreover, as the services change, the topology of the vRAN can be automatically adapted to purge excessive redundancies, add newly required redundancies, etc., which can facilitate propagating an adequate but lean vRAN topology that is sufficiently resilient.
-
-
-
-
-
-
-
-
-