Method and apparatus for providing content based upon a selected language

    公开(公告)号:US10652622B2

    公开(公告)日:2020-05-12

    申请号:US15634505

    申请日:2017-06-27

    Abstract: Aspects of the subject disclosure may include, for example, providing media content to a presentation device, wherein the media content comprises first audio content in a first language; receiving, from an end user device, a language request, wherein the language request identifies a second language; obtaining, responsive to the second language, second audio content, wherein the second audio content is a translation of the first audio content into the second language; providing, to the end user device, the second audio content; obtaining, responsive to the second language identified in the language request, supplemental audio content, wherein the supplemental audio content is in the second language, wherein the supplemental audio content is not a translation of the first audio content into the second language, and wherein the supplemental audio content relates to the second language; and providing, to the end user device, the supplemental audio content. Other embodiments are disclosed.

    INTERFERING DEVICE IDENTIFICATION
    43.
    发明申请

    公开(公告)号:US20190364507A1

    公开(公告)日:2019-11-28

    申请号:US15990022

    申请日:2018-05-25

    Abstract: Example methods and systems are disclosed to facilitate detection and identification of devices connected to a cellular network and that are causing interference to the cellular network. An example method may include receiving, by a serving base station of the device, a first set of information associated with data communications of a device utilizing a cellular network. The method may further include determining the device is an interfering device based on the first set of information associated with the data communication substantially corresponding with an interfering device profile, and in response tracking the device. During the tracking of the device, a second set of information associated with the data communications from the device may be obtained, and an interfering device type of the device may be determined based on the second set of information. An action may be performed on the interfering device based on its interfering device type.

    Cellular network hierarchical operational data storage

    公开(公告)号:US10462220B2

    公开(公告)日:2019-10-29

    申请号:US15267420

    申请日:2016-09-16

    Abstract: A system may include a first processor for storing, in a key-value column-based database, data records from data sources of a cellular network that is transformed into a single format. Customer identifiers may be used as key-values for indexing the data records in the key-value column-based database. The system may include a second processor for creating session records from the data records. Each session record may include a velocity of an endpoint device associated with a session and a number of inter-cell handoff attempts for the session. Each session record may also be labeled with a session identifier comprising a customer identifier and a timestamp. The system may further include a third processor for creating cell-level records from the session records. Each cell-level record may include a plurality of key performance indicators for a cell site of the cellular network segregated by a plurality of endpoint device types.

    Altitude based device management in a wireless communications system

    公开(公告)号:US10455520B2

    公开(公告)日:2019-10-22

    申请号:US15474754

    申请日:2017-03-30

    Abstract: Altitude based device management is provided herein. A method can comprise transmitting, by a mobile device comprising a processor, a signaling message to a network device of a wireless network. The signaling message can comprise first data indicating a device type of the mobile device and second data indicating a distance measurement of the mobile device with respect to a reference point. The method can also comprise implementing, by the mobile device, a first instruction related to a power setting and a second instruction related to an operating parameter. The first instruction and the second instruction can be received from the network device and can be based on the device type of the mobile device and the distance measurement of the mobile device.

    Maintaining network connectivity of aerial devices during unmanned flight

    公开(公告)号:US10389432B2

    公开(公告)日:2019-08-20

    申请号:US15630872

    申请日:2017-06-22

    Abstract: Example methods, apparatus, systems, and articles of manufacture (e.g., physical storage media) to facilitate maintaining network connectivity of aerial devices during unmanned flight are disclosed. An example method may include providing, to an access point of a radio access network (RAN) during flight of the unmanned aerial vehicle (UAV) on a flight route, channel allocation instructions for connecting the UAV to the radio access network via communication channels. The method may further include detecting an interference event associated with a portion of the flight route of the UAV during the flight. The method may further include adjusting, during the flight, the channel allocation instructions in response to detecting the interference event. The method may further include providing the adjusted channel allocation instructions to an access point of the radio access network during the flight.

    Proxy-Based Database Encryption
    48.
    发明申请

    公开(公告)号:US20180248848A1

    公开(公告)日:2018-08-30

    申请号:US15445452

    申请日:2017-02-28

    CPC classification number: H04L63/0281 G06F21/6227 H04L63/0428 H04L63/166

    Abstract: Concepts and technologies disclosed herein are directed to proxy-based database encryption. According to one aspect, a database encryption proxy system can receive, from a database client, input of a Structured Query Language (“SQL”) statement and data to create an encrypted database table. At least a portion of the data is marked with an encrypted identifier to identify which data is to be encrypted by the proxy-based database. The database encryption proxy system can generate a random string for the portion of the data that is marked with the encrypted identifier. The database encryption proxy system can convert the SQL statement into a converted SQL statement that includes the random string in place of the portion of the data marked with the encrypted identifier and can send the converted SQL statement to a cloud database service that is configured to create the encrypted database table based upon the converted SQL statement.

Patent Agency Ranking