WEB PAGE SPECTROSCOPY
    1.
    发明申请

    公开(公告)号:US20250071131A1

    公开(公告)日:2025-02-27

    申请号:US18943639

    申请日:2024-11-11

    Abstract: Facilitating web page spectroscopy in a communications network is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise receiving first data that describes a first communication packet flow and second data that describes a second communication packet flow. The operations can also comprise training a model based on the first data and the second data, as a result of which the model is trained to detect respective behaviors represented by the first data and the second. Further, the operations can comprise extracting a common parameter from third data that describes a third communication packet flow and fourth data that describes a fourth communication packet flow based on the model.

    DETECTION AND NOTIFICATION OF ELECTRONIC INFLUENCE

    公开(公告)号:US20250071081A1

    公开(公告)日:2025-02-27

    申请号:US18947027

    申请日:2024-11-14

    Abstract: The disclosed technology is generally directed towards monitoring electronic communications to detect content in a communication that is attempting to influence the user in some way. A user can specify influential intent preference data, such as which electronic communications services/applications to monitor for such influential intent content, and the types of the influential intent to monitor for, e.g., political influence types, advertisement influence types, and so on. A user also can specify remedial or other actions to take upon detection, e.g., block such content, alert on detecting such content and so on. An electronic influence manager server and/or application program can perform the monitoring and/or take the actions. Also described is reporting on the communications with influential intent, user actions with respect thereto. Reputation data can also be collected and used with respect to sources of communications with influential intent.

    CORRELATING RADIO ACCESS NETWORK MESSAGES OF AGGRESSIVE MOBILE DEVICES

    公开(公告)号:US20250063393A1

    公开(公告)日:2025-02-20

    申请号:US18938750

    申请日:2024-11-06

    Inventor: YARON KORAL

    Abstract: Excessive signaling by devices against a radio access network (RAN) can be detected and mitigated. A security management component (SMC) can determine whether a total number of control signals received by a base station from devices satisfies a threshold total number of control signals indicative of excessive signaling. If so, SMC can identify a device associated with the base station based on analyzing communication conditions associated with the device. SMC can determine whether to classify the device as an excessive signaling device based on whether the number of control signals received from the device by the base station satisfies a threshold number of control signals indicative of excessive signaling. If so, SMC can determine the device is an excessive signaling device. In response, SMC can perform or facilitate performing a mitigation action to mitigate excessive signaling or can generate statistics relating to the excessive signaling.

    Adaptable resiliency for a virtualized RAN framework

    公开(公告)号:US12231958B2

    公开(公告)日:2025-02-18

    申请号:US17939793

    申请日:2022-09-07

    Abstract: Adaptable resiliency for a virtualized radio access network (vRAN) framework is disclosed. A resiliency management component can determine vRAN topological adaptations that can reflect resiliency requirements of service instance(s). Accordingly, sufficient redundant vRAN components to satisfy the resiliency requirements can be deployed. However, unlike conventional redundancy techniques that can determine a highest level of redundancy and then apply that relative to all supported services, the disclosed subject matter can avoid over-deploying redundant vRAN components, e.g., redundant components exceeding the resiliency requirement of a service instance, resulting in lowered monetary and non-monetary costs to maintain a vRAN. Moreover, as the services change, the topology of the vRAN can be automatically adapted to purge excessive redundancies, add newly required redundancies, etc., which can facilitate propagating an adequate but lean vRAN topology that is sufficiently resilient.

    Configuration of routing areas within an area of interest

    公开(公告)号:US12231909B2

    公开(公告)日:2025-02-18

    申请号:US17731293

    申请日:2022-04-28

    Abstract: Improving configuration of routing areas within an area of interest can include obtaining input data including a list of common language location identifiers within a defined area of interest and identification of a number of routing areas to be created within the area of interest; creating a bounding rectangle around the area of interest represented by the list of common language location identifiers; generating, within the bounding rectangle, a uniformly distributed sequence point; determining, from within the list of common language location identifiers, if the uniformly distributed sequence point is located in a particular common language location identifier of the list of common language location identifiers; if so, adding, to a list of kernel common language location identifiers the uniformly distributed sequence point; and if not, discarding the uniformly distributed sequence point.

    RADIO FREQUENCY SIGNAL PRIORITIZATION AND SELECTION

    公开(公告)号:US20250039769A1

    公开(公告)日:2025-01-30

    申请号:US18918158

    申请日:2024-10-17

    Abstract: Prioritization and selection of signals and associated cells can be managed. User equipment module (UEM) of user equipment (UE) can determine a context associated with a communication session based on analyzing usage behavior information relating to usage behavior, and profile information relating to a profile, associated with the UE. The profile information can be determined by a core module based on information relating to the network or previous communication sessions. Based on analysis results, including context, UEM can determine a characteristic, other than signal strength, that can be more heavily weighted over other characteristics associated with UE or network to facilitate determining which cell, of a cell group, the UE is to connect to for the communication session. UEM can determine and select the cell of the cell group to which the UE is to connect, based on the context and the highest weighted characteristic.

    Autonomous vehicle pairing management

    公开(公告)号:US12213040B2

    公开(公告)日:2025-01-28

    申请号:US17826269

    申请日:2022-05-27

    Abstract: Concepts and technologies disclosed herein are directed to autonomous vehicle pairing management. According to one aspect disclosed herein, a fleet pairing management application executed by a processor of an autonomous vehicle can initiate a fleet pairing process with a plurality of other autonomous vehicles, each of which can execute one of a plurality of other fleet pairing management applications. The fleet pairing management application can send, over a network, an initiate network pairing request to the plurality of other autonomous vehicles. The fleet pairing management application can receive a confirm network pairing response from at least one other autonomous vehicle of the plurality of other autonomous vehicles. A fleet can then be established. The fleet can include the autonomous vehicle and the at least one other autonomous vehicle of the plurality of other autonomous vehicles. The autonomous vehicles in the fleet can then share data among the fleet.

    Intelligent security via accurate mobile device location sensing

    公开(公告)号:US12213034B2

    公开(公告)日:2025-01-28

    申请号:US17655281

    申请日:2022-03-17

    Inventor: Zhi Cui Hongyan Lei

    Abstract: Described is intelligent security based on the detection of the presence of mobile devices within a defined region, determined via accurate mobile device location sensing, e.g., within on the order of one meter. Upon detection of the presence of a mobile device within a defined region via mobile device millimeter wave-based position sensing, an identity associated with the mobile device is obtained. If the identity associated with the mobile device is not a trusted identity, action can be taken based on the presence of the identity within the defined region. The intelligent security can be implemented within an application program of a registered user's mobile device and/or a security system, such as a commercially available security system with alarm monitoring services. Various criteria can determine the action(s) to take, including by which region (if more than one), time of day, identity trust level, duration of presence, and the like.

    VIRTUAL REALITY BOOKMARKS
    10.
    发明申请

    公开(公告)号:US20250028772A1

    公开(公告)日:2025-01-23

    申请号:US18906792

    申请日:2024-10-04

    Abstract: The disclosed technology is directed towards virtual reality bookmarks that maintain state data for a user in a virtual reality environment, such that the user can to return to that virtual reality environment at a later time. While presenting virtual reality session content to a user, a system or the like can receive a request to pause the virtual reality session from a user. Session state data, e.g., in the form of a virtual reality bookmark, is saved based on the pause request. A later request to resume presentation of the virtual reality content results in the system accessing the virtual reality session data, which is used to present resumed virtual reality session content to the user based on the session state data. A pause request may be for an individual user or for each user participating in a session. Virtual reality bookmarks may be shared with other users.

Patent Agency Ranking