Zero touch cellular carrier configuration

    公开(公告)号:US11212710B1

    公开(公告)日:2021-12-28

    申请号:US17097231

    申请日:2020-11-13

    Abstract: A processing system may obtain values of carrier attributes for a new carrier to be deployed in a cellular network, obtain values of the carrier attributes and values of a configuration parameter for a plurality of existing carriers in the cellular network, and construct an attribute value matrix comprising the values of the carrier attributes for the plurality of existing carriers, where the attribute value matrix associates the carrier attributes to the plurality of existing carriers, apply a regression to a function associating the attribute value matrix to a vector of the values of the configuration parameter for the plurality of existing carriers to learn coefficients of the function, apply the coefficients to a vector comprising the values of the plurality of carrier attributes for the new carrier to generate a value of the configuration parameter for the new carrier, and apply the generated value to the new carrier.

    Hierarchical anomaly localization and prioritization

    公开(公告)号:US10075356B2

    公开(公告)日:2018-09-11

    申请号:US15011029

    申请日:2016-01-29

    CPC classification number: H04L43/0823 H04L41/0618 H04L41/0677 H04L43/0864

    Abstract: Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.

    Method and apparatus for quantifying the customer impact of cell tower outages
    6.
    发明授权
    Method and apparatus for quantifying the customer impact of cell tower outages 有权
    量化客户对电池塔停电影响的方法和设备

    公开(公告)号:US09426665B2

    公开(公告)日:2016-08-23

    申请号:US14088279

    申请日:2013-11-22

    CPC classification number: H04W16/18 H04W24/04

    Abstract: A method, computer-readable storage device and apparatus for quantifying a total number of customers impacted by a cellular tower outage are disclosed. For example, the method monitors a plurality of cellular towers, detects a failure of one of the plurality of cellular towers, identifies a subset of the plurality of cellular towers that are included in an affected region, calculates a number of additional customers served by each one of the subset of the plurality of cellular towers that are included in the affected region due to the failure of the one cellular tower, and quantifies the total number of customers impacted by the failure of the one cellular tower by adding the number of additional customers served by the each one of the subset of the plurality of cellular towers that are included in the affected region.

    Abstract translation: 公开了一种用于量化由蜂窝式塔架停机影响的客户总数的方法,计算机可读存储装置和装置。 例如,该方法监视多个蜂窝塔,检测多个蜂窝塔中的一个蜂窝塔的故障,识别包括在受影响区域中的多个蜂窝塔的子集,计算由每个蜂窝塔服务的多个另外的客户的数量 由于一个蜂窝塔的故障而被包括在受影响区域中的多个蜂窝塔的子集之一,并且通过添加一个蜂窝塔的数量来量化由一个蜂窝塔的故障所影响的总客户数 由受影响区域中包括的多个蜂窝塔的子集中的每一个服务。

    Monitoring operational activities in networks and detecting potential network intrusions and misuses
    7.
    发明授权
    Monitoring operational activities in networks and detecting potential network intrusions and misuses 有权
    监控网络中的业务活动并检测潜在的网络入侵和滥用

    公开(公告)号:US09401924B2

    公开(公告)日:2016-07-26

    申请号:US13721698

    申请日:2012-12-20

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.

    Abstract translation: 本文所公开的概念和技术用于监控网络中的运行活动并检测潜在的网络入侵和滥用。 根据本文公开的一个方面,入侵检测系统可以从认证,授权和计费系统收集日志。 入侵检测系统可以从日志中提取信息,基于从日志提取的信息更新入侵检测规则所使用的入侵检测信息,更新入侵检测规则使用​​的配置文件,将配置文件和入侵检测规则相对于 正在进行的会话的运行状态,标记具有威胁分数的相应日志条目,从相应的日志条目计算威胁分数以创建聚合的威胁分数,并呈现聚合的威胁分数。 入侵检测系统还可以在聚合的威胁分数触发报警条件时发出报警。

Patent Agency Ranking