CELL SITE ENERGY UTILIZATION MANAGEMENT
    1.
    发明公开

    公开(公告)号:US20240031850A1

    公开(公告)日:2024-01-25

    申请号:US17870393

    申请日:2022-07-21

    CPC classification number: H04W24/10 H04W24/08 H04W36/0083 H04W52/0206

    Abstract: A processing system may apply a data set comprising utilization metrics of a cells of a cell sector to a throughput prediction model to obtain a first predicted throughput for the cell sector for a designated future time period and for all cells being in an active state. The processing system may generate a first modified data set simulating a first cell being placed in an inactive state, by distributing utilization metrics of the first cell over at least one additional cell, and may apply the first modified data set to the throughput prediction model to obtain a second predicted throughput. The processing system may then determine that the second predicted throughput meets a threshold throughput that is based on the first predicted throughput, and transmit at least one instruction to place the first cell in the inactive state for the designated future time period in response to the determining.

    ENHANCED AUTOMATED ATTENDANT SYSTEM

    公开(公告)号:US20170180552A1

    公开(公告)日:2017-06-22

    申请号:US14974292

    申请日:2015-12-18

    Abstract: A method includes determining, at a processor of an automated attendant system, whether a customer service representative is available to speak with a caller. The method also includes scheduling a call back time in response to a determination that the customer service representative is not available to speak with the caller. The call back time indicates a time where the customer service representative will call the caller. The method further includes providing the call back time to the caller and receiving an availability flag from the caller at the call back time. The availability flag indicates whether the caller is available to receive a call from the customer service representative. The method also includes providing a call back signal to the customer service representative based on the availability flag. The call back signal indicates to the customer service representative whether to call the caller at the call back time.

    Method and apparatus for quantifying the customer impact of cell tower outages
    5.
    发明授权
    Method and apparatus for quantifying the customer impact of cell tower outages 有权
    量化客户对电池塔停电影响的方法和设备

    公开(公告)号:US09426665B2

    公开(公告)日:2016-08-23

    申请号:US14088279

    申请日:2013-11-22

    CPC classification number: H04W16/18 H04W24/04

    Abstract: A method, computer-readable storage device and apparatus for quantifying a total number of customers impacted by a cellular tower outage are disclosed. For example, the method monitors a plurality of cellular towers, detects a failure of one of the plurality of cellular towers, identifies a subset of the plurality of cellular towers that are included in an affected region, calculates a number of additional customers served by each one of the subset of the plurality of cellular towers that are included in the affected region due to the failure of the one cellular tower, and quantifies the total number of customers impacted by the failure of the one cellular tower by adding the number of additional customers served by the each one of the subset of the plurality of cellular towers that are included in the affected region.

    Abstract translation: 公开了一种用于量化由蜂窝式塔架停机影响的客户总数的方法,计算机可读存储装置和装置。 例如,该方法监视多个蜂窝塔,检测多个蜂窝塔中的一个蜂窝塔的故障,识别包括在受影响区域中的多个蜂窝塔的子集,计算由每个蜂窝塔服务的多个另外的客户的数量 由于一个蜂窝塔的故障而被包括在受影响区域中的多个蜂窝塔的子集之一,并且通过添加一个蜂窝塔的数量来量化由一个蜂窝塔的故障所影响的总客户数 由受影响区域中包括的多个蜂窝塔的子集中的每一个服务。

    Monitoring operational activities in networks and detecting potential network intrusions and misuses
    6.
    发明授权
    Monitoring operational activities in networks and detecting potential network intrusions and misuses 有权
    监控网络中的业务活动并检测潜在的网络入侵和滥用

    公开(公告)号:US09401924B2

    公开(公告)日:2016-07-26

    申请号:US13721698

    申请日:2012-12-20

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.

    Abstract translation: 本文所公开的概念和技术用于监控网络中的运行活动并检测潜在的网络入侵和滥用。 根据本文公开的一个方面,入侵检测系统可以从认证,授权和计费系统收集日志。 入侵检测系统可以从日志中提取信息,基于从日志提取的信息更新入侵检测规则所使用的入侵检测信息,更新入侵检测规则使用​​的配置文件,将配置文件和入侵检测规则相对于 正在进行的会话的运行状态,标记具有威胁分数的相应日志条目,从相应的日志条目计算威胁分数以创建聚合的威胁分数,并呈现聚合的威胁分数。 入侵检测系统还可以在聚合的威胁分数触发报警条件时发出报警。

    Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses
    8.
    发明申请
    Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses 有权
    监控网络中的运营活动并检测潜在的网络入侵和滥用

    公开(公告)号:US20140181968A1

    公开(公告)日:2014-06-26

    申请号:US13721698

    申请日:2012-12-20

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.

    Abstract translation: 本文所公开的概念和技术用于监控网络中的运行活动并检测潜在的网络入侵和滥用。 根据本文公开的一个方面,入侵检测系统可以从认证,授权和计费系统收集日志。 入侵检测系统可以从日志中提取信息,基于从日志提取的信息更新入侵检测规则所使用的入侵检测信息,更新入侵检测规则使用​​的配置文件,将配置文件和入侵检测规则相对于 正在进行的会话的运行状态,标记具有威胁分数的相应日志条目,从相应的日志条目计算威胁分数以创建聚合的威胁分数,并呈现聚合的威胁分数。 入侵检测系统还可以在聚合的威胁分数触发报警条件时发出报警。

    Methods, apparatus and articles of manufacture to perform root cause analysis for network events
    9.
    发明授权
    Methods, apparatus and articles of manufacture to perform root cause analysis for network events 有权
    方法,装置和制品对网络事件进行根本原因分析

    公开(公告)号:US08761029B2

    公开(公告)日:2014-06-24

    申请号:US13787374

    申请日:2013-03-06

    Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.

    Abstract translation: 公开了对网络事件执行根本原因分析的示例性方法,装置和制造。 示例性方法包括:基于症状事件定义从归一化数据源集合检索症状事件实例; 从可能导致症状事件实例的归一化数据源集合生成一组诊断事件,诊断事件基于依赖规则确定; 并分析一组诊断事件以根据根本原因选择根本原因事件。

    NETWORK-TO-NETWORK INTERCONNECTION TRANSFER

    公开(公告)号:US20250141714A1

    公开(公告)日:2025-05-01

    申请号:US18498730

    申请日:2023-10-31

    Abstract: A processing system may identify first virtual circuits and first client systems associated with a first network-to-network interface between a first communication network and a second communication network, the first network-to-network interface having a first bandwidth parameter. The processing system may next select at least a first portion of the first client systems for transfer from the first virtual circuits associated with the first network-to-network interface to second virtual circuits associated with a second network-to-network interface between the first communication network and the second communication network, the second network-to-network interface having a second bandwidth parameter. The processing system may then generate an order to establish the second virtual circuits via the second network-to-network interface and transfer the at least the first portion of the first client systems to the second virtual circuits via the second network-to-network interface.

Patent Agency Ranking