Abstract:
A method, a device, and a non-transitory storage medium are provided to store a hardware identifier that uniquely identifies an IoT device; perform an attachment procedure with a wireless network, wherein the attachment procedure includes authenticating the IoT device by the wireless network and establishing a bearer connection; establish a secure channel with an authentication device via the bearer connection, in response to successfully completing the attachment procedure; transmit, to the authentication device, a first request to authenticate the IoT device, wherein the first request includes the hardware identifier; receive, from the authentication device, a first response that indicates whether the IoT device is authenticated; and determine that the IoT device is authenticated based on the first response.
Abstract:
Systems and methods herein represent an IoT device as an endpoint of private cloud. A virtualization service receives an IoT identifier for an IoT device and a network address for a virtual endpoint for the IoT device. The virtual endpoint for the IoT device is included in a host cloud platform. The virtualization service maps the IoT identifier to the network address in a distributed data structure for the service provider network and provides instructions, for an edge node for the service provider network, to provide network-layer access controls based on the mapping. The edge node for the service provider network receives an access request from the IoT device, applies a network-layer access control for the IoT device based on the instructions, receive IoT data from the IoT device when the edge node permits access by the IoT device, and forwards the IoT data to the virtual endpoint.
Abstract:
A network device stores capability designations associated with Internet-of-Things (IoT) devices and receives, from a customer device, one or more of the capability designations associated with a first type of IoT device. The network device receives event data generated by the first type of IoT device and maps the event data to the one or more of the capability designations. The mapping produces normalized IoT data for the first type of IoT device. The network device generates semantic information for the normalized IoT data and assembles a device model for the first type of IoT device. The device model includes the one or more of the capability designations and the semantic information.
Abstract:
A method for scalable and secure vehicle to everything communications may include receiving, at a communications management device, telematics data from a plurality of vehicles. The method may further include segregating the plurality of vehicles into initial clusters based on the telematics data, and dividing the initial clusters into binary space partitions having various sizes, where the size of each binary space partition is based on a maximum number of vehicles in the binary space partition. The method may include determining, for a selected vehicle within an associated binary space partition, a metric representing a suitability of communications between the selected vehicle and other vehicles in the associated binary space partition, receiving updated telematics data from the plurality of vehicles, shifting the initial clusters based on the updated telematics data, and updating the binary space partition based on the shifted clusters.
Abstract:
A device receives, via a Public Land Mobile Network (PLMN), a manifest file associated with streaming content, wherein the manifest file includes a sequence of multiple Uniform Resource Identifiers (URIs) that identify network storage locations of multiple content segments of the streaming content, and wherein a sponsorship signature of multiple sponsorship signatures is appended to at least one of the multiple URIs of the manifest file. The device retrieves the multiple URIs, and the sponsorship signature, from the manifest file; sends the sponsorship signature to a charging node in the PLMN for controlling the charging of data delivery associated with the streaming content to one of a user of the media playing device or a sponsor of the streaming content based on the sponsorship signature; and engages, via the PLMN using the multiple URIs, in a content streaming session to receive the streaming content.
Abstract:
A method includes receiving over the top streaming video content, wherein the over the top streaming video content is provided by a content provider to end users and determining at least one theme associated with the over the top streaming video content. The method also includes receiving at least one commercial advertising video clip associated with at least one commercial advertiser and mapping the at least one commercial advertising video clip to the over the top streaming video content. The method includes inserting at least one break into the over the top streaming content, and presenting the at least one commercial advertising video clip at the at least one break.
Abstract:
A system may receive a request to access user sponsored media content (“media content”), the request including a digital token (“token”), the media content being associated with a user sponsored account (“account”), and the account being associated with unused data from a mobile communications service plan, where the account and the mobile communications service plan are associated with a user. The system may identify token information included in the token. The system may compare the token information with stored token information. The system may determine that the token is valid based on the token information matching the stored token information. The system may provide access to the media content based on the token being valid. The system may provide information to cause data charges, for traffic flow associated with access to the media content, to be charged against the unused data associated with the account.
Abstract:
A method includes determining a radio frequency (RF) fingerprint mapping to an indoor floor plan for an indoor area. The method includes clustering Wi-Fi access point devices deployed in the indoor area into groups of Wi-Fi access point devices based on RF fingerprint data received by at least one reference point device. The method includes selecting a Wi-Fi access point device from each group of Wi-Fi access point devices and determining a RF fingerprint based on the selected Wi-Fi access point devices. The method includes receiving a request for a location associated with a mobile device. The request includes a sampled RF fingerprint associated with the mobile device. The method also includes comparing the RF fingerprints based on the selected Wi-Fi access point devices with the sampled RF fingerprint associated with the mobile device to determine a location of the mobile device within the indoor area.
Abstract:
A method includes receiving over the top streaming video content, wherein the over the top streaming video content is provided by a content provider to end users and determining at least one theme associated with the over the top streaming video content. The method also includes receiving at least one commercial advertising video clip associated with at least one commercial advertiser and mapping the at least one commercial advertising video clip to the over the top streaming video content. The method includes inserting at least one break into the over the top streaming content, and presenting the at least one commercial advertising video clip at the at least one break.
Abstract:
An approach is provided for network quality assurance. The approach includes identifying a node in a calling path associated with a call between a calling party and a called party. The approach also includes querying call record information associated with the call from the node. The approach further includes analyzing the call record information to determine a successful state or a failure state of the call. The approach further includes recursively querying and analyzing other call record information associated with the call from one or more subsequent nodes based on the successful state, the failure state, or a combination thereof determined for the node, the one or more subsequent nodes, or a combination thereof.