US Pat. No. 9,402,057

INTERACTIVE AVATARS FOR TELECOMMUNICATION SYSTEMS

ARGELA YAZILIM VE BILISIM...

1. An avatar-calling service processing a call from a calling IP client to a called IP client wherein calling IP clients'
avatar is integrated into said calling service, said service is accessible through said IP clients' communication device wherein
said calling IP client with avatar has video calling and real-time rendering capabilities and said called IP client's end-user
communication device has real-time rendering and video/graphics display capabilities, said calling IP client has an application
which integrates avatar with lip and motion-syncs into avatar calling service, said avatar-calling service comprising:
an avatar call control server communicating with an avatar inserter using an HTTP/XML interface retrieving said calling IP
client's avatar information from an avatar repository, said avatar repository storing avatars of users;

said avatar inserter retrieving said calling IP client's avatar information from said avatar repository and transferring said
retrieved avatar information to said avatar call control server;

said avatar call control server sending said avatar information with calling information,
wherein the avatar is an animated 2D or 3D digital representations of said IP client's user and said animated 2D and/or 3D
avatars are synchronized to the user's lip, face and body movements in real time.

US Pat. No. 9,094,285

AUTOMATIC DISCOVERY OF MULTIPLE CONTROLLERS IN SOFTWARE DEFINED NETWORKS (SDNS)

ARGELA YAZILIM VE BILISIM...

1. A method for a first controller in a first subnetwork to automatically discover a second controller of a second subnetwork,
said first subnetwork further comprising at least a first switch and said second subnetwork further comprising at least a
second switch, said method as implemented in said first controller comprising the steps of:
a) receiving a message from said first switch identifying activation of a first port, which is due to establishment of a connection
between said first port in said first switch and a second port in said second switch;

b) generating a Controller-Advertisement message carrying information required to identify and access said first controller;
c) forwarding said generated Controller-Advertisement message from said first controller to said first switch, said first
port in said first switch further forwarding said Controller-Advertisement message to said second port in said second switch,
said second switch further forwarding said Controller-Advertisement message to said second controller along with an identification
of said second port over which said Controller-Advertisement message was received;

wherein said second controller in said second subnetwork identifies said first controller in said first subnetwork based on
said information carried in said Controller-Advertisement message, and said second controller generating a Controller Information
Base (CIB) entry containing said information required to identify and access said first controller.

US Pat. No. 9,628,994

STATISTICAL SYSTEM AND METHOD FOR CATCHING A MAN-IN-THE-MIDDLE ATTACK IN 3G NETWORKS

Argela Yazilim ve Bilisim...

1. A method to detect a fake base station in a 3G cellular network, the 3G cellular network primarily providing 3G coverage
and also providing 2G coverage when the 3G coverage is unavailable, the method comprising the steps of:
maintaining a database comprising data collected in real-time from the 3G cellular network, said database storing a 3G subscribers
list and a 2G cells white list;

maintaining for a cell c: (a) a first counter L of 2G calls made by 3G users in the 3G subscribers list in cell c over a pre-determined
period of time, and (b) a second counter Lt of all 2G calls made over the pre-determined period of time to include multiple
calls made by the same user, and comparing a function of L and Lt against a pre-determined threshold and determining when
cell c is a 2G cell and placing cell c into the 2G cells white list, wherein 3G and 2G call volumes in the cell is used to
determine when the cell is a 2G cell providing the 2G coverage or a 3G cell providing the 3G coverage, with determined 2G
cells being placed in the 2G cells white list;

detecting a 3G subscriber in the 3G subscribers list in the database that is forced to make a 2G call in a 2G cell that is
not in the 2G cells white list in the database; and

outputting a warning identifying the 3G subscriber as a victim of man-in-the-middle attack.

US Pat. No. 9,392,432

INTERFACE BETWEEN BASE STATIONS FOR TOPOLOGY DISCOVERY TO ENABLE COORDINATED RESOURCE USAGE

ARGELA YAZILIM VE BILISIM...

1. A method for wireless communications as implemented in a first base station comprising:
transmitting a neighbor topology request message to a second base station, said neighbor topology request message soliciting
neighbor topology information regarding one or more neighbors associated with said second base station;

receiving, from the second base station, a neighbor topology response message comprising said neighbor topology information
regarding one or more neighbors associated with said second base station;

partitioning one or more network resources according to said received neighbor topology response message between said first
and second base stations,

wherein said neighbor topology information regarding one or more neighbors associated with said second base station further
comprises one or more parameters associated with a degree of connectivity of said neighbors associated with said second base
station, and said degree of connectivity of said neighbors associated with said second base station is either a first-degree
of connectivity of said neighbors associated with said second base station or a second-degree of connectivity of said neighbors
associated with said second base station, and

wherein, after receiving said neighbor topology response message, said method further comprises transmitting, to said second
base station, a proposed resource adjustment message between said first base station and said second base station.

US Pat. No. 9,806,983

SYSTEM AND METHOD FOR CONTROL FLOW MANAGEMENT IN SOFTWARE DEFINED NETWORKS

ARGELA YAZILIM VE BILISIM...

1. A method to dynamically reconfigure a control plane of a software defined network (SDN) having at least one existing active
controller, said method comprising:
when needed, activating and adding a new controller to said SDN;
determining a control flow table to assign a control traffic flow group to said new controller in said SDN;
sending said control flow table to one or more switches in SDN,
wherein said switches discover said new controller and reroutes control traffic toward said new controller as opposed to said
existing active controller according to said control flow table, and

wherein said control flow table is sent from a database of the existing active controller storing a plurality of control flow
tables to said one or more switches.

US Pat. No. 10,172,139

ROUTING AND INTERFERENCE COORDINATION IN SELF-BACKHAULING WIRELESS MESH NETWORKS

Argela Yazilim ve Bilisim...

1. A first mesh application system located within a first, local, mesh node comprising:a. a database storing: (1) routing information to route data packets of user equipment (UE) between the first, local, mesh node and a second, remote, mesh node via an IP tunnel, (2) IP addresses associated with both local UEs associated with the first, local, mesh node and remote UEs associated with the second, remote, mesh node, the second, remote, mesh node associated with a second mesh application system; (3) UE service parameters, and (4) a sub-band allocation database storing physical frequency sub-bands used by both local UEs associated with the first local, mesh node and remote UEs associated with the second, remote, mesh node; and
b. a processor executing computer readable program code stored in computer memory to implement an application to: (1) exchange data packets and control messages within the IP tunnel with the second, remote, mesh application system associated with the remote, second, mesh node, (2) periodically exchange resource allocation update control messages between the first and second mesh application systems within the IP tunnel to coordinate resource assignment to radio access UEs and backhaul UEs between the first and second mesh nodes, and (3) give periodical decisions on assignment of frequency sub-bands to radio access UEs of the first, local, mesh node not reserved/used for backhaul UEs and not assigned to radio access UEs of the second mesh node, and (4) give periodical decisions on assignment of frequency sub-bands to backhaul UEs based on combination/summary of messages received from the second, remote mesh node by avoiding in-use backhaul frequency sub-bands.

US Pat. No. 10,084,756

ANONYMOUS COMMUNICATIONS IN SOFTWARE-DEFINED NETWORKS VIA ROUTE HOPPING AND IP ADDRESS RANDOMIZATION

ARGELA YAZILIM VE BILISIM...

1. A method to establish an anonymous path between a source and a destination of data in a software defined network (SDN) controller comprising:identifying a route for the anonymous path between the source and the destination, the route having an ingress switch associated with the source and an egress switch associated with the destination, and the route valid for a pre-determined time defined by a time to live (TTL) value;
identifying a fake source address for the source and a fake destination address for the destination;
sending instructions to the ingress switch to utilize the fake source address as the source IP address for the pre-determined time defined by the TTL value and sending instructions to the egress switch to utilize the fake destination address as the destination IP address for the pre-determined time defined by the TTL value, and
wherein, for the pre-determined time period defined by the TTL value, the source and the destination communicate anonymously via the route by forwarding packets of data from the ingress switch to the egress switch based on the fake source address and fake destination address.

US Pat. No. 10,205,706

SYSTEM AND METHOD FOR PROGRAMMABLE NETWORK BASED ENCRYPTION IN SOFTWARE DEFINED NETWORKS

ARGELA YAZILIM VE BILISIM...

1. A method, as implemented in a first switch, to setup an encrypted path between a source and destination comprising:(a) receiving, at the first switch, one or more data packets from the source intended for destination, the first switch directly attached to a first encryptor;
(b) tagging each data packet received in (a) with a unique tag corresponding to a second encryptor associated with the destination;
(c) forwarding tagged data packets from (b) to the first encryptor wherein, for each packet, the first encryptor:
(c1) removes the unique tag in each packet,
(c2) encrypts layer-3 packet content and header,
(c3) retags encrypted packets of (c2) with the unique tag corresponding to the second encryptor associated with the destination, and
(c4) returns retagged, encrypted, packets of (c3) back to the first switch;
(d) receiving retagged, encrypted, packets returned in (c4) and forwarding the same to a second switch directly attached to the second encryptor, wherein the second encryptor decrypts the forwarded retagged, encrypted, packets.

US Pat. No. 10,200,876

METHOD AND SYSTEM FOR A WIRELESS ACCESS TRANSMISSION NETWORK ACROSS INTERSECTING ELECTROMAGNETICALLY SHIELDED REGIONS

Argela Yazilim ve Bilisim...

1. A wireless network node placement method to reduce the number of nodes deployed in a plurality of magnetically shielded regions that intersect horizontally and vertically, the method comprising:(a) selecting an outermost electromagnetically shielded region out of the plurality of magnetically shielded regions, identifying a corner in the outermost electromagnetically shielded region which intersects with most number of neighboring regions, and adding the corner as a selected intersection point to a set of candidate intersection points, and:
(i) identifying all other corners that are space diagonally located with respect to the identified corner in (a), where such corners are in those intersecting neighboring regions of the identified corner in (a),
(ii) adding corners identified in (a)(i) to the set of candidate intersection points, and
(iii) marking all regions touched by corners in the set of candidate intersection points as traversed regions with remaining regions staying un-traversed;
(b) repeating steps (a)(i) through a(iii) at intersection points of un-traversed regions until no un-traversed region is left by selected corners in the set of candidate intersection points;
(c) eliminating superfluous corners in the set of candidate intersection points by starting from those corners with least number of intersecting neighboring regions and moving towards corners with most number of intersecting neighboring regions and assessing whether a given corner can be eliminated from the set without creating an un-traversed region and, when so, removing it from the set of candidate intersection points; and
(d) outputting the set of candidate intersection points after the eliminating step (c) as the reduced number of nodes to be deployed in the plurality of magnetically shielded regions.

US Pat. No. 10,243,837

ENABLING SPLIT SESSIONS ACROSS HYBRID PUBLIC SAFETY AND LTE NETWORKS

Argela Yazilim ve Bilisim...

1. A user terminal operable in a first wireless network and a second wireless network, the user terminal comprising:a. a processor;
b. a storage;
c. a first network interface to communicate with the first wireless network;
d. a second network interface to communicate with the second wireless network;
e. the processor executing instructions in the storage to implement a resident umbrella layer, the resident umbrella layer measuring in real-time network capabilities associated with the two wireless networks via the first and second network interface, respectively, and
f. the processor executing instructions in the storage to implement a splitter to split each outgoing packet stream originated from the user terminal into at least two separate streams according to the measured network capabilities in (e),
wherein the first wireless network is a dedicated public safety network and the second wireless network is a commercial wireless broadband network;
wherein the first network interface sends one stream to a first network base station associated with the first wireless network, and the second network interface sends another stream to a second network base station associated with the second wireless network, and
wherein the two separate streams comprise a first crucial data stream and a second non-crucial data streams, wherein the outgoing packet stream cannot be reconstructed without the first crucial data stream, and wherein the crucial data is routed towards the dedicated public safety network.