Patents by Inventor Gustavo De Los Reyes

Gustavo De Los Reyes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170289177
    Abstract: A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based on the request, one of multiple available diagnostic algorithms is selected to analyze user data related to a user's account to identify symptoms of the problem and diagnose a cause of the symptoms identified.
    Type: Application
    Filed: June 12, 2017
    Publication date: October 5, 2017
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Ilona Murynets, Jeffrey E. Bickford, Gustavo De Los Reyes, Ramesh Subbaraman, Wei Wang
  • Patent number: 9774634
    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: September 26, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Gustavo de los Reyes, William R. Beckett, Jerry Birkes, Deepak K. Chawla, Joshua David Knight, Sanjay Macwan, William O'Hern
  • Patent number: 9742807
    Abstract: A communication network can be constructed to support software-defined networking (SDN) protocols and network functions virtualization (NFV) protocols. Such a communication network can advantageously be operated at lower costs, increased flexibility and control, and with simplified management to name but a few. In addition to these advantages, various networking security aspects can be enhanced by leveraging the SDN/NFV architecture.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: August 22, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Gustavo de los Reyes, Roger Piqueras Jover
  • Publication number: 20170180416
    Abstract: A system for distributing virtual entity behavior profiling in cloud deployments is disclosed. In particular, the system may include conducting entity behavior profiling closer to where data and data logs are generated, such as at a hypervisor server, in a distributed fashion. By doing so, the system may reduce bandwidth consumption typically associated with transferring data to a central processing system, may be able to use more data collected closer to sources of data generation, and may provide faster reaction times because of the faster processing of data enabled by the system. Additionally, the system may assist with reducing false positives associated with malware detection and other compromises associated with entities by aggregating the results of distributed computations at different sites.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Paul Giura, Gustavo de los Reyes
  • Patent number: 9680843
    Abstract: A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based on the request, one of multiple available diagnostic algorithms is selected to analyze user data related to a user's account to identify symptoms of the problem and diagnose a cause of the symptoms identified.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: June 13, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Ilona Murynets, Jeffrey E. Bickford, Gustavo De Los Reyes, Ramesh Subbaraman, Wei Wang
  • Publication number: 20170134398
    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.
    Type: Application
    Filed: January 23, 2017
    Publication date: May 11, 2017
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Wei Wang, Gang Xu, Gustavo de los Reyes
  • Publication number: 20170126411
    Abstract: An access point device that broadcasts a signal including a publicly known PLMN code is conventionally assumed by user equipment devices to be a legitimate access point device deployed by the communication provider associated with that PLMN. User equipment devices associated with that provider may attempt to attach to that access point device, even if the access point device is in reality a rogue access point device. During this exchange of information, the rogue access point device can compromise the user equipment device in numerous ways and can do so despite strong encryption/authentication associated with modern LTE standards. Architectures are disclosed that provide cryptographically signed information in a broadcast message so an access point can be authenticated before selection, attempting to attach, accepting instructions, and/or transmitting any information to the access point device.
    Type: Application
    Filed: October 29, 2015
    Publication date: May 4, 2017
    Inventors: Roger Piqueras Jover, Gustavo de los Reyes
  • Publication number: 20170076506
    Abstract: A method on a computer readable storage medium operable to store a virtual representation of a plurality of physical components, introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. A system having a memory configured to store a virtual representation of a plurality of physical components and a processor configured to introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component.
    Type: Application
    Filed: November 28, 2016
    Publication date: March 16, 2017
    Inventors: Gustavo de los REYES, Sanjay Macwan
  • Patent number: 9553890
    Abstract: Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network.
    Type: Grant
    Filed: October 19, 2015
    Date of Patent: January 24, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Wei Wang, Gang Xu, Gustavo de los Reyes
  • Publication number: 20160357986
    Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.
    Type: Application
    Filed: July 18, 2016
    Publication date: December 8, 2016
    Inventors: Gustavo de los Reyes, Andrea Forte, Juan A. Garay, David Crawford Gibbon, Zhu Liu, Evgene Vahlis, Eric Zavesky
  • Publication number: 20160359962
    Abstract: Data is routed within a network of content with specific service constraints to mobile devices. A mobile network management component receives an identifier (ID) of a base station that serves a mobile device that originates a request for data, and relays the ID to a network platform that administers content. A mapping that associates one or more base stations with a deployed content node and the received ID are utilized to identify a content node to serve the request for data via the base station. The received request for data is directed to the identified content node. A service constraint configuration can be allocated for exchange of payload data between the mobile device and the network platform. For a request to consume data and a request to supply data, identified content node delivers data and receives data, respectively, in accordance with the service constraint allocation.
    Type: Application
    Filed: August 18, 2016
    Publication date: December 8, 2016
    Inventors: Cristina Serban, Gustavo De Los Reyes
  • Publication number: 20160353345
    Abstract: Methods and apparatus to migrate a mobile device from a first virtual private mobile network to a second virtual private mobile network are disclosed. An example apparatus includes a processor and a memory including instructions that cause the processor to perform operations including determining, based on a set of latency routing rules, that a communication transmitted via the first virtual private mobile network is a latency sensitive communication. In response to determining the communication is a latency sensitive communication, the mobile device that originated the latency sensitive communication is identified. The mobile device is communicating via the first virtual private mobile network. Example operations also include migrating the mobile device from the first virtual private mobile network to the second virtual private mobile network wherein the second virtual private mobile network is configured to reduce the latency of the latency sensitive communication.
    Type: Application
    Filed: August 8, 2016
    Publication date: December 1, 2016
    Inventors: Jacobus Van der Merwe, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Arati Baliga, Gang Xu
  • Publication number: 20160309020
    Abstract: Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest.
    Type: Application
    Filed: June 20, 2016
    Publication date: October 20, 2016
    Inventors: Gustavo DE LOS REYES, Sanjay MACWAN
  • Publication number: 20160308837
    Abstract: Methods and apparatus to configure virtual private mobile networks are disclosed. Example methods include provisioning a virtual private mobile network within a wireless network, and, after provisioning the virtual private mobile network, determining whether a first communication from a user equipment matches a security event profile. When the first communication matches the profile, the example methods include transmitting, from the wireless network via a first base transceiver station, an instruction to cause the user equipment to be communicatively coupled to the virtual private mobile network. The example methods further include instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station and through the virtual private mobile network. In the example methods, the virtual private mobile network is isolated in a wireless spectrum from other portions of the network.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventors: Arati Baliga, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Jacobus Van der Merwe, Gang Xu
  • Patent number: 9450828
    Abstract: System(s) and method(s) are provided to route data within a network of content with specific service constraints to mobile devices. A mobile network management component receives an identifier (ID) of a base station that serves a mobile device that originates a request for data, and relays the ID to a network platform that administers content. A mapping that associates one or more base stations with a deployed content node and the received ID are utilized to identify a content node to serve the request for data via the base station. The received request for data is directed to the identified content node. A service constraint configuration can be allocated for exchange of payload data between the mobile device and the network platform. For a request to consume data and a request to supply data, identified content node delivers data and receives data, respectively, in accordance with the service constraint allocation.
    Type: Grant
    Filed: March 4, 2014
    Date of Patent: September 20, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Cristina Serban, Gustavo De Los Reyes
  • Publication number: 20160261637
    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
    Type: Application
    Filed: May 12, 2016
    Publication date: September 8, 2016
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Gustavo de los Reyes, William R. Beckett, Jerry Birkes, Deepak K. Chawla, Joshua David Knight, Sanjay Macwan, William O'Hern
  • Patent number: 9432258
    Abstract: Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application.
    Type: Grant
    Filed: June 6, 2011
    Date of Patent: August 30, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Jacobus Van der Merwe, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Arati Baliga, Gang Xu
  • Patent number: 9396310
    Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: July 19, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Gustavo de los Reyes, Andrea Forte, Juan A. Garay, David Crawford Gibbon, Zhu Liu, Evgene Vahlis, Eric Zavesky
  • Patent number: 9392023
    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: July 12, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Gustavo de los Reyes, Willam R. Beckett, Jerry Birkes, Deepak K. Chawla, Joshua David Knight, Sanjay Macwan, William O'Hern
  • Patent number: 9386035
    Abstract: Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.
    Type: Grant
    Filed: June 21, 2011
    Date of Patent: July 5, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Arati Baliga, Xu Chen, Baris Coskun, Gustavo de los Reyes, Seungjoon Lee, Suhas Mathur, Jacobus Van der Merwe, Gang Xu