Patents by Inventor Paul Tuscano

Paul Tuscano has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240064680
    Abstract: A wireless communication network handles Session Management Function (SMF) outage in a Tracking Area (TA). An external SMF that is outside the TA registers with an internal Network Repository Function (NRF) that is inside in the TA. The internal NRF detects the SMF outage for an internal SMF inside the TA. The internal NRF receives an SMF request from an internal Access and Mobility Management Function (AMF) inside the TA. In response to the SMF outage, the internal NRF transfers an SMF response to the internal AMF that indicates the external SMF. The external SMF receives network signaling from the internal AMF and responsively directs an external User Plane Function (UPF) that is outside the TA to exchange user data with internal wireless access nodes that are inside the TA.
    Type: Application
    Filed: August 18, 2022
    Publication date: February 22, 2024
    Inventors: Kunal Prakash Barawkar, John Paul Tuscano Cruz, Swetha Gopisetti, Aziz Motiwala, Praveen Singaram Muthukumar, Rahul Pal, Rushabhkumar Dahyabhai Patel, Suresh Thanneeru
  • Patent number: 9282436
    Abstract: An example method includes connecting to a call center by a user equipment (UE) device via a voice call and receiving a request for a current location. The device is determined to be in an outdoor environment if the signal strength of satellite signals used by a global positioning system (GPS) is greater than a threshold. The device is determined to be in an indoor environment if a beacon signal strength is greater than a further threshold. If the device is in an outdoor environment, the current location is determined using a standalone or assisted GPS method. If the device is in an indoor environment, the current location is the known location of the beacon or an assisted GPS method. If neither the signal strength of the satellite signals nor the signal strength of the beacon exceeds its respective threshold, the current location is determined as a last stored location.
    Type: Grant
    Filed: October 17, 2013
    Date of Patent: March 8, 2016
    Assignee: Cellco Partnership
    Inventors: Monica Chitre, Yoganand Rajala, Peter C. Bates, Paul Tuscano, Matt Nadler, Brent Robert Blum
  • Patent number: 9055090
    Abstract: Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack.
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: June 9, 2015
    Assignees: Verizon Patent and Licensing Inc., Cellco Partnership
    Inventors: Renato J. Delatorre, Paul Tuscano, Anthony Dennis, Steven R. Rados
  • Publication number: 20140106782
    Abstract: An example method includes connecting to a call center by a user equipment (UE) device via a voice call and receiving a request for a current location. The device is determined to be in an outdoor environment if the signal strength of satellite signals used by a global positioning system (GPS) is greater than a threshold. The device is determined to be in an indoor environment if a beacon signal strength is greater than a further threshold. If the device is in an outdoor environment, the current location is determined using a standalone or assisted GPS method. If the device is in an indoor environment, the current location is the known location of the beacon or an assisted GPS method. If neither the signal strength of the satellite signals nor the signal strength of the beacon exceeds its respective threshold, the current location is determined as a last stored location.
    Type: Application
    Filed: October 17, 2013
    Publication date: April 17, 2014
    Inventors: Monica Chitre, Yoganand Rajala, Peter C. Bates, Paul Tuscano, Matt Nadler, Brent Robert Blum
  • Publication number: 20130333032
    Abstract: Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack.
    Type: Application
    Filed: June 12, 2012
    Publication date: December 12, 2013
    Applicants: Verizon Patent and Licensing Inc., Cellco Partnership d/b/a Verizon Wireless
    Inventors: Renato J. Delatorre, Paul Tuscano, Anthony Dennis, Steven R. Rados
  • Publication number: 20070260603
    Abstract: A system and method is provided for age verification and content filtering (AV/CF) on a wireless telecommunications system capable of providing enhanced products such as Internet, WAP, messaging, games, video, music, applications, etc. A profile controls content that is accessible by a user depending upon the user's age or restrictions placed on accessible content in accordance with content categories. Rating information is obtained from content providers and mapped to content categories or content is rated dynamically. User's requests for access may be recorded whether access is provided or denied and used to provide reports including reports to account holders responsible for the user's account. In some instances, attempts to access banned information may be reported to law enforcement officials.
    Type: Application
    Filed: May 3, 2006
    Publication date: November 8, 2007
    Inventors: Paul Tuscano, Jesse Money