Patents by Inventor Venson Shaw

Venson Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570793
    Abstract: A method performed by one or more network nodes of a wireless telecommunications network to schedule intermittent connectivity of multiple narrowband Internet-of-Things (NB-IoT) devices with the network. The network node(s) can maintain a connectivity schedule that includes profiles for NB-IoT devices and cause the multiple NB-IoT devices to connect to the network in accordance with the schedule at different times based on priority levels associated with the NB-IoT devices. The network node(s) can adjust the connectivity schedule in response to detection of a condition of the network or the NB-IoT device.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: January 31, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11561538
    Abstract: Deployed drones are managed. For instance, a first drone detects whether the first drone is in communication with a command center via a first communication network to determine a configuration parameter of a first message to broadcast discovery information associated with the first drone. In response to the first drone being in communication with the command center via the first communication network, the first drone broadcasts the first message configured with a first value for the configuration parameter. Or, in response to the first drone not being in communication with the command center via the first communication network, the first drone broadcasts the first message configured with a second value for the configuration parameter different from the first value.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: January 24, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw, Zhi Cui
  • Publication number: 20230016583
    Abstract: Aspects of the subject disclosure may include, for example, detecting a request for access to a wireless network via an access point. Responsive to a first determination that the identifier corresponds to an entry in the list, access is facilitated to the wireless network via the access point without the equipment of the requesting user providing credentials to the wireless network. The list includes a first set of entries corresponding to a first set of users having unrestricted access and a second set of entries corresponding to a second set of users having restricted access. Responsive to a second determination that the identifier does not correspond to any of the entries, a message is transmitted to equipment of the host regarding the request, and responsive to receiving approval, the list is updated to include the identifier. Other embodiments are disclosed.
    Type: Application
    Filed: September 16, 2022
    Publication date: January 19, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Zhi Cui, Venson Shaw
  • Patent number: 11558747
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: January 17, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11558907
    Abstract: A method includes receiving a request for a communication session from a user device, identifying a first resource from a plurality of resources, wherein the first resource is associated with a first service control layer for a radio access network and wherein the plurality of resources includes at least one virtual network function (VNF), identifying a second resource from the plurality of resources, wherein the second resource is associated with a second service control layer for LTE core functions, identifying a third resource from the plurality of resources, wherein the third resource is associated with a third service control layer for content delivery, allocating a virtual machine to be used to instantiate the at least one VNF, instantiating the at least one VNF and establishing the communication session by facilitating communications between the first service control layer, the second service control layer and the third service control layer.
    Type: Grant
    Filed: June 5, 2020
    Date of Patent: January 17, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Rajendra Prasad Kodaypak, Venson Shaw
  • Publication number: 20230004612
    Abstract: Personalized sensory services are provided to mobile devices. As a sensor monitors an area of surveillance, the sensor may detect a passing mobile device. The sensor may thus ally itself to the passing mobile device and provide personalized sensory operations.
    Type: Application
    Filed: September 14, 2022
    Publication date: January 5, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11546368
    Abstract: A method performed by a security system that can analyze a vulnerability or a risk applicable to a network entity to identify a cybersecurity threat and associated risk level. The security system can store indications of cybersecurity threats and risk levels in a database of a Domain Name System (DNS). The security system can monitor and resolve network traffic to determine IP addresses or URLs associated with the cybersecurity threats. The security system stores a map of the cybersecurity threats and IP addresses or URLs such that the security system can protect a network entity by processing network traffic to sources or destinations of network traffic that can harm particular network entities, and execute personalized security procedures to protect the network entities.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: January 3, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11546767
    Abstract: A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: January 3, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Patent number: 11546773
    Abstract: A method for authenticating a network entity to access restricted information. The method includes receiving a request to generate a visual voicemail message based on an analysis of network entity profile data and contextual information relating to the network entity. The method includes generating the visual voicemail message based on the network entity profile data and the contextual information, sending the visual voicemail message to the network entity and requesting authentication information included with the visual voicemail message. In response to receiving the requested authentication information, the network entity is authenticated to access to the restricted information.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: January 3, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11539787
    Abstract: The technology described herein allocates resources in a cloud computing environment using a 5G network. The system can connect a device to the 5G network and collect data related to the device such as a location of the device and characteristics of use of the device with the 5G network. The system can create a device service profile of the device based at least in part on the data related to the device. The system can then dynamically partition computing resources within the cloud computing environment for the device based on the device service profile and a time-of-day in the location of the device to thereby provide on-demand access to content or services in the cloud computing environment to the device over the 5G network.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: December 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11533624
    Abstract: The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
    Type: Grant
    Filed: July 6, 2021
    Date of Patent: December 20, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11527166
    Abstract: Concepts and technologies disclosed herein are directed to intelligent drone traffic management via a radio access network (“RAN”). As disclosed herein, a RAN node, such as an eNodeB, can receive, from a drone, a flight configuration. The flight configuration can include a drone ID and a drone route. The RAN node can determine whether capacity is available in an airspace associated with the RAN node. In response to determining that capacity is available in the airspace associated with the RAN node, the RAN node can add the drone ID to a queue of drones awaiting use of the airspace associated with the RAN node. When the drone ID is next in the queue of drones awaiting use of the airspace associated with the RAN node, the RAN node can instruct the drone to fly through at least a portion of the airspace in accordance with the drone route.
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: December 13, 2022
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Venson Shaw, Zhi Cui, Sangar Dowlatkhah
  • Publication number: 20220394481
    Abstract: A method to prevent or reduce cyberattacks can include analyzing information of users of a 5G network. The information can include user profile data and social media data. The method can further include ranking the users according to a network security ranking based on a social media ranking, to identify target users as potential hotspots for cyberattacks. The 5G network dynamically assigns computing resources based on the network security ranking to monitor computing device(s) associated with the target users and receives an indication of a malicious software of the computing device(s) as detected by the computing resources.
    Type: Application
    Filed: August 16, 2022
    Publication date: December 8, 2022
    Inventor: Venson Shaw
  • Patent number: 11516670
    Abstract: The technology includes a method performed by a security system of a 5G network to protect against a cyberattack. The system can instantiate a function to monitor and control incoming network traffic at a perimeter of the 5G network in accordance with a security model that is based on a vulnerability parameter, a risk parameter, and a threat parameter. The system can process the incoming network traffic with the security model to output a vulnerability-risk-threat (VRT) score that characterizes the incoming network traffic in relation to the vulnerability parameter, the risk parameter, and the threat parameter, and causes one or more actions based on the VRT score to mitigate the cyberattack. The action(s) can include blocking the incoming network traffic at the perimeter of the 5G network.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: November 29, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Publication number: 20220377103
    Abstract: A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
    Type: Application
    Filed: August 4, 2022
    Publication date: November 24, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220360626
    Abstract: The technology described herein documents interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting.
    Type: Application
    Filed: July 20, 2022
    Publication date: November 10, 2022
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11496522
    Abstract: A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an on-demand coupon to protect the wireless device against the cybersecurity threat, and send the on-demand coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the on-demand coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: November 8, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11487836
    Abstract: Personalized sensory services are provided to mobile devices. As a sensor monitors an area of surveillance, the sensor may detect a passing mobile device. The sensor may thus ally itself to the passing mobile device and provide personalized sensory operations.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: November 1, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11483301
    Abstract: Aspects of the subject disclosure may include, for example, detecting a request for access to a wireless network via an access point. Responsive to a first determination that the identifier corresponds to an entry in the list, access is facilitated to the wireless network via the access point without the equipment of the requesting user providing credentials to the wireless network. The list includes a first set of entries corresponding to a first set of users having unrestricted access and a second set of entries corresponding to a second set of users having restricted access. Responsive to a second determination that the identifier does not correspond to any of the entries, a message is transmitted to equipment of the host regarding the request, and responsive to receiving approval, the list is updated to include the identifier. Other embodiments are disclosed.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: October 25, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Zhi Cui, Venson Shaw
  • Patent number: 11483177
    Abstract: Dynamic intelligent analytics VPN instantiation and/or aggregation facilitating secured access to the cloud network device are provided herein. A system can comprise: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: identifying an application for execution on a user device of user devices connected to first network devices of a first network, wherein the system is part of second devices of a second network communicatively coupled to and remote from the first network; and determining virtual private network attributes for a virtual private network for the user device, wherein the virtual private network attributes are based on the application; and generating a message notification to send to the user device, wherein the message notification comprises the virtual private network attributes to enable the user device to update the virtual private network.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: October 25, 2022
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah