Patents by Inventor Yeeling Lam
Yeeling Lam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230231877Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: ApplicationFiled: February 27, 2023Publication date: July 20, 2023Inventor: Yeeling Lam
-
Patent number: 11616808Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: GrantFiled: August 18, 2020Date of Patent: March 28, 2023Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Yeeling Lam
-
Publication number: 20220382883Abstract: Concepts and technologies disclosed herein are directed to a data security cube with a key cube. According to one aspect of the concepts and technologies disclosed herein, a system can execute a data security cube application. The application can receive user data associated with a user. The application can create a data cube that includes at least one data layer that, in turn, includes the user data represented in a binary format. The application can create a key cube that includes at least one key layer that, in turn, includes a data type of the user data, an element identifier that identifies a location of the user data within the data cube, and a decryption logic that decrypts the user data in the binary format. The application can store the data cube and the key cube in secure storage component of the system.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Applicant: AT&T Intellectual Property I, L.P.Inventor: Yeeling Lam
-
Publication number: 20220018668Abstract: Facilitating implementation of a multitude of virtual paths for moving an object in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include generating, by a system that includes a memory and a processor, a traversal route grid for travel of an object between a source node and a target node. The traversal route grid can include multiple alternative route segments between the source node and the target node. The method also can include assigning, by the system, respective values to alternative route segments of the multiple alternative route segments. The respective values can be tailored for the object and determined as a function of a requested time of arrival at the target node. Further, the method can include facilitating, by the system, the travel of the object along the group of alternative route segments.Type: ApplicationFiled: July 14, 2020Publication date: January 20, 2022Inventors: Craig Klein, Gregory Harp, Yeeling Lam, Mahendra Kuncham, Barton K. Hawkins, Filip Benuska
-
Publication number: 20220019229Abstract: Facilitating autonomously linking movement of objects in four dimensions in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include identifying, by a system comprising a memory and a processor, a first portion of a first traversal route grid associated with a first object and a second portion of a second traversal route grid associated with a second object. The identifying can be based on the first portion and the second portion being determined to be overlapping portions during a same time period. The method also can include linking, by the system, during the same time period, a first movement of the first object and a second movement of the second object across the overlapping portions.Type: ApplicationFiled: July 15, 2020Publication date: January 20, 2022Inventors: Craig Klein, Gregory Harp, Yeeling Lam, Mahendra Kuncham, Barton K. Hawkins, Filip Benuska
-
Patent number: 11080434Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.Type: GrantFiled: February 19, 2020Date of Patent: August 3, 2021Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Yeeling Lam, Daniel Solero
-
Publication number: 20200382550Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: ApplicationFiled: August 18, 2020Publication date: December 3, 2020Inventor: Yeeling Lam
-
Patent number: 10785258Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: GrantFiled: December 1, 2017Date of Patent: September 22, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Yeeling Lam
-
Publication number: 20200184117Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.Type: ApplicationFiled: February 19, 2020Publication date: June 11, 2020Inventors: Yeeling LAM, Daniel SOLERO
-
Patent number: 10599877Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.Type: GrantFiled: April 13, 2017Date of Patent: March 24, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Yeeling Lam, Daniel Solero
-
Publication number: 20200028874Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: ApplicationFiled: December 1, 2017Publication date: January 23, 2020Inventor: Yeeling Lam
-
Publication number: 20180300510Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.Type: ApplicationFiled: April 13, 2017Publication date: October 18, 2018Inventors: Yeeling Lam, Daniel Solero