Patents by Inventor Yeeling Lam

Yeeling Lam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230231877
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Application
    Filed: February 27, 2023
    Publication date: July 20, 2023
    Inventor: Yeeling Lam
  • Patent number: 11616808
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Grant
    Filed: August 18, 2020
    Date of Patent: March 28, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Yeeling Lam
  • Publication number: 20220382883
    Abstract: Concepts and technologies disclosed herein are directed to a data security cube with a key cube. According to one aspect of the concepts and technologies disclosed herein, a system can execute a data security cube application. The application can receive user data associated with a user. The application can create a data cube that includes at least one data layer that, in turn, includes the user data represented in a binary format. The application can create a key cube that includes at least one key layer that, in turn, includes a data type of the user data, an element identifier that identifies a location of the user data within the data cube, and a decryption logic that decrypts the user data in the binary format. The application can store the data cube and the key cube in secure storage component of the system.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Yeeling Lam
  • Publication number: 20220018668
    Abstract: Facilitating implementation of a multitude of virtual paths for moving an object in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include generating, by a system that includes a memory and a processor, a traversal route grid for travel of an object between a source node and a target node. The traversal route grid can include multiple alternative route segments between the source node and the target node. The method also can include assigning, by the system, respective values to alternative route segments of the multiple alternative route segments. The respective values can be tailored for the object and determined as a function of a requested time of arrival at the target node. Further, the method can include facilitating, by the system, the travel of the object along the group of alternative route segments.
    Type: Application
    Filed: July 14, 2020
    Publication date: January 20, 2022
    Inventors: Craig Klein, Gregory Harp, Yeeling Lam, Mahendra Kuncham, Barton K. Hawkins, Filip Benuska
  • Publication number: 20220019229
    Abstract: Facilitating autonomously linking movement of objects in four dimensions in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can include identifying, by a system comprising a memory and a processor, a first portion of a first traversal route grid associated with a first object and a second portion of a second traversal route grid associated with a second object. The identifying can be based on the first portion and the second portion being determined to be overlapping portions during a same time period. The method also can include linking, by the system, during the same time period, a first movement of the first object and a second movement of the second object across the overlapping portions.
    Type: Application
    Filed: July 15, 2020
    Publication date: January 20, 2022
    Inventors: Craig Klein, Gregory Harp, Yeeling Lam, Mahendra Kuncham, Barton K. Hawkins, Filip Benuska
  • Patent number: 11080434
    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
    Type: Grant
    Filed: February 19, 2020
    Date of Patent: August 3, 2021
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Yeeling Lam, Daniel Solero
  • Publication number: 20200382550
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Application
    Filed: August 18, 2020
    Publication date: December 3, 2020
    Inventor: Yeeling Lam
  • Patent number: 10785258
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Grant
    Filed: December 1, 2017
    Date of Patent: September 22, 2020
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Yeeling Lam
  • Publication number: 20200184117
    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
    Type: Application
    Filed: February 19, 2020
    Publication date: June 11, 2020
    Inventors: Yeeling LAM, Daniel SOLERO
  • Patent number: 10599877
    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: March 24, 2020
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Yeeling Lam, Daniel Solero
  • Publication number: 20200028874
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Application
    Filed: December 1, 2017
    Publication date: January 23, 2020
    Inventor: Yeeling Lam
  • Publication number: 20180300510
    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.
    Type: Application
    Filed: April 13, 2017
    Publication date: October 18, 2018
    Inventors: Yeeling Lam, Daniel Solero