Patents by Inventor Andrew Lee Watts
Andrew Lee Watts has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220132309Abstract: Systems, methods, and devices can be utilized to verify wireless local area networks (WLANs) using fingerprints. An example method includes identifying a received fingerprint comprised in an advertisement message that is received by a user equipment (UE) at a time and within a coverage area. A source of the advertisement message is determined to be a rogue WLAN by determining that the received fingerprint is different than a verified fingerprint transmitted by an authorized WLAN at the time and in the coverage area. The UE outputs an alert indicating the rogue WLAN.Type: ApplicationFiled: October 22, 2020Publication date: April 28, 2022Inventors: Mark McDiarmid, Andrew Lee Watts
-
Patent number: 11190939Abstract: A network hub may be field programmable (e.g., upgradeable). A network hub may be operated with first settings for a configurable software defined radio (SDR) when the network hub receives an update from a server computer over a computer network. Upon installing the update, and rebooting the network hub, settings of the configurable SDR may be changed from the first settings to second, different settings, the second, different settings causing the network hub to operate using a second cellular-based radio technology that is different from a first cellular-based radio technology enabled by the first settings of the configurable SDR.Type: GrantFiled: July 26, 2017Date of Patent: November 30, 2021Assignee: T-Mobile USA, Inc.Inventor: Andrew Lee Watts
-
Patent number: 11133983Abstract: Technologies for using edge devices in a cellular network as compute nodes to participate in a blockchain network are described. A cellular network may provision one or more edge devices in communication with the cellular network to instantiate a virtual machine on the edge device to act as a compute node. The cellular network may submit a bid to solve a blockchain hash function using the compute nodes and may instruct the edge to solve the blockchain hash function.Type: GrantFiled: December 14, 2018Date of Patent: September 28, 2021Assignee: T-Mobile USA, Inc.Inventors: Ahmad Arash Obaidi, Shawn David Corey, Andrew Lee Watts
-
Patent number: 10986501Abstract: A Secure Telephony Identity (STI) proxy server is described for intercepting incoming Voice over Internet Protocol (VoIP) communication requests for the purpose of mitigating an effect of fraudulent and nuisance VoIP communications. The STI proxy server may facilitate an STI verification server in verifying an authenticity of an originating network associated with an incoming call request. In one example, the STI proxy server may verify that the visited network is permitted to interact with the home network, based on a list of permissible networks. In addition, the STI proxy server may determine whether public STI certificates associated with an originating network have expired or set to expire within a predetermined time interval. In response to an actual o impending expiration, the STI proxy server may facilitate retrieval of a superseding, new public STI certificate for use by an STI authentication server to digitally sign an outgoing SIP INVITE messages.Type: GrantFiled: January 8, 2020Date of Patent: April 20, 2021Assignee: T-Mobile USA, Inc.Inventors: Homer Nicolas B. Filart, Andrew Lee Watts, Jose R. Mendoza, Jr.
-
Publication number: 20200221302Abstract: A Secure Telephony Identity (STI) proxy server is described for intercepting incoming Voice over Internet Protocol (VoIP) communication requests for the purpose of mitigating an effect of fraudulent and nuisance VoIP communications. The STI proxy server may facilitate an STI verification server in verifying an authenticity of an originating network associated with an incoming call request. In one example, the STI proxy server may verify that the visited network is permitted to interact with the home network, based on a list of permissible networks. In addition, the STI proxy server may determine whether public STI certificates associated with an originating network have expired or set to expire within a predetermined time interval. In response to an actual o impending expiration, the STI proxy server may facilitate retrieval of a superseding, new public STI certificate for use by an STI authentication server to digitally sign an outgoing SIP INVITE messages.Type: ApplicationFiled: January 8, 2020Publication date: July 9, 2020Inventors: Homer Nicolas B. Filart, Andrew Lee Watts, Jose R. Mendoza, JR.
-
Publication number: 20200195497Abstract: Technologies for using edge devices in a cellular network as compute nodes to participate in a blockchain network are described. A cellular network may provision one or more edge devices in communication with the cellular network to instantiate a virtual machine on the edge device to act as a compute node. The cellular network may submit a bid to solve a blockchain hash function using the compute nodes and may instruct the edge to solve the blockchain hash function.Type: ApplicationFiled: December 14, 2018Publication date: June 18, 2020Inventors: Ahmad Arash Obaidi, Shawn David Corey, Andrew Lee Watts
-
Patent number: 10477549Abstract: A network hub may be configured to dynamically select a desired frequency (among available licensed spectrum holdings of a carrier) at which to operate. A network hub may send a current geographic location of the network hub to a server computer, and, in response, the network hub may receive, from the server computer, multiple available frequencies at which a configurable software defined radio (SDR) of the network hub can be configured to operate. The network hub may perform a network scan to determine respective current conditions of individual frequencies of the multiple available frequencies, select a particular frequency based at least in part on the current conditions of the individual frequencies, and configure the configurable SDR to operate at the selected frequency.Type: GrantFiled: July 26, 2017Date of Patent: November 12, 2019Assignee: T-Mobile USA, Inc.Inventor: Andrew Lee Watts
-
Patent number: 10412736Abstract: A network hub may be configured to implement a firewall policy in order to restrict access by designated applications executing on the network hub to particular Internet of Things (IoT) data from designated IoT devices. A network hub may receive data packets from an IoT device, analyze the data packets against a firewall policy stored in memory of the network hub to determine whether an application executing on the network hub is allowed to receive at least a portion of data within the data packets, and allow or deny the application access to at least some of the data based at least in part on the firewall policy.Type: GrantFiled: July 26, 2017Date of Patent: September 10, 2019Assignee: T-Mobile USA, Inc.Inventor: Andrew Lee Watts
-
Patent number: 10225839Abstract: A network hub may be unlockable into a development environment at various levels of access to implement tiered unlocking. A network hub may send a request to a server computer for a device-specific certificate that is usable to unlock the network hub, the request including (i) a requested level of access, and (ii) a device identifier (ID) associated with the network hub. The network hub may receive the certificate from the server computer, reboot, determine whether the certificate is associated with a trusted entity, and, if so, unlock the network hub at the requested level of access as an unlocked network hub. The unlocked network hub allows for particular development activities (e.g., flashing custom software), but depending on the requested level of access, may or may not allow a user to change settings of a configurable software defined radio (SDR) of the network hub and/or flash custom firmware.Type: GrantFiled: July 26, 2017Date of Patent: March 5, 2019Assignee: T-Mobile USA, Inc.Inventor: Andrew Lee Watts
-
Patent number: 10210009Abstract: A method of selecting a virtual machine (VM) on a mobile device within a wireless communication network based upon context of an incoming event. For example, a virtual intelligence engine can select a VM to handle an incoming phone call based upon the context of the phone call. If the phone call is work-related, then the virtual intelligence engine may select a first VM, while if the incoming phone call is a personal phone call, then the virtual intelligence engine may select a second VM different from the first VM. The VMs can utilize different operating systems.Type: GrantFiled: December 9, 2015Date of Patent: February 19, 2019Assignee: T-Mobile USA, Inc.Inventors: Eric W. Yocam, Ahmad Arash Obaidi, Andrew Lee Watts
-
Publication number: 20180324042Abstract: A network hub may be field programmable (e.g., upgradeable). A network hub may be operated with first settings for a configurable software defined radio (SDR) when the network hub receives an update from a server computer over a computer network. Upon installing the update, and rebooting the network hub, settings of the configurable SDR may be changed from the first settings to second, different settings, the second, different settings causing the network hub to operate using a second cellular-based radio technology that is different from a first cellular-based radio technology enabled by the first settings of the configurable SDR.Type: ApplicationFiled: July 26, 2017Publication date: November 8, 2018Inventor: Andrew Lee Watts
-
Publication number: 20180324188Abstract: A network hub may be unlockable into a development environment at various levels of access to implement tiered unlocking. A network hub may send a request to a server computer for a device-specific certificate that is usable to unlock the network hub, the request including (i) a requested level of access, and (ii) a device identifier (ID) associated with the network hub. The network hub may receive the certificate from the server computer, reboot, determine whether the certificate is associated with a trusted entity, and, if so, unlock the network hub at the requested level of access as an unlocked network hub. The unlocked network hub allows for particular development activities (e.g., flashing custom software), but depending on the requested level of access, may or may not allow a user to change settings of a configurable software defined radio (SDR) of the network hub and/or flash custom firmware.Type: ApplicationFiled: July 26, 2017Publication date: November 8, 2018Inventor: Andrew Lee Watts
-
Publication number: 20180324802Abstract: A network hub may be configured to dynamically select a desired frequency (among available licensed spectrum holdings of a carrier) at which to operate. A network hub may send a current geographic location of the network hub to a server computer, and, in response, the network hub may receive, from the server computer, multiple available frequencies at which a configurable software defined radio (SDR) of the network hub can be configured to operate. The network hub may perform a network scan to determine respective current conditions of individual frequencies of the multiple available frequencies, select a particular frequency based at least in part on the current conditions of the individual frequencies, and configure the configurable SDR to operate at the selected frequency.Type: ApplicationFiled: July 26, 2017Publication date: November 8, 2018Inventor: Andrew Lee Watts
-
Publication number: 20180324148Abstract: A network hub may be configured to implement a firewall policy in order to restrict access by designated applications executing on the network hub to particular Internet of Things (IoT) data from designated IoT devices. A network hub may receive data packets from an IoT device, analyze the data packets against a firewall policy stored in memory of the network hub to determine whether an application executing on the network hub is allowed to receive at least a portion of data within the data packets, and allow or deny the application access to at least some of the data based at least in part on the firewall policy.Type: ApplicationFiled: July 26, 2017Publication date: November 8, 2018Inventor: Andrew Lee Watts
-
Publication number: 20170168862Abstract: A method of selecting a virtual machine (VM) on a mobile device within a wireless communication network based upon context of an incoming event. For example, a virtual intelligence engine can select a VM to handle an incoming phone call based upon the context of the phone call. If the phone call is work-related, then the virtual intelligence engine may select a first VM, while if the incoming phone call is a personal phone call, then the virtual intelligence engine may select a second VM different from the first VM. The VMs can utilize different operating systems.Type: ApplicationFiled: December 9, 2015Publication date: June 15, 2017Inventors: Eric W. Yocam, Ahmad Arash Obaidi, Andrew Lee Watts