Patents by Inventor Daniel Solero
Daniel Solero has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12170725Abstract: Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.Type: GrantFiled: October 3, 2022Date of Patent: December 17, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: William R. Trost, Daniel Solero, Michelle Barry, Brian Miles
-
Patent number: 12003497Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.Type: GrantFiled: December 29, 2022Date of Patent: June 4, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
-
Publication number: 20240113869Abstract: Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.Type: ApplicationFiled: October 3, 2022Publication date: April 4, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: William R. Trost, Daniel Solero, Michelle Barry, Brian Miles
-
Publication number: 20230344622Abstract: The concepts and technologies disclosed herein are directed to quantum key distribution (“QKD”) networking as a service. According to one aspect disclosed herein, a microservices controller can establish a plurality of quantum connections with a plurality of virtual quantum connection managers (“vQCMs”) deployed in association with a set of quantum user nodes (“QUNs”) in a QKD network. The microservices controller can receive a request to initialize the QKD network. The microservices controller can coordinate with the plurality of vQCMs to handle initialization of the QKD network. The microservices controller can receive a QKD service request from a QKD network operator. The microservices controller can invoke a plurality of microservices to handle the QKD service request.Type: ApplicationFiled: April 26, 2023Publication date: October 26, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero, Daniel Sheleheda
-
Patent number: 11748091Abstract: Concepts and technologies are disclosed herein for a virtualization platform for creating, deploying, modifying, and relocating applications. A computing platform can receive a software package including software code from a requestor. The software code can be analyzed to identify functions performed by an application that corresponds to the software code. First and second functions can be virtualized and containerized, and a computing environment that is to host an application including the containers can be identified. Deployment of the application can be triggered.Type: GrantFiled: December 22, 2022Date of Patent: September 5, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Brandon Jozsa, Daniel Solero
-
Patent number: 11689570Abstract: The concepts and technologies disclosed herein are directed to quantum security enhancement for IPsec protocol. According to one aspect disclosed herein, a quantum resource manager (“Q-RM”) can find a recommended quantum routing path for routing data from a first data center to a second data center via a pair of entangled quantum particles. The Q-RM can instruct a first quantum node (“QN”) associated with the first data center and a second QN associated with the second data center to establish a quantum channel that facilitates the recommended quantum routing path. The Q-RM can prepare an IPsec encrypted tunnel to carry a qubit associated with the pair of entangled quantum particles from the first data center to the second data center. The Q-RM can find the recommended quantum routing path responsive to an issue detected with the IPsec encrypted tunnel previously established between the first data center and the second data center.Type: GrantFiled: November 30, 2020Date of Patent: June 27, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero
-
Patent number: 11683165Abstract: The concepts and technologies disclosed herein are directed to quantum key distribution (“QKD”) networking as a service. According to one aspect disclosed herein, a microservices controller can establish a plurality of quantum connections with a plurality of virtual quantum connection managers (“vQCMs”) deployed in association with a set of quantum user nodes (“QUNs”) in a QKD network. The microservices controller can receive a request to initialize the QKD network. The microservices controller can coordinate with the plurality of vQCMs to handle initialization of the QKD network. The microservices controller can receive a QKD service request from a QKD network operator. The microservices controller can invoke a plurality of microservices to handle the QKD service request.Type: GrantFiled: November 30, 2020Date of Patent: June 20, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero, Daniel Sheleheda
-
Publication number: 20230186304Abstract: Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.Type: ApplicationFiled: February 9, 2023Publication date: June 15, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Katie Alvarez, Daniel Solero
-
Publication number: 20230177315Abstract: Concepts and technologies are disclosed herein for using deep learning models to obfuscate and optimize communications. A request can be received in a first language, from a user device, and at a first computing device storing a first neural network. The request can be translated using the first neural network into a modified request in a custom language. The modified request can be sent to a second computing device hosting an application. The first computing device can receive a modified response that is in the custom language, where the modified response can be created at the second computing device using the second neural network and based on a response from the application. The modified response can be translated into a response in the first language and sent to the user device.Type: ApplicationFiled: January 26, 2023Publication date: June 8, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: William R. Trost, Daniel Solero, Brian Miles
-
Patent number: 11652847Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: GrantFiled: October 1, 2018Date of Patent: May 16, 2023Assignee: KYOCERA CorporationInventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Publication number: 20230147743Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.Type: ApplicationFiled: December 29, 2022Publication date: May 11, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Manuel Ortiz, JR., Daniel Solero, Michael Maglione, Katie Alvarez
-
Publication number: 20230126212Abstract: Concepts and technologies are disclosed herein for a virtualization platform for creating, deploying, modifying, and relocating applications. A computing platform can receive a software package including software code from a requestor. The software code can be analyzed to identify functions performed by an application that corresponds to the software code. First and second functions can be virtualized and containerized, and a computing environment that is to host an application including the containers can be identified. Deployment of the application can be triggered.Type: ApplicationFiled: December 22, 2022Publication date: April 27, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Brandon Jozsa, Daniel Solero
-
Publication number: 20230056683Abstract: Quantum key distribution network security survivability can be provided by receiving, at a software defined networking controller operating in a control layer of a network, a recommendation from a global analytics service operating in an application layer of the network, the recommendation for replacing a failed communication link in a quantum key distribution layer of the network, the failed communication link being detected by a quantum edge computing device operating in the quantum key distribution layer. The software defined networking controller can generate a command to cause a quantum key distribution resource to perform an action to mitigate impact from the failed communication link. The command can be sent to the quantum key distribution resource and the quantum key distribution resource can perform the action to mitigate the impact from the failed communication link.Type: ApplicationFiled: September 8, 2022Publication date: February 23, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, William Trost, Daniel Solero
-
Patent number: 11587083Abstract: Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.Type: GrantFiled: December 11, 2019Date of Patent: February 21, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Katie Alvarez, Daniel Solero
-
Patent number: 11575666Abstract: The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.Type: GrantFiled: December 11, 2019Date of Patent: February 7, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Manuel Ortiz, Jr., Daniel Solero, Michael Maglione, Katie Alvarez
-
Patent number: 11575713Abstract: A computer system and method provides cloud-based network security software as a service in a distributed computing environment. A computer system executing on a portion of hardware computing resources associated with the distributed computing environment receives a security service request from a customer platform device external to the distributed computing environment, the request identifying a customer platform asset within the distributed computing environment and instructing that a security service selected by the customer platform device be provided to the identified customer platform asset. In response to receiving the security service request, a network security software component associated with the selected security service on one or more virtual machines within the distributed computing environment is executed to provide the selected security service to the identified customer platform asset.Type: GrantFiled: January 26, 2021Date of Patent: February 7, 2023Assignee: KYOCERA CorporationInventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Patent number: 11568209Abstract: Concepts and technologies are disclosed herein for using deep learning models to obfuscate and optimize communications. A request can be received in a first language, from a user device, and at a first computing device storing a first neural network. The request can be translated using the first neural network into a modified request in a custom language. The modified request can be sent to a second computing device hosting an application. The first computing device can receive a modified response that is in the custom language, where the modified response can be created at the second computing device using the second neural network and based on a response from the application. The modified response can be translated into a response in the first language and sent to the user device.Type: GrantFiled: February 18, 2020Date of Patent: January 31, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: William R. Trost, Daniel Solero, Brian Miles
-
Patent number: 11550562Abstract: Concepts and technologies are disclosed herein for a virtualization platform for creating, deploying, modifying, and relocating applications. A computing platform can receive a software package including software code from a requestor. The software code can be analyzed to identify functions performed by an application that corresponds to the software code. First and second functions can be virtualized and containerized, and a computing environment that is to host an application including the containers can be identified. Deployment of the application can be triggered.Type: GrantFiled: June 14, 2021Date of Patent: January 10, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Brandon Jozsa, Daniel Solero
-
Publication number: 20220350671Abstract: Flexible computation capacity orchestration can include obtaining, at a computer, operational data from an edge device that can communicate with the computer via a network. The operational data can include utilization data that can define a resource utilization of the edge device. If a determination is made that the resource utilization of the edge device satisfies the upper utilization limit, a command can be issued to create a device group that comprises the edge device and a further edge device. Operational data can be obtained from the edge device and the further edge device, the operational data defining a further utilization of the edge device and a utilization of the further edge device. If a determination is made that the further utilization is below the lower utilization limit, a further command to end the device group can be issued.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: AT&T Intellectual Property I, L.P.Inventors: Luis Albisu, Daniel Solero, Imre Solymosi
-
Patent number: 11476932Abstract: The concepts and technologies disclosed herein are directed to quantum tampering threat management. According to one aspect of the concepts and technologies disclosed herein, a quantum security manager (“Q-SM”) can monitor a plurality of quantum channels for tampering. The Q-SM can detect tampering on a quantum channel of the plurality of quantum channels. The Q-SM can provide tampering monitoring statistics to a software-defined network (“SDN”) that, in turn, notifies a quantum security operations center (“Q-SOC”) about the tampering on the quantum channel. The Q-SM can receive threat mitigation instructions from the Q-SOC. The threat mitigation instructions can instruct the Q-SM how to counter the tampering on the quantum channel. The Q-SM can perform one or more actions in accordance with the threat mitigation instructions to counter the tampering on the quantum channel.Type: GrantFiled: November 30, 2020Date of Patent: October 18, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Moshiur Rahman, Daniel Solero, William Trost