Patents by Inventor Eric Yocam
Eric Yocam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240104679Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identification management, are disclosed. In one aspect, a method includes the actions of receiving, at a given time, a request to verify an identity of a user and a location of the user. The actions further include, in response to the request to verify the identity of the user, identifying a computing device associated with the user. The actions further include determining a previous time and a previous location that computing device verified the identity of the user. The actions further include, based on the given time, the location of the user, the previous time, and the previous location, determining whether to output data verifying the identity of the user at the location.Type: ApplicationFiled: December 5, 2023Publication date: March 28, 2024Inventor: Eric Yocam
-
Publication number: 20240037275Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a privacy manager are disclosed. In one aspect, a method includes the actions of receiving, from a client device, an indication of a first setting of the client device. The actions further include receiving, from the client device, an indication of a type of data that the client device is prepared to transmit. The actions further include, based on the first setting and the type of data, generating an instruction to adjust the first setting or a second setting of the client device. The actions further include, before the client device transmits the data, providing, for output to the client device, the instruction to adjust the first setting or the second setting of the client device.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Inventors: Ahmad Arash Obaidi, Eric Yocam
-
Patent number: 11836270Abstract: Systems and methods for privacy breach notification and protection enabled by the Internet of Things (IoT) are provided. Some embodiments establish a passive early warning privacy-breach detection from laser beam scan capability on a mobile device and IoT device when a particular owned object (or set of owned objects) has been laser scanned. Sensor information (e.g., laser beam sensing transparent adhesive tape, automotive cameras and proximity sensors) can be used to create notifications that allow a user to take action or to have peace of mind relating to particular activities such as to avoid fees and fines, to recover lost objects, to confirm known events, and to trigger activity.Type: GrantFiled: April 29, 2021Date of Patent: December 5, 2023Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Richard White, Damon Laursen
-
Patent number: 11783082Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a privacy manager are disclosed. In one aspect, a method includes the actions of receiving, from a client device, an indication of a first setting of the client device. The actions further include receiving, from the client device, an indication of a type of data that the client device is prepared to transmit. The actions further include, based on the first setting and the type of data, generating an instruction to adjust the first setting or a second setting of the client device. The actions further include, before the client device transmits the data, providing, for output to the client device, the instruction to adjust the first setting or the second setting of the client device.Type: GrantFiled: October 20, 2020Date of Patent: October 10, 2023Assignee: T-Mobile USA, Inc.Inventors: Ahmad Arash Obaidi, Eric Yocam
-
Patent number: 11756438Abstract: Systems and methods for aerial unmanned vehicle (for example, drone) early warning privacy breach detection, interception, and defense are disclosed. The system detects drones within a threshold distance of an individual or configurable location, notifies the individual of the drones' existence, tracks the drones, and executes countermeasures. The system can communicate with telecommunication networks or other sources (for example, FAA) to identify and filter out drones that are authorized to be in the airspace around the individual.Type: GrantFiled: February 2, 2022Date of Patent: September 12, 2023Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Damon Laursen
-
Publication number: 20230053277Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting modified media are disclosed. In one aspect, a method includes the actions of receiving an item of media content. The actions further include providing the item as an input to a model that is configured to determine whether the item likely includes audio of a user's voice that was not spoken by the user or likely includes video of the user that depicts actions of the user that were not performed by the user. The actions further include receiving, from the model, data indicating whether the item likely includes audio of the user's voice that was not spoken by the user or includes video of the user that depicts actions of the user that were not performed by the user. The actions further include determining whether the item likely includes deepfake content.Type: ApplicationFiled: October 31, 2022Publication date: February 16, 2023Inventors: Eric Yocam, Ahmad Arash Obaidi
-
Patent number: 11514342Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting modified media are disclosed. In one aspect, a method includes the actions of receiving an item of media content. The actions further include providing the item as an input to a model that is configured to determine whether the item likely includes audio of a user's voice that was not spoken by the user or likely includes video of the user that depicts actions of the user that were not performed by the user. The actions further include receiving, from the model, data indicating whether the item likely includes audio of the user's voice that was not spoken by the user or includes video of the user that depicts actions of the user that were not performed by the user. The actions further include determining whether the item likely includes deepfake content.Type: GrantFiled: June 29, 2020Date of Patent: November 29, 2022Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Ahmad Arash Obaidi
-
Patent number: 11418949Abstract: A video stream from a user device that is destined for a recipient device is received at a core network of a wireless carrier network. The video stream has a video quality that at least meets a quality threshold for behavioral biometric analysis. A determination of whether a video privacy policy for the user device permits transmission of the video stream of the video quality to the recipient device is made. In response to the video privacy policy not permitting the transmission of the video stream of the video quality, the video quality of the video stream is downgraded to generate a downgraded video stream that prevents behavioral biometric analysis for transmission to the recipient device. However, in response to the video privacy policy permitting the transmission of the video stream of the video quality, the video stream of the video quality is transmitted to the recipient device.Type: GrantFiled: May 13, 2020Date of Patent: August 16, 2022Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Ahmad Arash Obaidi
-
Patent number: 11375378Abstract: A request from a user device to register as a secure endpoint device of a secure local area network (LAN) is received by a wireless carrier network. A device type of the user device is identified by the network based on device identification information provided by the user device. A data protection policy that corresponds to the device type of the user device is sent to a secure endpoint application on the user device following a registration of the user device as a secure endpoint device by the network, in which the data protection policy includes an Access Point Name (APN). The user device allocated a network slice of the wireless carrier network that corresponds to the APN to the user device. Subsequently, a data file is transported from the user device to an additional secure endpoint device via the network slice that is allocated to the user device.Type: GrantFiled: November 5, 2019Date of Patent: June 28, 2022Assignee: T-Mobile USA, Inc.Inventors: Ahmad Arash Obaidi, Eric Yocam, Paul Farag
-
Publication number: 20220157181Abstract: Systems and methods for aerial unmanned vehicle (for example, drone) early warning privacy breach detection, interception, and defense are disclosed. The system detects drones within a threshold distance of an individual or configurable location, notifies the individual of the drones' existence, tracks the drones, and executes countermeasures. The system can communicate with telecommunication networks or other sources (for example, FAA) to identify and filter out drones that are authorized to be in the airspace around the individual.Type: ApplicationFiled: February 2, 2022Publication date: May 19, 2022Inventors: Eric Yocam, Damon Laursen
-
Publication number: 20220138882Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identitying management, are disclosed. In one aspect, a method includes the actions of receiving, at a given time, a request to verify an identity of a user and a location of the user. The actions further include, in response to the request to verify the identity of the user, identifying a computing device associated with the user. The actions further include determining a previous time and a previous location that computing device verified the identity of the user. The actions further include, based on the given time, the location of the user, the previous time, and the previous location, determining whether to output data verifying the identity of the user at the location.Type: ApplicationFiled: November 3, 2020Publication date: May 5, 2022Inventor: Eric Yocam
-
Publication number: 20220121773Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a privacy manager are disclosed. In one aspect, a method includes the actions of receiving, from a client device, an indication of a first setting of the client device. The actions further include receiving, from the client device, an indication of a type of data that the client device is prepared to transmit. The actions further include, based on the first setting and the type of data, generating an instruction to adjust the first setting or a second setting of the client device. The actions further include, before the client device transmits the data, providing, for output to the client device, the instruction to adjust the first setting or the second setting of the client device.Type: ApplicationFiled: October 20, 2020Publication date: April 21, 2022Inventors: Ahmad Arash Obaidi, Eric Yocam
-
Patent number: 11270595Abstract: Systems and methods for aerial unmanned vehicle (for example, drone) early warning privacy breach detection, interception, and defense are disclosed. The system detects drones within a threshold distance of an individual or configurable location, notifies the individual of the drones' existence, tracks the drones, and executes countermeasures. The system can communicate with telecommunication networks or other sources (for example, FAA) to identify and filter out drones that are authorized to be in the airspace around the individual.Type: GrantFiled: October 3, 2018Date of Patent: March 8, 2022Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Damon Laursen
-
Publication number: 20210406719Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting modified media are disclosed. In one aspect, a method includes the actions of receiving an item of media content. The actions further include providing the item as an input to a model that is configured to determine whether the item likely includes audio of a user's voice that was not spoken by the user or likely includes video of the user that depicts actions of the user that were not performed by the user. The actions further include receiving, from the model, data indicating whether the item likely includes audio of the user's voice that was not spoken by the user or includes video of the user that depicts actions of the user that were not performed by the user. The actions further include determining whether the item likely includes deepfake content.Type: ApplicationFiled: June 29, 2020Publication date: December 30, 2021Inventors: Eric Yocam, Ahmad Arash Obaidi
-
Publication number: 20210360394Abstract: A video stream from a user device that is destined for a recipient device is received at a core network of a wireless carrier network. The video stream has a video quality that at least meets a quality threshold for behavioral biometric analysis. A determination of whether a video privacy policy for the user device permits transmission of the video stream of the video quality to the recipient device is made. In response to the video privacy policy not permitting the transmission of the video stream of the video quality, the video quality of the video stream is downgraded to generate a downgraded video stream that prevents behavioral biometric analysis for transmission to the recipient device. However, in response to the video privacy policy permitting the transmission of the video stream of the video quality, the video stream of the video quality is transmitted to the recipient device.Type: ApplicationFiled: May 13, 2020Publication date: November 18, 2021Inventors: Eric Yocam, Ahmad Arash Obaidi
-
Publication number: 20210248265Abstract: Systems and methods for privacy breach notification and protection enabled by the Internet of Things (IoT) are provided. Some embodiments establish a passive early warning privacy-breach detection from laser beam scan capability on a mobile device and IoT device when a particular owned object (or set of owned objects) has been laser scanned. Sensor information (e.g., laser beam sensing transparent adhesive tape, automotive cameras and proximity sensors) can be used to create notifications that allow a user to take action or to have peace of mind relating to particular activities such as to avoid fees and fines, to recover lost objects, to confirm known events, and to trigger activity.Type: ApplicationFiled: April 29, 2021Publication date: August 12, 2021Inventors: Eric Yocam, Richard White, Damon Laursen
-
Patent number: 11023613Abstract: Systems and methods for privacy breach notification and protection enabled by the Internet of Things (IoT) are provided. Some embodiments establish a passive early warning privacy-breach detection from laser beam scan capability on a mobile device and IoT device when a particular owned object (or set of owned objects) has been laser scanned. Sensor information (e.g., laser beam sensing transparent adhesive tape, automotive cameras and proximity sensors) can be used to create notifications that allow a user to take action or to have peace of mind relating to particular activities such as to avoid fees and fines, to recover lost objects, to confirm known events, and to trigger activity.Type: GrantFiled: June 5, 2019Date of Patent: June 1, 2021Assignee: T-Mobile USA, Inc.Inventors: Eric Yocam, Richard White, Damon Laursen
-
Publication number: 20210136569Abstract: A request from a user device to register as a secure endpoint device of a secure local area network (LAN) is received by a wireless carrier network. A device type of the user device is identified by the network based on device identification information provided by the user device. A data protection policy that corresponds to the device type of the user device is sent to a secure endpoint application on the user device following a registration of the user device as a secure endpoint device by the network, in which the data protection policy includes an Access Point Name (APN). The user device allocated a network slice of the wireless carrier network that corresponds to the APN to the user device. Subsequently, a data file is transported from the user device to an additional secure endpoint device via the network slice that is allocated to the user device.Type: ApplicationFiled: November 5, 2019Publication date: May 6, 2021Inventors: Ahmad Arash Obaidi, Eric Yocam, Paul Farag
-
Publication number: 20200111374Abstract: Systems and methods for aerial unmanned vehicle (for example, drone) early warning privacy breach detection, interception, and defense are disclosed. The system detects drones within a threshold distance of an individual or configurable location, notifies the individual of the drones' existence, tracks the drones, and executes countermeasures. The system can communicate with telecommunication networks or other sources (for example, FAA) to identify and filter out drones that are authorized to be in the airspace around the individual.Type: ApplicationFiled: October 3, 2018Publication date: April 9, 2020Inventors: Eric Yocam, Damon Laursen
-
Publication number: 20190286845Abstract: Systems and methods for privacy breach notification and protection enabled by the Internet of Things (IoT) are provided. Some embodiments establish a passive early warning privacy-breach detection from laser beam scan capability on a mobile device and IoT device when a particular owned object (or set of owned objects) has been laser scanned. Sensor information (e.g., laser beam sensing transparent adhesive tape, automotive cameras and proximity sensors) can be used to create notifications that allow a user to take action or to have peace of mind relating to particular activities such as to avoid fees and fines, to recover lost objects, to confirm known events, and to trigger activity.Type: ApplicationFiled: June 5, 2019Publication date: September 19, 2019Inventors: Eric Yocam, Richard White, Damon Laursen