Patents by Inventor Gaviphat Lekutai

Gaviphat Lekutai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11641585
    Abstract: An outbound roaming system detects that a wireless device has left a home wireless network and, in response, identifies a visited wireless network on which the wireless device is likely to roam or is currently roaming. The outbound roaming system queries the visited wireless network to offer security information for the wireless device. The security information can include a security parameter for the visited wireless network to mitigate a potential cyberattack enabled by the wireless device. In response to receiving an acceptance of the offer and satisfying a condition, the outbound roaming system provides the security information to the visited wireless network. As such, the visited wireless network can dynamically defend against cyberattacks enabled by roaming devices.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: May 2, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20230112272
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the transmission power of an unmanned aerial vehicle are disclosed. In one aspect, a method includes the actions of determining, by an unmanned aerial vehicle that includes a radio transceiver, an altitude of the unmanned aerial vehicle and a distance between the unmanned aerial vehicle and a base station. The actions further include, based on the altitude of the unmanned aerial vehicle and the distance between the unmanned aerial vehicle and the base station, determining, by an unmanned aerial vehicle, a transmission power level for the radio transceiver. The actions further include communicating, by the unmanned aerial vehicle, with the base station using the radio transceiver operating at the transmission power level.
    Type: Application
    Filed: November 18, 2022
    Publication date: April 13, 2023
    Inventor: Gaviphat Lekutai
  • Patent number: 11617119
    Abstract: The disclosed technology proposes a new methodology to include the effect of speed and direction of a UE into the threshold used for determining when to switch between a 4G UL connection and a 5G UL connection. The system can use a lookup table with various speeds mapping to varying thresholds. The system can use an accelerometer sensor or digital compass to determine the direction of the vehicle, such as heading away from or toward the 5G site, so the vehicle can switch sooner from 5G-NR to LTE and from LTE to NR, respectively. For C-V2X applications, latency is an important factor because 5G technology provides shorter latency than 4G; thus keeping the link on 5G is preferred when under good coverage. Further, the idea is not limited to UL, 5G and/or vehicle technologies, but can also be applied to DL direction, Wi-Fi and/or drone technologies as well.
    Type: Grant
    Filed: July 21, 2021
    Date of Patent: March 28, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Gaviphat Lekutai
  • Publication number: 20230087670
    Abstract: A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.
    Type: Application
    Filed: November 18, 2022
    Publication date: March 23, 2023
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20230069921
    Abstract: A telecommunication network associated with a wireless telecommunication provider can be configured to select RAN components for use by a UE in an open RAN. Hardware/software of a telecommunication network automatically selects one or more RUs, DUs, and CUs (which may come from different vendors) to use for a communication session with a UE. In some configurations, an application on the UE specifies the desired performance (e.g., bandwidth requirements, processing requirements, latency requirements, . . . ). For example, if an application requests a large throughput of data, a Massive MIMO RU can be selected for use, whereas if a moderate throughput is specified, then a traditional 4×4 antenna can be selected for the communication session. Similarly, if the network load is high, then multiple DUs can be activated by the telecommunication network to work together and provide necessary processing power.
    Type: Application
    Filed: November 15, 2022
    Publication date: March 9, 2023
    Inventor: Gaviphat Lekutai
  • Patent number: 11558106
    Abstract: A communication uplink between a UAV and a base station is established using frequency division duplex (FDD) communication and a communication downlink between the UAV and the base station using time division duplex (TDD) communication. A determination of whether the UAV is located above an antenna height threshold is then made. When the UAV is located above the antenna height threshold, the communication uplink is transitioned from using the FDD communication to using the TDD communication while the use of the TDD communication is continued for the communication downlink. When the UAV is located at or below the antenna height threshold, the use of the FDD communication is continued for the communication uplink and the TDD communication for the communication downlink.
    Type: Grant
    Filed: July 24, 2020
    Date of Patent: January 17, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Gaviphat Lekutai
  • Patent number: 11546767
    Abstract: A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: January 3, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Patent number: 11533624
    Abstract: The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
    Type: Grant
    Filed: July 6, 2021
    Date of Patent: December 20, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11528666
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the transmission power of an unmanned aerial vehicle are disclosed. In one aspect, a method includes the actions of determining, by an unmanned aerial vehicle that includes a radio transceiver, an altitude of the unmanned aerial vehicle and a distance between the unmanned aerial vehicle and a base station. The actions further include, based on the altitude of the unmanned aerial vehicle and the distance between the unmanned aerial vehicle and the base station, determining, by an unmanned aerial vehicle, a transmission power level for the radio transceiver. The actions further include communicating, by the unmanned aerial vehicle, with the base station using the radio transceiver operating at the transmission power level.
    Type: Grant
    Filed: September 3, 2020
    Date of Patent: December 13, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Gaviphat Lekutai
  • Publication number: 20220377103
    Abstract: A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
    Type: Application
    Filed: August 4, 2022
    Publication date: November 24, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Patent number: 11510208
    Abstract: A telecommunication network associated with a wireless telecommunication provider can be configured to select RAN components for use by a UE in an open RAN. Hardware/software of a telecommunication network automatically selects one or more RUs, DUs, and CUs (which may come from different vendors) to use for a communication session with a UE. In some configurations, an application on the UE specifies the desired performance (e.g., bandwidth requirements, processing requirements, latency requirements, . . . ). For example, if an application requests a large throughput of data, a Massive MIMO RU can be selected for use, whereas if a moderate throughput is specified, then a traditional 4×4 antenna can be selected for the communication session. Similarly, if the network load is high, then multiple DUs can be activated by the telecommunication network to work together and provide necessary processing power.
    Type: Grant
    Filed: January 7, 2021
    Date of Patent: November 22, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Gaviphat Lekutai
  • Patent number: 11444980
    Abstract: The disclosed embodiments include a method performed by a wireless network to mitigate a security risk arising from an application-layer transaction and contextual scenario of a wireless device (WD). A security resource can be maintained inactive by default and configured for on-demand activation in response to a security risk associated with the WD. The method can include monitoring the WD for application-layer transactions and contextual scenarios, and detecting a security risk relative to a particular type of a application-layer transaction and a contextual scenario of the WD. In response to detecting the security risk, the security resource is activated to support the application-layer transaction while safeguarding the entire wireless network. In response to detecting a change to the application-layer transaction or the particular contextual scenario, the security resource for the WD can be deactivated.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: September 13, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Publication number: 20220283313
    Abstract: Techniques for improving a vehicles access to GPS signals are discussed herein. An unmanned aerial vehicle (UAV) may be configured to communicate with the vehicle, such as a V2X capable vehicle, and provide GPS line of sight connection to a GPS satellite, thereby avoiding any blocking issues while maintaining accurate positioning of the vehicle on the ground. Short-range communications (e.g., Wi-Fi, PC5, unicast, etc.) may be used to provide the connectivity between the vehicle and the UAV. In some cases, a vehicle may drive into a designated area and the UAV and/or the vehicle may initiate connectivity with the other and start UAV assisted positioning services within the designated area.
    Type: Application
    Filed: March 3, 2021
    Publication date: September 8, 2022
    Inventor: Gaviphat Lekutai
  • Publication number: 20220277653
    Abstract: Described herein are techniques for facilitating communications between vehicles within a platoon while minimizing latency. In some embodiments, such techniques may be performed by a lead vehicle and may comprise obtaining, from one or more sensors, sensor information pertaining to an environment in which the lead vehicle is located and generating, from the sensor information, driving instructions to be executed by a platoon of vehicles. The techniques may further comprise identifying, within the platoon of vehicles, a plurality of separate groups of vehicles and transmitting the generated driving instructions to a platooning platform via a long-range communication channel such that the driving instructions are relayed to each of the plurality of separate groups of vehicles. The techniques may further comprise transmitting the generated driving instructions to at least one additional vehicle of the platoon of vehicles via a short-range communication channel.
    Type: Application
    Filed: March 1, 2021
    Publication date: September 1, 2022
    Inventor: Gaviphat Lekutai
  • Patent number: 11431746
    Abstract: A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: August 30, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220256371
    Abstract: A fifth generation (5G) network can provide testing capabilities by employing a test server to generate requests for testing at remote locations of the 5G network. The test server can be used to initiate tests, determine test conditions for conducting the tests, direct test locations, and receive test data from test tools remote from the server. The test server can initiate, establish, maintain, format, or otherwise determine tests that are usable to improve operation of the 5G network.
    Type: Application
    Filed: February 11, 2021
    Publication date: August 11, 2022
    Inventor: Gaviphat Lekutai
  • Patent number: 11412386
    Abstract: An inbound roaming system processes a connection of a wireless device to roam on a visited wireless network. The system queries a network resource that stores security data of a home wireless network for the wireless device. In response to the query, the system receives an indication of a security parameter that relates the security data to a potential cyberattack enabled by the wireless device roaming on the visited wireless network. The system then performs, based on the security parameter, an action to mitigate the potential cyberattack.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: August 9, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220217704
    Abstract: A telecommunication network associated with a wireless telecommunication provider can be configured to select RAN components for use by a UE in an open RAN. Hardware/software of a telecommunication network automatically selects one or more RUs, DUs, and CUs (which may come from different vendors) to use for a communication session with a UE. In some configurations, an application on the UE specifies the desired performance (e.g., bandwidth requirements, processing requirements, latency requirements, . . . ). For example, if an application requests a large throughput of data, a Massive MIMO RU can be selected for use, whereas if a moderate throughput is specified, then a traditional 4x4 antenna can be selected for the communication session. Similarly, if the network load is high, then multiple DUs can be activated by the telecommunication network to work together and provide necessary processing power.
    Type: Application
    Filed: January 7, 2021
    Publication date: July 7, 2022
    Inventor: Gaviphat Lekutai
  • Publication number: 20220210656
    Abstract: An inbound roaming system processes a connection of a wireless device to roam on a visited wireless network. The system queries a network resource that stores security data of a home wireless network for the wireless device. In response to the query, the system receives an indication of a security parameter that relates the security data to a potential cyberattack enabled by the wireless device roaming on the visited wireless network. The system then performs, based on the security parameter, an action to mitigate the potential cyberattack.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220207928
    Abstract: Techniques are described herein for facilitating V2X communications using a connected vehicle platform. The techniques include receiving, from an onboard diagnostics (OBD) accessory device, a vehicle report comprising vehicle data of a vehicle equipped with the OBD accessory device, the vehicle located at a target location. An additional vehicle located within a predetermined distance of the target location is identified. The additional vehicle is equipped with an onboard diagnostics unit (OBU). A traffic advisory message is generated based at least on the vehicle data in the vehicle report. Thereafter, the techniques include determining whether the additional vehicle is located within a communication range of the vehicle and in response to making a determination that the additional vehicle is located outside of the communication range of the vehicle, the traffic advisory message is broadcasted to the OBU of the additional vehicle.
    Type: Application
    Filed: March 16, 2022
    Publication date: June 30, 2022
    Inventor: Gaviphat Lekutai