Patents by Inventor Kwai Yeung Lee
Kwai Yeung Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10356569Abstract: A device may receive, from a subscriber identity module (SIM) over-the-air (OTA) (SIM OTA) device, a short message peer-to-peer (SMPP) message. The SMPP message including an international mobile subscriber identity (IMSI) associated with a user device. The SMPP message being associated with modifying a universal integrated circuit card (UICC) of the user device. The device may determine, using the IMSI associated with the user device, a network device to which the user device is connected. The device may provide, to the network device, a short message service (SMS) message associated with modifying the UICC of the user device to permit the UICC of the user device to be modified.Type: GrantFiled: September 28, 2018Date of Patent: July 16, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: Kwai Yeung Lee, Wing-Cheong V. Yeung
-
Publication number: 20190082308Abstract: A device may receive, from a subscriber identity module (SIM) over-the-air (OTA) (SIM OTA) device, a short message peer-to-peer (SMPP) message. The SMPP message including an international mobile subscriber identity (IMSI) associated with a user device. The SMPP message being associated with modifying a universal integrated circuit card (UICC) of the user device. The device may determine, using the IMSI associated with the user device, a network device to which the user device is connected. The device may provide, to the network device, a short message service (SMS) message associated with modifying the UICC of the user device to permit the UICC of the user device to be modified.Type: ApplicationFiled: September 28, 2018Publication date: March 14, 2019Inventors: Kwai Yeung LEE, Wing-Cheong V. YEUNG
-
Patent number: 10142305Abstract: A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.Type: GrantFiled: February 22, 2016Date of Patent: November 27, 2018Assignee: Verizon Patent and Licensing Inc.Inventors: William C. King, Priscilla Lau, Kwai Yeung Lee
-
Patent number: 10117072Abstract: A device may receive, from a subscriber identity module (SIM) over-the-air (OTA) (SIM OTA) device, a short message peer-to-peer (SMPP) message. The SMPP message including an international mobile subscriber identity (IMSI) associated with a user device. The SMPP message being associated with modifying a universal integrated circuit card (UICC) of the user device. The device may determine, using the IMSI associated with the user device, a network device to which the user device is connected. The device may provide, to the network device, a short message service (SMS) message associated with modifying the UICC of the user device to permit the UICC of the user device to be modified.Type: GrantFiled: September 12, 2017Date of Patent: October 30, 2018Assignee: Verizon Patent and Licensing Inc.Inventors: Kwai Yeung Lee, Wing-Cheong V. Yeung
-
Publication number: 20160173463Abstract: A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.Type: ApplicationFiled: February 22, 2016Publication date: June 16, 2016Inventors: William C. KING, Priscilla LAU, Kwai Yeung LEE
-
Patent number: 9270453Abstract: A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.Type: GrantFiled: June 30, 2011Date of Patent: February 23, 2016Assignee: Verizon Patent and Licensing Inc.Inventors: William C King, Priscilla Lau, Kwai Yeung Lee
-
Patent number: 9154527Abstract: A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key.Type: GrantFiled: March 5, 2012Date of Patent: October 6, 2015Assignee: Verizon Patent and Licensing Inc.Inventors: Kwai Yeung Lee, William C. King, Priscilla Lau
-
Patent number: 8990554Abstract: A first device is configured to receive an instruction to establish a secure connection with a second device or to send a secure message to the second device. The instruction may include a secure connection invitation or a message. The first device may send information, associated with the second device, to a first server; receive a response from the first server; obtain parameters based on the response indicating that the second device is subscribed to the first server; communicate the parameters to the first server; receive a parameters identifier associated with the parameters; store the parameters identifier in the secure connection invitation or the message; and send the secure connection invitation or the message to the second device. The second device may receive the parameters identifier to obtain the parameters to establish the secure connection or to decrypt the secure message.Type: GrantFiled: August 13, 2012Date of Patent: March 24, 2015Assignee: Verizon Patent and Licensing Inc.Inventors: William C. King, Kwai Yeung Lee
-
Patent number: 8972729Abstract: A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive a notification that the user device is authorized to receive content from multiple content providers. The first network device is configured further to generate a secret key and authenticate the user device by using the secret key. The first network device is further configured to send the content to the user device.Type: GrantFiled: October 24, 2012Date of Patent: March 3, 2015Assignee: Verizon Patent and Licensing Inc.Inventors: William C. King, Kwai Yeung Lee
-
Patent number: 8943318Abstract: A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the first device, and receive, via the secure connection with the first device, a set of parameters from the first device. The first device is capable of generating an encryption key for a secure message, intended for a second device, based on the set of parameters. The system is also configured to receive a second authentication request from a second device, authenticate the second device and establish a secure connection with the second device based on receiving the second authentication request, and send, via the secure connection with the second device, the set of parameters to the second device. The second user device is capable of generating a decryption key for the secure message based on the set of parameters.Type: GrantFiled: May 11, 2012Date of Patent: January 27, 2015Assignee: Verizon Patent and Licensing Inc.Inventors: Kwai Yeung Lee, William C. King
-
Patent number: 8805424Abstract: A system may include one or more network devices. The one or more network devices may receive a short message service (SMS) message intended for an access terminal, embed the SMS message into a data message, determine whether a data session exists with the access terminal, the data session occurring over a data network, transmit the data message to the access terminal via the data network when the data session exists, and transmit the SMS message via a voice network when the data session does not exist.Type: GrantFiled: October 30, 2008Date of Patent: August 12, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: William Chung King, Priscilla Lau, Kwai Yeung Lee, Loc Ba Vo
-
Publication number: 20140115333Abstract: A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive a notification that the user device is authorized to receive content from multiple content providers. The first network device is configured further to generate a secret key and authenticate the user device by using the secret key. The first network device is further configured to send the content to the user device.Type: ApplicationFiled: October 24, 2012Publication date: April 24, 2014Applicant: VERIZON PATENT AND LICENSING INC.Inventors: William C. KING, Kwai Yeung LEE
-
Publication number: 20130305040Abstract: A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the first device, and receive, via the secure connection with the first device, a set of parameters from the first device. The first device is capable of generating an encryption key for a secure message, intended for a second device, based on the set of parameters. The system is also configured to receive a second authentication request from a second device, authenticate the second device and establish a secure connection with the second device based on receiving the second authentication request, and send, via the secure connection with the second device, the set of parameters to the second device. The second user device is capable of generating a decryption key for the secure message based on the set of parameters.Type: ApplicationFiled: May 11, 2012Publication date: November 14, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Kwai Yeung LEE, William C. KING
-
Publication number: 20130003950Abstract: A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key.Type: ApplicationFiled: March 5, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Kwai Yeung LEE, William C. KING, Priscilla LAU
-
Publication number: 20130007434Abstract: A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.Type: ApplicationFiled: June 30, 2011Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: William C. KING, Priscilla Lau, Kwai Yeung Lee
-
Patent number: 7774008Abstract: Machine-to-Machine (M2M) communications, for various telemetry applications, such as meter reading, alarm applications or the like, utilize data communication service via a public mobile/wireless communication network, such as the short message service (SMS). However, such M2M communications may involve a large number of clients. To avoid the need to assign a telephone number, such as a mobile directory number (MDN) or the like, to each of the many remote M2M clients, routing through the network is based on another type of MSID (Mobile Station Identifier), such as the MIN (Mobile Identifier Number) or the IMSI (International Mobile Station Identifier) of the client. SMS messages transmissions originating at a client use a short code for the M2M application address, and SMS messages intended to terminate at a client use the MIN or IMSI as the routing address for the M2M device.Type: GrantFiled: December 22, 2006Date of Patent: August 10, 2010Assignee: Cellco PartnershipInventors: Abdelkader Benaouda, Priscilla Lau, Kwai Yeung Lee, Xiaomei Wang, Loc Ba Vo
-
Publication number: 20100099443Abstract: A system may include one or more network devices. The one or more network devices may receive a short message service (SMS) message intended for an access terminal, embed the SMS message into a data message, determine whether a data session exists with the access terminal, the data session occurring over a data network, transmit the data message to the access terminal via the data network when the data session exists, and transmit the SMS message via a voice network when the data session does not exist.Type: ApplicationFiled: October 30, 2008Publication date: April 22, 2010Applicant: Verizon Corporate Services Group Inc.Inventors: William Chung KING, Priscilla LAU, Kwai Yeung LEE, Loc Ba VO
-
Publication number: 20080153521Abstract: Machine-to-Machine (M2M) communications, for various telemetry applications, such as meter reading, alarm applications or the like, utilize data communication service via a public mobile/wireless communication network, such as the short message service (SMS). However, such M2M communications may involve a large number of clients. To avoid the need to assign a telephone number, such as a mobile directory number (MDN) or the like, to each of the many remote M2M clients, routing through the network is based on another type of MSID (Mobile Station Identifier), such as the MIN (Mobile Identifier Number) or the IMSI (International Mobile Station Identifier) of the client. SMS messages transmissions originating at a client use a short code for the M2M application address, and SMS messages intended to terminate at a client use the MIN or IMSI as the routing address for the M2M device.Type: ApplicationFiled: December 22, 2006Publication date: June 26, 2008Inventors: Abdelkader Benaouda, Priscilla Lau, Kwai Yeung Lee, Xiaomei Wang, Loc Ba Vo