Patents by Inventor Lyle W. Paczkowski

Lyle W. Paczkowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250247775
    Abstract: A method of providing a communication service to a radio frequency identity (RFID) tag reader. The method comprises allocating network slice resources of a telecommunication network for the reader by a controller by sending a first message to a network slice selection function (NSSF) in the network, wherein the controller is an application that executes on a computer system in the network; providing a communication channel between the reader and an enterprise inventory control system via the allocated network slice resources; monitoring messages in the communication channel by the controller; analyzing the messages by the controller; determining by the controller a network slice resource need of the communication channel that differs from a current allocation of network slice resources based on the analyzing; and adapting the communication channel by the controller by sending messages to the NSSF to allocate different network slice resources associated with the communication channel.
    Type: Application
    Filed: January 25, 2024
    Publication date: July 31, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Publication number: 20250238642
    Abstract: An autonomous appliance configured to operate in a facility. The autonomous appliance includes a chassis including a motor configured to move the autonomous appliance within the facility and a radio frequency identification (RFID) tag reader configured to communicate with infrastructure RFID tags attached to fixed infrastructure and with product RFID tags attached to product containers. The RFID tag reader emits an RF signal that provides ambient RF power to the infrastructure RFID tags and the product RFID tags. The autonomous appliance includes at least one actuator configured to manipulate the product containers and a controller coupled to the RFID tag reader and configured to read information from the infrastructure RFID tags and the product RFID tags. The controller adapts the behavior of the autonomous appliance relative to a first product container based on the read information.
    Type: Application
    Filed: January 18, 2024
    Publication date: July 24, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Patent number: 12363543
    Abstract: A method for implementing a slice security zone (SSZ) in a 5G network. The method comprises storing by an SSZ function executing on a first network server an SSZ security profile of the SSZ in a secure storage function, receiving by the SSZ function from a slice management function a slice registration request comprising information relating to a slice security profile of a slice managed by the slice management function, if the slice security profile complies with the SSZ security profile, storing by the SSZ function a slice registration association between the slice and the SSZ in the secure storage function, and sending by the SSZ function to the slice management function a slice registration response comprising information relating to whether the slice was registered in the SSZ.
    Type: Grant
    Filed: December 27, 2023
    Date of Patent: July 15, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Lyle W. Paczkowski
  • Publication number: 20250220553
    Abstract: A managed communication service system to restrict communication in a network based on a privilege associated to a context of the communication to provide privilege isolation. The managed communication service system comprises a processor; a memory; and an application stored in the memory that, when executed by the processor, is configured to monitor network traffic associated with the managed communication service system, determine a context of the managed communication service system based on monitoring the network traffic associated with the managed communication service system, restrict a first communication session provided by the managed communication service system based on the context to a first combination of communication privilege parameters, and restrict a second communication session provided by the managed communication service system based on the context to a second combination of communication privilege parameters.
    Type: Application
    Filed: January 2, 2024
    Publication date: July 3, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Patent number: 12346901
    Abstract: A mobile communication device. The device comprises a processor, a non-transitory memory, a cellular radio transceiver, and an in-kind payment client application stored in the non-transitory memory.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: July 1, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Mark R. Bales, Craig A. Lee, Alberto Lorente, Lyle W. Paczkowski
  • Publication number: 20250190728
    Abstract: A radio-frequency identification (RFID) system for identifying objects associated with RFID tags and facilitating maintenance of digital processing backends, where the RFID system includes a plurality of distributed RFID readers, and where each distributed RFID reader is defined by a radio frequency (RF) front-end and a digital processing backend that is physically isolated from each RF front-end. The RFID system further includes a controller operatively connected to the plurality of distributed RFID readers, where the controller is configured to update each distributed RFID reader without updating each RF front-end of each distributed RFID reader.
    Type: Application
    Filed: December 11, 2023
    Publication date: June 12, 2025
    Inventors: Robert Keith Butler, Lyle W. Paczkowski
  • Publication number: 20250184432
    Abstract: A method comprises generating, by a storage application in a data store implemented as an interplanetary file system (IPFS), a slice data structure dedicated for the network slice in response to receiving the parameters from the slice application, in which the slice data structure comprises the parameters of the network slice, monitoring, by the slice application, usage of the one or more NEs in the network slice by the client, storing, by the storage application in the slice data structure, usage data describing the usage of the one or more NEs in the network slice, and updating, by the storage application, the slice data structure to indicate update data describing an update to one or more parameters of the network slice in response to receiving update data from the slice application.
    Type: Application
    Filed: December 4, 2023
    Publication date: June 5, 2025
    Inventors: Marouane Balmakhtar, Galip Murat Karabulut, Lyle W. Paczkowski
  • Publication number: 20250175772
    Abstract: In some examples, a data management method in a transportation vehicle includes receiving, at an access point, data from a plurality of sensor devices, aggregating the sensor data, transmitting the aggregated sensor data to a mobile core network located in the transportation vehicle, and caching, at the mobile core network, the aggregated sensor data.
    Type: Application
    Filed: November 28, 2023
    Publication date: May 29, 2025
    Inventors: Zheng FANG, Galip Murat KARABULUT, Lyle W. PACZKOWSKI, George Jason SCHNELLBACHER
  • Publication number: 20250174915
    Abstract: In some examples, a method of managing communication includes receiving, at an access point, communication from multiple user devices, aggregating the communication from the multiple user devices to form a first aggregated communication, transmitting the first aggregated communication to a mobile core network, aggregating, at the first mobile network core, the first aggregated communication with communication from a second access point to form a second aggregated communication, and transmitting the second aggregated communication to a macro core network.
    Type: Application
    Filed: November 28, 2023
    Publication date: May 29, 2025
    Inventors: Zheng FANG, Galip Murat KARABULUT, Lyle W. PACZKOWSKI, George Jason SCHNELLBACHER
  • Publication number: 20250176039
    Abstract: In some examples, a mobile core network is implemented in a movable platform. The mobile core network includes a user plane function (UPF), a mobility management function (AMF), and a session management function (SMF). The mobile core network is configured to authenticate a user device located on the movable platform into first or second states, the first state providing local access on the movable platform, and the second state providing local access on the movable platform and access to a macro core network via the mobile core network.
    Type: Application
    Filed: November 28, 2023
    Publication date: May 29, 2025
    Inventors: Zheng FANG, Galip Murat KARABULUT, Lyle W. PACZKOWSKI, George Jason SCHNELLBACHER
  • Publication number: 20250175783
    Abstract: In some examples, a method of communication management includes receiving, at a user device programmed to communicate with a macro core network via a baseband processing unit of the user device according to a first subscriber identity module (SIM), a traveling SIM (tSIM), receiving, at the user device, an instruction to initiate the tSIM, responsive to the instruction, programming, on the user device, a second SIM based on the tSIM, the second SIM including multiple profiles programmed according to the programming, wherein the multiple profiles control communication of the user device via the baseband processing unit, and communicating with a mobile core network via the baseband processing unit according to the second SIM.
    Type: Application
    Filed: November 28, 2023
    Publication date: May 29, 2025
    Inventors: Zheng FANG, Galip Murat KARABULUT, Lyle W. PACZKOWSKI, George Jason SCHNELLBACHER
  • Publication number: 20250165494
    Abstract: A method is disclosed for providing, in a server computer, a data set to a subscriber. The method includes receiving a first subscription request from a subscriber specifying first data content and format for members of a first data set, sending a second subscription request to a data set provider specifying a second data content and format for members of a second data set, receiving RFID reader locations, receiving a second data set member having RFID tag data read by the RFID readers, generating an object location based on the RFID tag data read and the RFID reader locations, receiving real-time data relating to the object; converting the real-time data to converted real-time data having the first data set data format; generating a first data set member from the object location, the tag data, and the converted real-time data, and sending the first data set member to the subscriber.
    Type: Application
    Filed: November 22, 2023
    Publication date: May 22, 2025
    Inventors: Robert Keith Butler, Lyle W. Paczkowski
  • Publication number: 20250165623
    Abstract: In some examples, a computer program product comprises computer-executable instructions stored in a non-transitory computer readable medium. The instructions are executable by a processor to cause the processor to partition a data structure into a plurality of parts, distribute and store the plurality of parts among a plurality of data stores according to a randomization factor, generate a look-up table including an association between each of the parts and respective storage location of the parts among the plurality of data stores, responsive to a request to access the data structure, query the look-up table to determine the respective storage locations of the parts among the plurality of data stores, access the respective storage locations to obtain the parts, and reassemble the parts to obtain the data structure.
    Type: Application
    Filed: November 17, 2023
    Publication date: May 22, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Publication number: 20250148249
    Abstract: A method of controlling assignment and management of identities in ambient electromagnetic power harvesting (AEPH) chips. The method comprises allocating a plurality of unique AEPH identities by an AEPH management application executing on a computer system, receiving a plurality of requests by the AEPH management application to update a state associated in a blockchain with the unique AEPH identity identified in each request; determining by the AEPH management application that the blockchain is to be terminated; adding by the AEPH management application a terminal block to the blockchain; receiving a request by the AEPH management application to update a state associated with a unique AEPH identity in the blockchain; and sending a request rejection by the AEPH management application to the affiliated device that sent the request to update the state associated with the unique AEPH identity in the blockchain after the terminal block was added to the blockchain.
    Type: Application
    Filed: January 10, 2025
    Publication date: May 8, 2025
    Inventors: Mark R. Bales, Lyle T. Bertz, Lyle W. Paczkowski, Harry W. Perlow
  • Publication number: 20250148226
    Abstract: An apparatus configured to control operation of a product. The apparatus includes an integrated RFID tag embedded in the product and configured to communicate with an external user device. The integrated RFID tag stores a first working key associated with the product and is further configured to receive a second working key transmitted from the external user device. The apparatus includes control logic operatively coupled to the integrated RFID tag and configured to read the first working key and the second working key from the integrated RFID tag. The control logic determines whether the first and second working keys match and, in response to a determination that the first and second working keys match, the control logic enables a controlled functionality of the product.
    Type: Application
    Filed: November 7, 2023
    Publication date: May 8, 2025
    Inventors: Robert Keith BUTLER, Lyle W. PACZKOWSKI
  • Publication number: 20250126551
    Abstract: In some examples, a method includes establishing via a first communication device, a communication session in a network slice through a first network attachment type. The method also includes transitioning through a radio access network (RAN) from the first network attachment type to a second network attachment type. The method also includes continuing, via a second communication device, the communication session in the network slice through the second network attachment type simultaneously with the communication session in the network slice through the first network attachment type.
    Type: Application
    Filed: October 12, 2023
    Publication date: April 17, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Patent number: 12278860
    Abstract: A method comprising distributing rendering of media content across an end user device and a rendering device located at a single premise based on instruction sets carried in a ledger associated of the media or based on distributed applications respectively stored at the end user device and rendering device. The method further comprises integrating, by the end user device, rendered content received from the rendering device with data obtain from performing processing and rendering operations at the end user device to obtain a final render of the media content, and displaying, on a display of the end user device, the final render of the media content.
    Type: Grant
    Filed: September 1, 2023
    Date of Patent: April 15, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Lyle W. Paczkowski, George Jason Schnellbacher
  • Publication number: 20250119734
    Abstract: A method for providing, in a computer connected via a network to a 5G core network, a security gateway function is provided. The method includes connecting the security gateway function to the 5G core network via a non-3GPP access network, registering the security gateway function with the non-3GPP access network, establishing a secure tunnel between the security gateway function and the 5G core network, obtaining authentication keys and security association keys for the security gateway function from the 5G core network, and establishing user plane and control plane connectivity between the security gateway function and the 5G core network. The security gateway function is configured to establish a secure connection to an external device coupled to the computer.
    Type: Application
    Filed: October 6, 2023
    Publication date: April 10, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI
  • Publication number: 20250094757
    Abstract: Disclosed is a method of gathering data from a hybrid RFID chip to determine usage of an item or article of clothing using a mobile device like a phone, laptop, or tablet. The hybrid RFID chip consists of a processor, a memory, a radio transceiver, a power harvesting antenna, and an impedance circuit that converts ambient radio frequency (RF) energy to electrical energy. The RFID chip receives a first power level from ambient RF energy and periodically broadcasts an identity. The mobile device can receive the broadcast identity, store the identity, transmit the identity and location to a remote server, and receive a notification message from the remote server. The remote serve can determine usage of the item or article of clothing by comparing current records to previous records of RFID chip identity, location, and mobile device application identity.
    Type: Application
    Filed: December 3, 2024
    Publication date: March 20, 2025
    Inventors: Ronald R. Marquardt, Lyle W. Paczkowski
  • Publication number: 20250094624
    Abstract: A method of storing and managing access to information about electronic transactions completed by users collected from a plurality of transaction processors. The method comprises storing information associated with transactions by an application; receiving a first user information management request by the application from a user; sending a user management report by the application to the user; receiving a second user information management request message by the transaction record repository application from the user; and responsive to receiving the second user information management request message, restricting access by the application to one or more of the types of information on electronic transactions associated with the user that can be accessed by one or more of the transaction processors.
    Type: Application
    Filed: September 14, 2023
    Publication date: March 20, 2025
    Inventors: Marouane BALMAKHTAR, Lyle W. PACZKOWSKI