Patents by Inventor Marouane Balmakhtar

Marouane Balmakhtar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098630
    Abstract: A wireless communication network uses a wireless network slice. The wireless communication network transfers slice information for the wireless network slice to a user data system. The wireless communication network receives a request from the user data system for user data from the wireless network slice. The wireless communication network receives the user data from a wireless user device over the wireless network slice. The wireless communication network transfers the user data to the user data system in response to the request.
    Type: Application
    Filed: November 29, 2023
    Publication date: March 21, 2024
    Inventor: Marouane Balmakhtar
  • Publication number: 20240080666
    Abstract: A wireless communication network authenticates a wireless user device. Access circuitry decrypts access data with a network key and identifies a network ID and circuitry ID in the decrypted access data. In response, the access circuitry establishes a secure tunnel with the user device and transfers the circuitry ID to authentication circuitry. The authentication circuitry identifies a user ID based on the circuitry ID and authenticates the user device based on the user ID. The authentication circuitry generates a new network key pair and transfers the new keys and a grant to the access circuitry. The access circuitry transfers a new network key and the grant to the user device over the secure tunnel. The user device unlocks a user key with the grant and securely communicates using the user key. The wireless user device uses the new network key for the next authentication.
    Type: Application
    Filed: September 1, 2022
    Publication date: March 7, 2024
    Inventors: Marouane Balmakhtar, Zheng Fang, Shu Wang
  • Publication number: 20240080323
    Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.
    Type: Application
    Filed: September 6, 2022
    Publication date: March 7, 2024
    Inventors: Marouane BALMAKHTAR, Serge MANNING, Gregory SCHUMACHER
  • Patent number: 11924908
    Abstract: User equipment (UE) network radio link state management for ambient electromagnetic power harvesting chip (AEPH) reader applications and devices is provided. In some embodiments, radio link state management services are provided that may be engaged by a UE that can wirelessly communicate both with a wireless telecommunications network, and an AEPH chip. Embodiments may include a method that determines when an AEPH chip communication event is pending, suspends a UE connection state of at least one data channel of the one or more data channels of the UE radio link in response to the determining when the AEPH chip communication event is pending, performs the AEPH chip communication event; and releases suspension of the UE connection state of the at least one data channel of the one or more data channels of the UE radio link.
    Type: Grant
    Filed: November 16, 2022
    Date of Patent: March 5, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Lyle Walter Paczkowski, Marouane Balmakhtar, Galip Murat Karabulut
  • Patent number: 11909827
    Abstract: A method of establishing an application layer connection between a user equipment (UE) and an application executing on an edge computing node via a communication network. The method comprises receiving an application service availability message by the UE that identifies a plurality of networks that provide access to an identified application executing on an edge computing node within the network; for each network identified in the application service availability message, receiving by the UE an application service figure-of-merit determined by that network associated with a prospective application layer connection between the UE and an edge computing node executing the identified application that is located in that network; based on evaluating the figure-of-merit associated with each network establishing an application layer connection by the UE via the selected network to the application executing on the edge computing node in the selected network.
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: February 20, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Galip Murat Karabulut, Laurent A. Laporte, Lyle W. Paczkowski
  • Publication number: 20240057001
    Abstract: Embodiments of the present disclosure provide for a quantum computing based network time validation function that can evaluate a large set of network time reference signals (e.g., a set of timestamps) and rapidly identify aberrations that can negatively affect network operation. In some embodiments, a method comprises: receiving a set of task data comprising a set of network time reference signals; searching the set of task data using a quantum search algorithm executed on a quantum computing platform, wherein the quantum search algorithm performs operations on more quantum states generated by the quantum computing platform based on a search task function defined by a quantum oracle, wherein the search task function comprises a time prediction task function; and generating an output comprising an indication of validation of the set of network time reference signals based on the searching.
    Type: Application
    Filed: August 11, 2022
    Publication date: February 15, 2024
    Inventors: Lyle Walter Paczkowski, Marouane Balmakhtar
  • Patent number: 11902152
    Abstract: System and method for creating a secure enclave for User Equipment Route Selection Policy (URSP) rules in User Equipment (UE) in 5G to prevent malicious tampering and modification of the URSP rules. When the URSP rules are changed, a request is sent to receive a new set of URSP rules or receive an update of the URSP rules.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: February 13, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Gregory Schumacher
  • Patent number: 11899628
    Abstract: A method of performing a virtual network function. The method comprises forking a user plane process on a computer by a virtual network function process that executes on the computer, forking a control plane process on the computer by the virtual network function process, adding blocks to a user plane blockchain by the user plane process that record user plane events, adding blocks to a control plane blockchain by the control plane process that record control plane events, creating a first package of information by the user plane process based on the user plane blockchain, self-terminating by the user plane process while passing the first package of information to the virtual network function process, creating a second package of information by the control plane process based on the control plane blockchain, self-terminating by the control plane process while passing the second package of information to the virtual network function process.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: February 13, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Lyle W. Paczkowski
  • Patent number: 11902788
    Abstract: A method for implementing a slice security zone (SSZ) in a 5G network. The method comprises storing by an SSZ function executing on a first network server an SSZ security profile of the SSZ in a secure storage function, receiving by the SSZ function from a slice management function a slice registration request comprising information relating to a slice security profile of a slice managed by the slice management function, if the slice security profile complies with the SSZ security profile, storing by the SSZ function a slice registration association between the slice and the SSZ in the secure storage function, and sending by the SSZ function to the slice management function a slice registration response comprising information relating to whether the slice was registered in the SSZ.
    Type: Grant
    Filed: December 8, 2021
    Date of Patent: February 13, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Lyle W. Paczkowski
  • Patent number: 11882441
    Abstract: A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, quantum circuitry selects polarization states for qubits, generates and transfers the qubits, exchanges cryptography information with edge quantum circuitry, generates cryptography keys based on polarization states and cryptography information, and transfers the cryptography keys to network authentication circuitry. The edge quantum circuitry receives and process the qubits, determines the polarization states for the qubits, exchanges the cryptography information with the network quantum circuitry, generates the cryptography keys based on the polarization states and cryptography information, and transfers the cryptography keys to the wireless UE. The wireless UE generates authentication data based on the cryptography keys and wirelessly transfers the authentication data for delivery to the network authentication circuitry.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: January 23, 2024
    Assignee: T-MOBILE INNOVATIONS LLC
    Inventor: Marouane Balmakhtar
  • Publication number: 20240023172
    Abstract: Systems and methods for connecting a user device to a telecommunication network include a user device and a core network management system communicatively coupled to at least one access network and the user device. The core network management system is structured to generate a unique identifier corresponding to the user device, generate a telecommunication network stack based on the unique identifier, the virtual telecommunication network stack including the unique identifier, determine a channel to distribute the telecommunication network stack, and based on the telecommunication network stack, cause the user device to connect to a telecom network using an access network.
    Type: Application
    Filed: July 14, 2022
    Publication date: January 18, 2024
    Inventors: Marouane Balmakhtar, Robert Keith Butler
  • Patent number: 11864102
    Abstract: A wireless communication network serves sensor data from a wireless sensor to a data system. The wireless communication network receives a sensor request transferred by the data system. The wireless communication network transfers the sensor request to a Network Exposure Function (NEF). The wireless communication network receives sensor data transferred by the wireless sensor. The wireless communication network transfers the sensor data to the NEF. The NEF receives the sensor data and the sensor request, and in response, transfers the sensor data for delivery to the data system.
    Type: Grant
    Filed: October 18, 2022
    Date of Patent: January 2, 2024
    Assignee: T-MOBILE INNOVATIONS LLC
    Inventor: Marouane Balmakhtar
  • Publication number: 20230422029
    Abstract: A data communication system serves a user application in a User Equipment (UE). The data communication system receives a subscription from an application server into a Network Exposure Function (NEF). The subscription is for user data from the user application in the UE. The data communication system receives the user data from the user application in the UE over a Virtual Private Network (VPN) and transfers the user data to the NEF. The data communication system transfers the user data from the NEF for delivery to the application server in response to the subscription.
    Type: Application
    Filed: September 12, 2023
    Publication date: December 28, 2023
    Inventors: Marouane Balmakhtar, Zheng Fang
  • Publication number: 20230403304
    Abstract: A method of testing a communication system implementing a zero trust architecture. The method comprises sending a request by a test equipment platform to access a microsegment to a policy enforcement point (PEP); sending an authorization request by the PEP to a policy decision point (PDP); authorizing access of the test equipment platform to the microsegment by the PDP; sending authorization of access of the test equipment platform to the microsegment by the PDP to the PEP; establishing a secure tunnel by the PEP between the test equipment platform and the microsegment; sending a command to provide test data by the test equipment platform via the secure tunnel to a probe in the microsegment; analyzing the test data by the test equipment platform; and producing a test result by the test equipment platform based on analyzing the test data.
    Type: Application
    Filed: June 9, 2022
    Publication date: December 14, 2023
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Publication number: 20230388297
    Abstract: Systems and methods for providing multi-factor authentication based on visual objects associated with an out of band shared secret delivery channel and at least one user device of a telecommunication network include an access point communicatively coupled to an authentication system. The authentication system is structured to generate a set of visual objects, cause the set of visual objects to be output by a first user device, transmit, via an out of band shared secret delivery channel, a visual object request to cause a secondary user device to output one or more out of band visual objects, receive an indication of object selection from the set of visual objects, determine that the indication of the object selection is associated with a visual selection match among the set of visual objects, and based on the visual selection match, authenticate access to an application associated with the authentication system.
    Type: Application
    Filed: May 25, 2022
    Publication date: November 30, 2023
    Inventors: Serge Mukerji MANNING, Gregory SCHUMACHER, Marouane BALMAKHTAR
  • Publication number: 20230389093
    Abstract: Systems and methods are provided herein to implement a platform independent client framework, which may also be known as a universal software stack. A computer-implemented method for may be used when seeking to connect a device without a 5G radio, such as a 3GPP device, to a 5G network. The device seeking to connect to the 5G network sends a connection request message to the platform independent client framework. Based on the connection request message, the platform independent client framework requests a platform specific adapter, which is then used to create an adapted message. The platform independent client framework then encapsulates the adapted message. The adapted message is then encapsulated to create a first encapsulated message. The first encapsulated message is then encapsulated in an internet protocol security protocol to create a second encapsulated message. The second encapsulated message is then transmitted to the 5G network.
    Type: Application
    Filed: May 26, 2022
    Publication date: November 30, 2023
    Inventors: Marouane Balmakhtar, Brian David Waters, Lyle T. Bertz
  • Publication number: 20230361996
    Abstract: A wireless communication network generates and transfers qubits to a wireless user device. The wireless communication network and the wireless user device determine polarization states for the qubits. The wireless communication network and the wireless user device exchange cryptography information. The wireless communication network and the wireless user device generate cryptography keys based on the polarization states and the cryptography information. The wireless communication network and the wireless user device encrypt and decrypt data that they exchange with one another based on the cryptography keys.
    Type: Application
    Filed: June 28, 2023
    Publication date: November 9, 2023
    Inventors: Marouane Balmakhtar, Lyle Walter Paczkowski
  • Patent number: 11809924
    Abstract: A wireless communication network to serve a User Equipment (UE) over Network Exposure Functions (NEFs) that have Application Programming Interfaces (APIs). In the wireless communication network, a NEF Interface Function (NIF) receives a NEF request from a network function. The NIF correlates the NEF request with one of the APIs. The NIF selects one of the NEFs based on the one of the APIs. The NIF translates the NEF request into an API call based on the one of the APIs. The NIF transfers the API call to the one of the NEFs. The one of the NEFs receive the API call and responsively performs a network task for the UE based on the API call.
    Type: Grant
    Filed: August 10, 2021
    Date of Patent: November 7, 2023
    Assignee: T-MOBILE INNOVATIONS LLC
    Inventor: Marouane Balmakhtar
  • Publication number: 20230353996
    Abstract: Systems and methods for a micro-service data gateway are provided. In some embodiments, the micro-service data gateway comprises at least a micro-service data reflector and a micro-service data synthesizer. The data reflector operates to serve cached micro-service data in response to UE micro-service data requests. The reflector receives requests for micro-service data available from at least one data source exposed by a network exposure function (NEF) of a network operator core, retrieves the micro-service data from a data cache comprising at least a subset of micro-service data available from the data source, and provides the micro-service data to a requestor of the micro-service data. The synthesizer operates to ensure that the cache of micro-service data available to the reflector is fresh and updated. The micro-service data gateway may be positioned near the UE at a network edge of the core network and/or in part implemented within the UE.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Inventors: Lyle Walter PACZKOWSKI, Marouane BALMAKHTAR, Galip Murat KARABULUT, Carl PERSSON
  • Publication number: 20230354143
    Abstract: Systems and methods are provided for rapid user equipment route selection policy rule processing. A method includes determining an applicable routing policy based on user equipment route selection policy (URSP) rules for an established protocol data unit (PDU) session and storing PDU session information with the established uplink PDU session in a cache. The method further includes examining subsequent uplink packets for PDU session information and checking the cache for an established PDU session with matching uplink PDU session information. The method additionally includes routing the subsequent uplink packets to the established PDU session having the matching PDU session information, causing the subsequent uplink packet to be processed in accordance with the applicable routing policy as previously determined based on the URSP rules.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Inventors: Gregory SCHUMACHER, Marouane BALMAKHTAR, Serge MANNING