Patents by Inventor Mikhail Istomin
Mikhail Istomin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240334508Abstract: Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.Type: ApplicationFiled: June 11, 2024Publication date: October 3, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Lars Benjamin Johnson, Wei Wang, Rachel Rosencrantz, Mikhail Istomin
-
Patent number: 12095771Abstract: A system allows for higher security guarantees on public or shared or even compromised equipment, which may be designated as untrusted equipment, without a need to install additional software on it or connect to it outside of general browser interactions. Based on this system, even if it is compromised, proper information separation may ensure security of the sensitive parts of data. That is, trusted information will only go to (outputs) or come from (inputs) trusted devices and insensitive information can go to or come from both trusted and untrusted devices.Type: GrantFiled: August 10, 2021Date of Patent: September 17, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Mikhail Istomin, Wei Wang
-
Publication number: 20240235839Abstract: Aspects of the subject disclosure may include, for example, detecting a need to verify an identity of a particular user in the metaverse, obtaining a particular hash/encoding associated with the particular user, wherein the particular hash/encoding is generated based on processing of a video, image, voice recording, or biometric information associated with the particular user, retrieving a second hash/encoding from a user profile of a first user, wherein the second hash/encoding corresponds to a second user and is generated based on processing of a video, image, voice recording, or biometric information associated with the second user, performing a comparison of the second hash/encoding and the particular hash/encoding, and based on a determination that there is a match, identifying that the particular user corresponds to the second user, resulting in a verification of the identity of the particular user. Other embodiments are disclosed.Type: ApplicationFiled: October 25, 2022Publication date: July 11, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Patent number: 12035385Abstract: Aspects of the subject disclosure may include, for example, a device including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of facilitating establishment of a communications path between an open device and a remote device through a communications network; receiving an indication of potentially sensitive information on the communications path; and facilitating establishment of a secure communications path between a secure device and the remote device through the communications network. Other embodiments are disclosed.Type: GrantFiled: January 12, 2022Date of Patent: July 9, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Lars Benjamin Johnson, Wei Wang, Rachel Rosencrantz, Mikhail Istomin
-
Publication number: 20240223598Abstract: Concepts and technologies disclosed herein are directed to using proof of work for preventing distributed denial of server (“DDOS”) attacks. A server system can receive a resource request from a client system. The resource request can specify a resource. The server system can determine a congestion level based upon a load metric and a threshold. In response to determining that the load metric is above the threshold, the server system can determine that the congestion level is indicative of a high demand period. In response to the resource request being received during the high demand period, the server system can provide a work assignment to the client system. The server system can receive work results for the work assignment sent to the client system. In response to receiving the work results, the server system can process the resource request and can send the resource to the client system.Type: ApplicationFiled: December 28, 2022Publication date: July 4, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Mikhail Istomin, Paul Giura
-
Publication number: 20240223567Abstract: According to one aspect of the concepts and technologies disclosed herein, a system can separate permissions, rules, and controls into a discrete intermediate layer of a universal conceptual control management hierarchy as control objects. The system can define at least one interaction for each of the control objects. The system can assign resources to the control objects. A first control object of the control objects can be a low-level control object that encompasses the at least one interaction with a specific resource of the resources. A second control object of the control objects can be a sub-object of the first control object. The second control object can have a restriction. The restriction can be applied on top of the second control object. The restriction alternatively can be chained to the second control object with an additional restriction.Type: ApplicationFiled: December 28, 2022Publication date: July 4, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Mikhail Istomin, Wei Wang
-
Patent number: 12021841Abstract: Aspects of the subject disclosure may include, for example, identifying a first sensitivity level associated with a first data item, comparing the first sensitivity level to a first threshold, resulting in a first comparison, selecting a first device based on the first comparison, transmitting the first data item to the first device based on the selecting of the first device, identifying a second sensitivity level associated with a second data item, wherein the second sensitivity level is different from the first sensitivity level, comparing the second sensitivity level to a second threshold, resulting in a second comparison, selecting a second device based on the second comparison, wherein the second device is different from the first device, and transmitting the second data item to the second device based on the selecting of the second device. Other embodiments are disclosed.Type: GrantFiled: October 1, 2021Date of Patent: June 25, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Lars Benjamin Johnson, Wei Wang, Mikhail Istomin, Rachel Rosencrantz
-
Publication number: 20240195753Abstract: A processing system may obtain a specification for a cloud computing project, including an identity of an organizer of the cloud computing project and at least one topic. The processing system may apply the specification as inputs to a graph neural network implemented by the processing system, the graph neural network associated with a graph having nodes associated with entities comprising: users and computing resources, the graph having edges comprising relationships between the entities, and the graph neural network configured to output a recommended set of resources for the cloud computing project. The recommended set of resources may include at least one recommended computing resource and at least one recommended participant. The processing system may then provide a notification of the recommended set of resources to the organizer and provide an initial set of computing resources for the cloud computing project in accordance with a selection of the organizer.Type: ApplicationFiled: December 9, 2022Publication date: June 13, 2024Inventors: Wei Wang, Mikhail Istomin
-
Publication number: 20240169051Abstract: The concepts and technologies disclosed herein are directed to providing a split ledger for securing extended reality (“XR”) environments. According to one aspect, an XR server computer can create an XR environment. The XR server computer can cause a passed ledger to be populated with an environment ID associated with the XR environment. The XR server computer can cause a hash ledger to be populated with a first hash of the environment ID. The XR server computer can register a user for participating in the XR environment and can cause the passed ledger to be populated with a user-created block associated with the user. The XR server computer can cause the hash ledger to be further populated with a second hash of the user-created block. The XR server computer can allow a user avatar associated with the user to join the XR environment.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Publication number: 20240169052Abstract: The concepts and technologies disclosed herein are directed to on-demand trusted extended reality (“XR”) environments. According to one aspect disclosed herein, a user device can create a trusted list identifying at least one trusted XR environment. The user device can connect to an untrusted XR server computer and can allow a user avatar associated with a user to enter an untrusted XR environment provided by the untrusted XR server. The user device can detect an event for which a trusted XR environment is desired. The user device can select the trusted XR environment to handle the event. The user device can select the trusted XR environment from the trusted list. The user device can instruct the untrusted XR server computer to teleport the user avatar from the untrusted XR environment to the trusted XR environment.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Mikhail Istomin, Lars Johnson, Rachel Rosencrantz
-
Publication number: 20240169363Abstract: An extended reality (“XR”) server computer can identify a plurality of XR objects present in an XR environment. The XR server computer can determine an owner for an XR object of the plurality of XR objects. The XR server computer can visually differentiate, based on the owner, the extended reality object from other extended reality objects of the plurality of extended reality objects. The XR environment can be a virtual reality (“VR”) environment, an augmented reality (“AR”) environment, or a mixed reality environment. The XR server computer can create an ownership chain for the owner. The XR server computer can assign the XR object and at least one additional XR object to the ownership chain. The XR server computer can receive a request to transfer ownership of the XR object and can commit the transfer from a source ownership chain to a destination ownership chain.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Mikhail Istomin, Lars Johnson, Rachel Rosencrantz
-
Publication number: 20240161414Abstract: Aspects of the subject disclosure may include, for example providing virtual links and/or virtual content to metaverse users based at least in part on the metaverse user's physical location and/or viewing direction. Low resolution images of physical objects expected to be in a field of view of a metaverse user may be matched to actual images of physical objects in a metaverse user's field of view prior to providing virtual links and/or virtual content. Other embodiments are disclosed.Type: ApplicationFiled: November 15, 2022Publication date: May 16, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Publication number: 20240146551Abstract: Aspects of the subject disclosure may include, for example, associating a link of a non-fungible token (NFT) metaverse communication device to provisioning data of a service account of non-virtual user equipment, receiving a communication request, detecting the NFT metaverse communication device is available for use in a metaverse system, and initiating communications with the NFT metaverse communication device via the metaverse system. Other embodiments are disclosed.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Publication number: 20240137223Abstract: Aspects of the subject disclosure may include, for example, detecting a need to verify an identity of a particular user in the metaverse, obtaining a particular hash/encoding associated with the particular user, wherein the particular hash/encoding is generated based on processing of a video, image, voice recording, or biometric information associated with the particular user, retrieving a second hash/encoding from a user profile of a first user, wherein the second hash/encoding corresponds to a second user and is generated based on processing of a video, image, voice recording, or biometric information associated with the second user, performing a comparison of the second hash/encoding and the particular hash/encoding, and based on a determination that there is a match, identifying that the particular user corresponds to the second user, resulting in a verification of the identity of the particular user. Other embodiments are disclosed.Type: ApplicationFiled: October 24, 2022Publication date: April 25, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Publication number: 20240118784Abstract: Aspects of the subject disclosure may include, for example, obtaining, by a processing system including a processor, an indication of an assertion involving a first avatar of a first user, assessing, by the processing system and based on the obtaining, a validity of the assertion relative to a threshold, and authorizing, by the processing system and based on the assessing, a first action to be taken by the first avatar, a second action to be taken by a second avatar of a second user, or a combination thereof. Other embodiments are disclosed.Type: ApplicationFiled: October 6, 2022Publication date: April 11, 2024Applicant: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz
-
Patent number: 11921880Abstract: Aspects of the subject disclosure may include, for example, a method for training a deep learning model that includes encoding a content item; generating a blended image by combining a background image and the encoded content; decoding the blended image to generate decoded content corresponding to the content item; and defining or specifying a loss function related to the deep learning model. The method also includes determining values of training parameters for the deep learning model to minimize the loss function, thereby obtaining a trained deep learning model. The method also includes an information concealing procedure using the trained deep learning model to conceal user content by encoding the user content and blending the encoded user content with a user-selected image; the information concealing procedure is substantially independent of the user-selected image. Other embodiments are disclosed.Type: GrantFiled: August 11, 2022Date of Patent: March 5, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Mikhail Istomin
-
Patent number: 11902315Abstract: A method for privacy preserving vulnerability detection for devices. In an example, an apparatus may include a processor and memory coupled with the processor that effectuates operations. The operations may include receiving a type of a device; receiving a feature for the device; creating a first hash value based on the device type and the feature; receiving an indication that the first hash value matches a second hash value; and based on the indication that the first hash value matches the second hash function, sending an alert that the device has a vulnerability.Type: GrantFiled: September 3, 2021Date of Patent: February 13, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Mikhail Istomin
-
Publication number: 20230353547Abstract: A processing system may obtain a first source data and encoding the first source data in accordance with a first key via an encoder associated with an encoder-decoder model to generate a first source data encoding that is a first output of the encoder and a second key that is a second output of the encoder. The processing system may then transmit the first source data encoding to a recipient system, where the second key is for generating a second source data encoding for transmission by the processing system to the recipient system. A processing system may also obtain a first encoded source data from a sending system, apply the first encoded source data and a first key as inputs to a decoder associated with an encoder-decoder model to obtain a first decoded source data and a second key as outputs, and present the first decoded source data.Type: ApplicationFiled: April 28, 2022Publication date: November 2, 2023Inventors: Wei Wang, Mikhail Istomin
-
Publication number: 20230276222Abstract: Aspects of the subject disclosure may include, for example, receiving, from a computing device, a user request to perform a subscriber identity module (SIM) swap for a subscriber, wherein the computing device and a user device are accessible to a user, based on the receiving the user request, generating a code for the SIM swap, resulting in a generated code, providing the generated code to the computing device for presentation, obtaining, from the user device, data associated with the user, the user device, or a combination thereof, facilitating user authentication responsive to the obtaining the data, detecting a transmission of a particular code from the user device, resulting in a detected code, and, based on the detecting the transmission and based on the facilitating the user authentication, performing an action relating to the SIM swap. Other embodiments are disclosed.Type: ApplicationFiled: January 28, 2022Publication date: August 31, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Lars Benjamin Johnson, Wei Wang, Rachel Rosencrantz, Mikhail Istomin
-
Publication number: 20230247097Abstract: Aspects of the subject disclosure may include, for example, receiving a request to initiate an interactive session involving a first user device and a second user device, initiating the interactive session, performing a split of inputs or outputs by determining a first set of inputs or outputs for the first user device and a second set of inputs or outputs for the second user device, such that first data in the interactive session that is permitted to be outputted only to the first user device is accessible to the first user device but not to the second user device and such that second data that is permitted to be outputted only to the second user device is accessible to the second user device but not to the first user device, and facilitating the interactive session based on the split of inputs or outputs. Other embodiments are disclosed.Type: ApplicationFiled: February 3, 2022Publication date: August 3, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Lars Benjamin Johnson, Mikhail Istomin, Rachel Rosencrantz, Wei Wang