Patents by Inventor Salvador Mendoza

Salvador Mendoza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190223070
    Abstract: An access network can allocate a bearer for a network service associated with a quality-of-service (QoS) value (QV) and a retention-priority value (RPV), and determine a bearer ID for the service based on the QV, the RPV, and a supplemental priority value (SPV) different from the QV and from the RPV. Upon handover of a terminal, session(s) carried by a bearer allocated by the terminal can be terminated. That bearer can be selected using IDs of the bearers and a comparison function that, given two bearer IDs, determines which respective bearer should be terminated before the other. Upon handover of a terminal to an access network supporting fewer bearers per terminal than the terminal has allocated, a network node can select a bearer based on respective QVs and RPVs of a set of allocated bearers. The network node can deallocate the selected bearer.
    Type: Application
    Filed: July 27, 2018
    Publication date: July 18, 2019
    Inventors: Kun Lu, Boris Antsev, Terri Brooks, Egil Gronstad, John Humbert, Alan Denis MacDonald, Salvador Mendoza, Scott Francis Migaldi, Gary Jones, Christopher H. Joul, Jun Liu, Ming Shan Kwok, Karunakalage Viraj Rakitha Silva, Neng-Tsann Ueng
  • Patent number: 10291586
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: May 14, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Patent number: 10148512
    Abstract: A system and method of optimizing video content is provided. A request for data is received by an Application Delivery Controller from a user device (UD). Upon determining that the request for data is related to video content, an operating mode message is sent to an element of the packet core network to configure the element of the packet core network to provide the video content by transmitting a predetermined volume of data of the video content in burst mode to a memory buffer of the UD. Upon completion of the burst mode, a continuation of a data related to the video content is transmitted at a trickle mode that is slower than the burst mode. The cycle continues between burst mode and trickle mode for every trigger event.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: December 4, 2018
    Assignee: T-Mobile USA, Inc.
    Inventors: Salvador Mendoza, Jeffery Smith
  • Publication number: 20180115524
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: October 30, 2017
    Publication date: April 26, 2018
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20180048524
    Abstract: A system and method of optimizing video content is provided. A request for data is received by an Application Delivery Controller from a user device (UD). Upon determining that the request for data is related to video content, an operating mode message is sent to an element of the packet core network to configure the element of the packet core network to provide the video content by transmitting a predetermined volume of data of the video content in burst mode to a memory buffer of the UD. Upon completion of the burst mode, a continuation of a data related to the video content is transmitted at a trickle mode that is slower than the burst mode. The cycle continues between burst mode and trickle mode for every trigger event.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 15, 2018
    Inventors: Salvador Mendoza, Jeffery Smith
  • Publication number: 20180020355
    Abstract: The systems, devices, and methods discussed herein are directed to redirecting mobile traffic of an infected mobile device, or user equipment (UE), to a security network node, which provides a security action for the UE. A mobile session management node may identify the UE as an infected device based on a database maintained at an intelligent redirection node or a security posture indicator received from the UE. The mobile management entity may then create a session with a security network node which redirects mobile traffic of the infected UE to the security network node and provides a security action for the UE.
    Type: Application
    Filed: April 4, 2017
    Publication date: January 18, 2018
    Inventors: Yousif Targali, Salvador Mendoza, Matthew Kirchberg
  • Patent number: 9807058
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: October 31, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20170005989
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: September 21, 2015
    Publication date: January 5, 2017
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao