Patents by Inventor Samson Kim-Sun Kwong

Samson Kim-Sun Kwong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180365133
    Abstract: A system for testing a network-based application has a continuous integration (CI) service that performs CI testing of a server application that is being developed to support a client application, such as a client application that will be used on a wireless communication device. The CI service detects server source code changes and in response rebuilds the server application and deploys it to a test server. In addition, the client application is installed and executed on one or more wireless communication devices, so that the client application communicates with the test server using a wireless communications network. Tests of the client application are performed as it executes on the devices, and results are reported to the CI service. The CI service reports any errors that occurred during testing of either the server application or the client application.
    Type: Application
    Filed: June 14, 2017
    Publication date: December 20, 2018
    Inventors: Michael J. Mitchell, Peter P. Myron, Samson Kim-Sun Kwong
  • Publication number: 20180115524
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: October 30, 2017
    Publication date: April 26, 2018
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20180088970
    Abstract: A mapping application determines locations of user interfaces (UIs) within content. Upon determining locations of UIs within the content, the mapping application evaluates the UIs to determine where within the content the UI will lead a user when the UI is activated. For example, the mapping application determines a first location where a first UI will take the user within the content when the first UI is activated. At this first location, the mapping application determines a second location where a second UI located at the first location will take the user when the second UI is activated. Based upon determining where the UIs will take a user within the content when the UIs are activated, the mapping application generates a flow diagram of the content that maps one or more UI paths within the content.
    Type: Application
    Filed: September 29, 2016
    Publication date: March 29, 2018
    Inventors: Michael J. Mitchell, Peter P. Myron, Samson Kim-Sun Kwong
  • Patent number: 9843948
    Abstract: A telecommunication carrier may use data collected from user devices to pinpoint sources of data interruptions in the communication connection between a carrier network and the user devices. The telecommunication carrier may receive multiple reports of detected data interruptions at one or more computing devices of a carrier network. The detected data interruptions include a data interruption to a user device that is detected by an agent application on the user device that monitors of at least one of an audio pathway or a video pathway of the user device. The telecommunication carrier may aggregate data interruption information from the multiple reports of the detected data interruptions, and analyze the data interruption information to pinpoint one or more sources of a detected data interruption.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: December 12, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Jie Hui, Yunhan Jia, Suchit Satpathy, Kevin Lau, Kranthi Sontineni, Samson Kim-Sun Kwong
  • Patent number: 9807058
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: October 31, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20170005989
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: September 21, 2015
    Publication date: January 5, 2017
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20160277952
    Abstract: A telecommunication carrier may use data collected from user devices to pinpoint sources of data interruptions in the communication connection between a carrier network and the user devices. The telecommunication carrier may receive multiple reports of detected data interruptions at one or more computing devices of a carrier network. The detected data interruptions include a data interruption to a user device that is detected by an agent application on the user device that monitors of at least one of an audio pathway or a video pathway of the user device. The telecommunication carrier may aggregate data interruption information from the multiple reports of the detected data interruptions, and analyze the data interruption information to pinpoint one or more sources of a detected data interruption.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Jie Hui, Yunhan Jia, Suchit Satpathy, Kevin Lau, Kranthi Sontineni, Samson Kim-Sun Kwong
  • Publication number: 20150326447
    Abstract: The techniques described herein involve analysis of client device Quality of Experience diagnostic files including an operations log or diagnostic files for a client device. The client device Quality of Experience diagnostic files may be generated by a client device and sent to a network node for analysis. The diagnostic files may be analyzed to determine device Key Performance Indicators and a device Quality of Experience, and to determine a root cause of a network problem (such as dropped calls) leading to a diminished Quality of Experience. In some embodiments, the diagnostic files may be aggregated to form a database of aggregated diagnostics, which can be used to further analyze a network to determine the root cause of a network problem. In some embodiments, the aggregated diagnostics may be indexed according to location, time, device type, device problem, or access technology.
    Type: Application
    Filed: July 20, 2015
    Publication date: November 12, 2015
    Inventors: Jong Sung Yoon, Jie Hui, Kranthi Sontineni, Samson Kim-Sun Kwong, Kevin Lau