Patents by Inventor Samson Kwong
Samson Kwong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11075946Abstract: A Honeypot Adaptive Security (HAS) system is described that determines whether a pre-loaded partner or third-party (PP-TP) application executed on a client device has gained over-privileged access to confidential client or network (CCN) data, or over-privileged use of client account features or information provided by a telecommunications service provider. The HAS system is configured to retrieve client data associated with a PP-TP application executed on the client device, retrieve policy rules associated with the PP-TP application, generate a PP-TP application data model to determine a probability of the PP-TP application gaining over-privileged access to CCN data or over-privileged use of client account features on a client device. Responsive to the determined probability, the HAS system is configured to deploy a solution data package to the client device that resolves the instance of over-privileged access or over-privileged use.Type: GrantFiled: December 19, 2017Date of Patent: July 27, 2021Assignee: T-MOBILE USA, Inc.Inventors: Peter Myron, Samson Kwong, Michael Mitchell
-
Patent number: 10496363Abstract: A voice user interface (VUI) may be deployed for accessing data that are stored in databases of a telecommunications network. A voice command received at a voice interface device connected to a telecommunications network may be converted into a persistent data representation via a speech interpretation engine. The persistent data representation is sent to an intent mapping service that maps persistent data representations to intermediate command representations. In turn, a command interpreter of the telecommunications network may receive the intermediate command representation from the intent mapping service. The command interpreter may translate the intermediate command representation into a database function command via a command interpreter of the telecommunications network.Type: GrantFiled: June 16, 2017Date of Patent: December 3, 2019Assignee: T-Mobile USA, Inc.Inventors: Samson Kwong, Peter Myron, Michael Mitchell
-
Patent number: 10334415Abstract: A voice user interface (VUI) may be deployed for controlling network components and devices of a telecommunications network. A voice command received at a voice interface device connected to a telecommunications network may be converted into a persistent data representation via a speech interpretation engine. The persistent data representation is sent to an intent mapping service that maps persistent data representations to intermediate command representations. In turn, a command interpreter of the telecommunications network may receive the intermediate command representation from the intent mapping service. The command interpreter may translate the intermediate command representation into an action command for performing a task with respect to network components or devices of the telecommunications network. The action command may be executed via a controller interface of the telecommunications network with respect to the network components or the devices of the telecommunication network.Type: GrantFiled: June 16, 2017Date of Patent: June 25, 2019Assignee: T-Mobile USA, Inc.Inventors: Samson Kwong, Peter Myron, Michael Mitchell
-
Publication number: 20190190951Abstract: A Honeypot Adaptive Security (HAS) system is described that determines whether a pre-loaded partner or third-party (PP-TP) application executed on a client device has gained over-privileged access to confidential client or network (CCN) data, or over-privileged use of client account features or information provided by a telecommunications service provider. The HAS system may selectively generate and deploy a policy solution or transmit an alert to address instances of over-privileged access or over-privileged use. The HAS system may retrieve client data associated with a PP-TP application executed on the client device, and further develop a PP-TP application data model to determine a probability of the PP-TP application gaining over-privileged access to CCN data or over-privileged use of client account features on a client device.Type: ApplicationFiled: December 19, 2017Publication date: June 20, 2019Inventors: Peter Myron, Samson Kwong, Michael Mitchell
-
Publication number: 20180367941Abstract: A voice user interface (VUI) may be deployed for controlling network components and devices of a telecommunications network. A voice command received at a voice interface device connected to a telecommunications network may be converted into a persistent data representation via a speech interpretation engine. The persistent data representation is sent to an intent mapping service that maps persistent data representations to intermediate command representations. In turn, a command interpreter of the telecommunications network may receive the intermediate command representation from the intent mapping service. The command interpreter may translate the intermediate command representation into an action command for performing a task with respect to network components or devices of the telecommunications network. The action command may be executed via a controller interface of the telecommunications network with respect to the network components or the devices of the telecommunication network.Type: ApplicationFiled: June 16, 2017Publication date: December 20, 2018Inventors: Samson Kwong, Peter Myron, Michael Mitchell
-
Publication number: 20180364975Abstract: A voice user interface (VUI) may be deployed for accessing data that are stored in databases of a telecommunications network. A voice command received at a voice interface device connected to a telecommunications network may be converted into a persistent data representation via a speech interpretation engine. The persistent data representation is sent to an intent mapping service that maps persistent data representations to intermediate command representations. In turn, a command interpreter of the telecommunications network may receive the intermediate command representation from the intent mapping service. The command interpreter may translate the intermediate command representation into a database function command via a command interpreter of the telecommunications network.Type: ApplicationFiled: June 16, 2017Publication date: December 20, 2018Inventors: Samson Kwong, Peter Myron, Michael Mitchell
-
Patent number: 10146658Abstract: The power consumption of a user device may be monitored as an application on the user device performs one or more actions. Device commands for the user device and monitoring commands for a power monitor may be generated based on a script. The script is created to trigger an application on a user device to perform one or more actions while power consumption of the user device is monitored. The device commands are sent to the application on the user device to trigger the application to perform the one or more actions. The monitoring commands are sent to the power monitor to command the power monitor to track the power consumption of the use device as the application performs one or more actions. Subsequently, power consumption data for the user device are received from the power monitor, and device event data are received from the user device for analysis.Type: GrantFiled: July 15, 2016Date of Patent: December 4, 2018Assignee: T-Mobile USA, Inc.Inventors: Zachary McPherson, Kranthi Sontineni, Jie Hui, Samson Kwong
-
Publication number: 20170017295Abstract: The power consumption of a user device may be monitored as an application on the user device performs one or more actions. Device commands for the user device and monitoring commands for a power monitor may be generated based on a script. The script is created to trigger an application on a user device to perform one or more actions while power consumption of the user device is monitored. The device commands are sent to the application on the user device to trigger the application to perform the one or more actions. The monitoring commands are sent to the power monitor to command the power monitor to track the power consumption of the use device as the application performs one or more actions. Subsequently, power consumption data for the user device are received from the power monitor, and device event data are received from the user device for analysis.Type: ApplicationFiled: July 15, 2016Publication date: January 19, 2017Inventors: Zachary McPherson, Kranthi Sontineni, Jie Hui, Samson Kwong