Patents by Inventor Senthil Kumar Mulluppadi Velusamy

Senthil Kumar Mulluppadi Velusamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200021585
    Abstract: A network terminal, e.g., a smartphone, can retrieve, from a datastore, a cryptographically-signed configuration record including a device identifier of the terminal. The terminal can transmit a request message comprising the configuration record and the device identifier. A network device can verify authenticity of the device identifier and a match between the identifier in the record and the identifier in the message. In response to confirmation of the request by a policy engine, the network device can determine a reply message comprising a cryptographically-signed second configuration record that includes a second device identifier. The terminal can verify that the signature is valid and that the second device identifier matches the device identifier. In response, the terminal can modify data in the datastore according to the second configuration record. The configuration record can lock or unlock the terminal, or determine permitted services or network peers.
    Type: Application
    Filed: September 26, 2019
    Publication date: January 16, 2020
    Inventors: Poornima Magadevan, Jeffrey Song, Mathew George, Senthil Kumar Mulluppadi Velusamy, Cristian Asandului, Thomas P. Lucht, Shelby Seward, Phani Ramisetty, Yasmin Karimli
  • Patent number: 10505916
    Abstract: Techniques are described for using two tokens to request access to a secure server. The tokens allow the server to verify, without an external call, that the requesting device is one identified in the request and that the requesting device is authorized by a trusted identity provider. A first token is an authentication token issued by the trusted identity provider and including a client device public key. The second token is a proof-of-possession token that is signed by a client device using a client device private key corresponding to the client device public key. The server obtains the client device public key from the authentication token, and then uses the client device public key to validate the proof-of-possession token. The authentication token can be re-used by a server creating its own proof-of-possession token for presentation to a second server to access a secure service on the second server.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: December 10, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Michael Engan, Douglas McDorman, Senthil Kumar Mulluppadi Velusamy, Komethagan Subramaniam
  • Patent number: 10476875
    Abstract: A network terminal, e.g., a smartphone, can retrieve, from a datastore, a cryptographically-signed configuration record including a device identifier of the terminal. The terminal can transmit a request message comprising the configuration record and the device identifier. A network device can verify authenticity of the device identifier and a match between the identifier in the record and the identifier in the message. In response to confirmation of the request by a policy engine, the network device can determine a reply message comprising a cryptographically-signed second configuration record that includes a second device identifier. The terminal can verify that the signature is valid and that the second device identifier matches the device identifier. In response, the terminal can modify data in the datastore according to the second configuration record. The configuration record can lock or unlock the terminal, or determine permitted services or network peers.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: November 12, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Poornima Magadevan, Jeffrey Song, Mathew George, Senthil Kumar Mulluppadi Velusamy, Cristian Asandului, Thomas P. Lucht, Shelby Seward, Phani Ramisetty, Yasmin Karimli
  • Patent number: 10341871
    Abstract: Mobile security techniques may protect information stored on a subscriber identity module (SIM) card as well as services that are accessible through the SIM card from unauthorized use. The techniques include receiving a service request to perform a security function at a server. The security function may affect a service provided to a mobile device by a telecommunication network, in which the mobile device obtains the service using a SIM card. The techniques further include performing the security function. The performance of the SIM function may be terminated in response to the server receiving a reversion command or an expiration of a predetermined time period.
    Type: Grant
    Filed: September 10, 2018
    Date of Patent: July 2, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Steven S. Farsai
  • Patent number: 10292057
    Abstract: A telecommunication device configured to build a list of cells of a telecommunication network that are associated with a specific network type is described herein. The list of cells may be stored locally on the telecommunication device. Also, the telecommunication device may be configured to determine that the cells are associated with the specific network type based on a data connection and to continue displaying an indicator associated with the specific network type despite interruption or completion of the data connection. Additionally, the list of cells may be built by a cloud service and provided to the telecommunication device.
    Type: Grant
    Filed: February 4, 2011
    Date of Patent: May 14, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Uday Reddy Dodla
  • Publication number: 20190124070
    Abstract: Techniques are described for using two tokens to request access to a secure server. The tokens allow the server to verify, without an external call, that the requesting device is one identified in the request and that the requesting device is authorized by a trusted identity provider. A first token is an authentication token issued by the trusted identity provider and including a client device public key. The second token is a proof-of-possession token that is signed by a client device using a client device private key corresponding to the client device public key. The server obtains the client device public key from the authentication token, and then uses the client device public key to validate the proof-of-possession token. The authentication token can be re-used by a server creating its own proof-of-possession token for presentation to a second server to access a secure service on the second server.
    Type: Application
    Filed: October 19, 2017
    Publication date: April 25, 2019
    Inventors: Michael Engan, Douglas McDorman, Senthil Kumar Mulluppadi Velusamy, Komethagan Subramaniam
  • Patent number: 10225413
    Abstract: A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
    Type: Grant
    Filed: September 22, 2017
    Date of Patent: March 5, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau
  • Publication number: 20190069177
    Abstract: A secure device access token allows a server to verify that a device presenting the token for access to the server is an authorized device and that an application presenting the token is an authorized application as it purports to be. The secure device access token is unique to the device and to the application attempting to access the server. The secure device access token differs from a bearer token in that it is unique to the device and to the application.
    Type: Application
    Filed: August 22, 2017
    Publication date: February 28, 2019
    Inventors: Michael Engan, Douglas McDorman, Senthil Kumar Mulluppadi Velusamy
  • Publication number: 20190007840
    Abstract: Mobile security techniques may protect information stored on a subscriber identity module (SIM) card as well as services that are accessible through the SIM card from unauthorized use. The techniques include receiving a service request to perform a security function at a server. The security function may affect a service provided to a mobile device by a telecommunication network, in which the mobile device obtains the service using a SIM card. The techniques further include performing the security function. The performance of the SIM function may be terminated in response to the server receiving a reversion command or an expiration of a predetermined time period.
    Type: Application
    Filed: September 10, 2018
    Publication date: January 3, 2019
    Inventors: Senthil Kumar Mulluppadi Velusamy, Steven S. Farsai
  • Publication number: 20180367677
    Abstract: A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.
    Type: Application
    Filed: August 27, 2018
    Publication date: December 20, 2018
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau
  • Publication number: 20180309754
    Abstract: A network terminal, e.g., a smartphone, can retrieve, from a datastore, a cryptographically-signed configuration record including a device identifier of the terminal. The terminal can transmit a request message comprising the configuration record and the device identifier. A network device can verify authenticity of the device identifier and a match between the identifier in the record and the identifier in the message. In response to confirmation of the request by a policy engine, the network device can determine a reply message comprising a cryptographically-signed second configuration record that includes a second device identifier. The terminal can verify that the signature is valid and that the second device identifier matches the device identifier. In response, the terminal can modify data in the datastore according to the second configuration record. The configuration record can lock or unlock the terminal, or determine permitted services or network peers.
    Type: Application
    Filed: August 4, 2017
    Publication date: October 25, 2018
    Inventors: Poornima Magadevan, Jeffrey Song, Mathew George, Senthil Kumar Mulluppadi Velusamy, Cristian Asandului, Thomas P. Lucht, Shelby Seward, Phani Ramisetty, Yasmin Karimli
  • Patent number: 10091363
    Abstract: A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: October 2, 2018
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau
  • Patent number: 10075848
    Abstract: Mobile security techniques may protect information stored on a subscriber identity module (SIM) card as well as services that are accessible through the SIM card from unauthorized use. The techniques include receiving a service request to perform a security function at a server. The security function may affect a service provided to a mobile device by a telecommunication network, in which the mobile device obtains the service using a SIM card. The techniques further include performing the security function. The performance of the SIM function may be terminated in response to the server receiving a reversion command or an expiration of a predetermined time period.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: September 11, 2018
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Steven S. Farsai
  • Publication number: 20180013898
    Abstract: A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
    Type: Application
    Filed: September 22, 2017
    Publication date: January 11, 2018
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau
  • Patent number: 9813399
    Abstract: System and method of unlocking a user device. A carrier unlock request is received for a user device that may have an unlock application that has been deactivated or flashed. One or more verifications are performed to determine whether the user device is eligible for the carrier unlock requested. Upon determining that the user device is eligible for the carrier unlock, an unlock command is sent to either the user device or an alternate computing device that initiated the unlock request. The unlock command is operative to disable a comparison of a device carrier code of the user device to a subscriber identity module (SIM) carrier code stored in a SIM card of the user device. In various embodiments, the unlock command may be sent either directly to the modem of the user device via USSD or as a QR code to the alternate computing device.
    Type: Grant
    Filed: September 17, 2015
    Date of Patent: November 7, 2017
    Assignee: T-Mobile USA, Inc.
    Inventor: Senthil Kumar Mulluppadi Velusamy
  • Patent number: 9813976
    Abstract: A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: November 7, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau
  • Patent number: 9807607
    Abstract: A device unlock application on a user device may interact with a server to automatically carrier unlock the user device. The server may receive a carrier unlock request for a user device. The server may determine one or more verifications to be performed based at least on a unlock scenario requested by the carrier unlock request. The server may perform the one or more verifications to determine whether the user device is eligible for a carrier unlock. The server may send a unlock command to the user device in response to determining that the user device is eligible for the carrier unlock. The unlock command may disable a comparison of a device carrier code of the user device to a subscriber identity module (SIM) carrier code stored in a SIM card of the user device.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: October 31, 2017
    Assignee: T-Mobile USA, Inc.
    Inventor: Senthil Kumar Mulluppadi Velusamy
  • Patent number: 9801118
    Abstract: A wireless local area network (WLAN) management procedure for a telecommunication device is disclosed. A WLAN management entity is operable to detect a communication event associated with a voice call, a video call, or a data transfer session, and then determine a current state of a cellular network. When the current state of the cellular network is deemed problematic, is otherwise unavailable, and/or when an alternative, higher-throughput WLAN is available, the WLAN management entity identifies available WLANs for enabling the corresponding communication. Subsequently, the WLAN management entity generates a notification, presenting an option for selecting an available WLAN, based in part on the current state of the cellular network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: October 24, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Omar Hassan, Senthil Kumar Mulluppadi Velusamy
  • Patent number: 9749827
    Abstract: Techniques for auto-populating emergency geo-location address information are described. Instances of geo-location address information may be acquired from a variety of different sources. The instances of geo-location address information may be prioritized based at least in part on each one's respective source. A candidate geo-location address may be determined and may be used to auto-populate emergency address information.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: August 29, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Senthil Kumar Mulluppadi Velusamy, Omar Hassan
  • Publication number: 20170230900
    Abstract: A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
    Type: Application
    Filed: March 28, 2016
    Publication date: August 10, 2017
    Inventors: Senthil Kumar Mulluppadi Velusamy, Kevin Lau