Patents by Inventor Serge Manning

Serge Manning has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12294929
    Abstract: Systems and methods are provided for rapid user equipment route selection policy rule processing. A method includes determining an applicable routing policy based on user equipment route selection policy (URSP) rules for an established protocol data unit (PDU) session and storing PDU session information with the established uplink PDU session in a cache. The method further includes examining subsequent uplink packets for PDU session information and checking the cache for an established PDU session with matching uplink PDU session information. The method additionally includes routing the subsequent uplink packets to the established PDU session having the matching PDU session information, causing the subsequent uplink packet to be processed in accordance with the applicable routing policy as previously determined based on the URSP rules.
    Type: Grant
    Filed: May 2, 2022
    Date of Patent: May 6, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Gregory Schumacher, Marouane Balmakhtar, Serge Manning
  • Publication number: 20250142507
    Abstract: A method to trigger, by a RAN, a secure edge (SE) connection service over the RAN between a known user equipment (UE) and an SE application server is disclosed. The method comprises the RAN enabling an SE connection service. Responsive to the UE's registration request, the RAN registers the UE and loads associated user subscription data into a session manager (SM). Based on this data, an SE connection is configured within the RAN, and the SM establishes a PDU session between the UE and the SM by establishing a secure path between the UE and the SE application server over the configured SE connection between the UE and the RAN. The SM informs the UE of a resolver. After PDU session establishment, the resolver receives a resolution request from the UE and responds by sending an IP address directing the UE over the secure path to the SE application server.
    Type: Application
    Filed: October 30, 2023
    Publication date: May 1, 2025
    Inventors: Marouane BALMAKHTAR, Serge MANNING
  • Publication number: 20250133405
    Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.
    Type: Application
    Filed: December 30, 2024
    Publication date: April 24, 2025
    Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
  • Patent number: 12218958
    Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.
    Type: Grant
    Filed: September 6, 2022
    Date of Patent: February 4, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Serge Manning, Gregory Schumacher
  • Patent number: 12219361
    Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.
    Type: Grant
    Filed: June 16, 2023
    Date of Patent: February 4, 2025
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Patent number: 12200495
    Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: January 14, 2025
    Assignee: T-Mobile USA, Inc.
    Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
  • Patent number: 12108244
    Abstract: Systems, methods, and processing nodes for managing a wireless communication session perform and/or comprise: receiving a privacy enable request from an application associated with a wireless communication device; masking an application identifier corresponding to the application, thereby to generate a masked application identifier; receiving an application attribute request from a route selection manager, the application attribute request including a request for the application identifier; and in response to the privacy enable request and the application attribute request, returning an application attribute request response to the route selection manager, the application attribute request including the masked application identifier.
    Type: Grant
    Filed: December 8, 2021
    Date of Patent: October 1, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Gregory Schumacher, Marouane Balmakhtar, Serge Manning
  • Publication number: 20240171980
    Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.
    Type: Application
    Filed: November 18, 2022
    Publication date: May 23, 2024
    Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
  • Publication number: 20240080323
    Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.
    Type: Application
    Filed: September 6, 2022
    Publication date: March 7, 2024
    Inventors: Marouane BALMAKHTAR, Serge MANNING, Gregory SCHUMACHER
  • Publication number: 20230403304
    Abstract: A method of testing a communication system implementing a zero trust architecture. The method comprises sending a request by a test equipment platform to access a microsegment to a policy enforcement point (PEP); sending an authorization request by the PEP to a policy decision point (PDP); authorizing access of the test equipment platform to the microsegment by the PDP; sending authorization of access of the test equipment platform to the microsegment by the PDP to the PEP; establishing a secure tunnel by the PEP between the test equipment platform and the microsegment; sending a command to provide test data by the test equipment platform via the secure tunnel to a probe in the microsegment; analyzing the test data by the test equipment platform; and producing a test result by the test equipment platform based on analyzing the test data.
    Type: Application
    Filed: June 9, 2022
    Publication date: December 14, 2023
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Publication number: 20230354143
    Abstract: Systems and methods are provided for rapid user equipment route selection policy rule processing. A method includes determining an applicable routing policy based on user equipment route selection policy (URSP) rules for an established protocol data unit (PDU) session and storing PDU session information with the established uplink PDU session in a cache. The method further includes examining subsequent uplink packets for PDU session information and checking the cache for an established PDU session with matching uplink PDU session information. The method additionally includes routing the subsequent uplink packets to the established PDU session having the matching PDU session information, causing the subsequent uplink packet to be processed in accordance with the applicable routing policy as previously determined based on the URSP rules.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Inventors: Gregory SCHUMACHER, Marouane BALMAKHTAR, Serge MANNING
  • Publication number: 20230337001
    Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.
    Type: Application
    Filed: June 16, 2023
    Publication date: October 19, 2023
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Patent number: 11751058
    Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.
    Type: Grant
    Filed: January 14, 2022
    Date of Patent: September 5, 2023
    Assignee: T-Mobile Innovations LLC
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Publication number: 20230232236
    Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.
    Type: Application
    Filed: January 14, 2022
    Publication date: July 20, 2023
    Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
  • Patent number: 9271197
    Abstract: An embodiment method for session handling for a connection between an UE and a network includes establishing, at a first distributed EPC, user and IP sessions over the connection through the first distributed EPC. The first distributed EPC includes a first PGW at which the IP session is anchored. The method also includes holding original IP resources and releasing original connection resources for the sessions at the first distributed EPC when the UE moves beyond the first distributed EPC to a second distributed EPC. The method then establishes a tunnel between the first PGW and a second PGW for the second distributed EPC. The tunnel utilizes the original IP resources and new connection resources at the second distributed EPC. The method then routes data from the tunnel, through the first PGW, and to the network.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: February 23, 2016
    Assignee: Futurewei Technologies, Inc.
    Inventors: John Kaippallimalil, Hinghung Anthony Chan, Zhixian Xiang, Khosrow Tony Saboorian, Serge Manning
  • Patent number: 9001741
    Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: April 7, 2015
    Assignee: Sprint Spectrum L.P.
    Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
  • Publication number: 20140348130
    Abstract: An embodiment method for session handling for a connection between an UE and a network includes establishing, at a first distributed EPC, user and IP sessions over the connection through the first distributed EPC. The first distributed EPC includes a first PGW at which the IP session is anchored. The method also includes holding original IP resources and releasing original connection resources for the sessions at the first distributed EPC when the UE moves beyond the first distributed EPC to a second distributed EPC. The method then establishes a tunnel between the first PGW and a second PGW for the second distributed EPC. The tunnel utilizes the original IP resources and new connection resources at the second distributed EPC. The method then routes data from the tunnel, through the first PGW, and to the network.
    Type: Application
    Filed: May 21, 2014
    Publication date: November 27, 2014
    Inventors: John Kaippallimalil, Hinghung Anthony Chan, Zhixian Xiang, Khosrow Tony Saboorian, Serge Manning
  • Publication number: 20140056226
    Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.
    Type: Application
    Filed: October 29, 2013
    Publication date: February 27, 2014
    Applicant: Sprint Spectrum L.P.
    Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
  • Patent number: 8594105
    Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.
    Type: Grant
    Filed: July 12, 2011
    Date of Patent: November 26, 2013
    Assignee: Sprint Spectrum L.P.
    Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
  • Patent number: 8170529
    Abstract: A method, system, and computer-readable media are provided for determining connection needs of a mobile device connecting to a wireless network. In one aspect, the computer-readable media provide a method that includes receiving a request from a mobile device to access a wireless network, and performing an authentication phase related to the mobile device attempting to access the wireless network. Furthermore, the method includes evaluating signaling behavior of the mobile device during the authentication phase to determine which access technology from a plurality of types of access technologies to use to connect the mobile device to the wireless network. Moreover, the method includes connecting the mobile device to the wireless network using the determined access technology.
    Type: Grant
    Filed: February 8, 2007
    Date of Patent: May 1, 2012
    Assignee: Clearwire IP Holdings LLC
    Inventors: Jeremy R. Breau, Arun Santharam, Serge Manning, Reza Jafari, Shingara Dhanoa