Patents by Inventor Serge Manning
Serge Manning has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12294929Abstract: Systems and methods are provided for rapid user equipment route selection policy rule processing. A method includes determining an applicable routing policy based on user equipment route selection policy (URSP) rules for an established protocol data unit (PDU) session and storing PDU session information with the established uplink PDU session in a cache. The method further includes examining subsequent uplink packets for PDU session information and checking the cache for an established PDU session with matching uplink PDU session information. The method additionally includes routing the subsequent uplink packets to the established PDU session having the matching PDU session information, causing the subsequent uplink packet to be processed in accordance with the applicable routing policy as previously determined based on the URSP rules.Type: GrantFiled: May 2, 2022Date of Patent: May 6, 2025Assignee: T-Mobile Innovations LLCInventors: Gregory Schumacher, Marouane Balmakhtar, Serge Manning
-
Publication number: 20250142507Abstract: A method to trigger, by a RAN, a secure edge (SE) connection service over the RAN between a known user equipment (UE) and an SE application server is disclosed. The method comprises the RAN enabling an SE connection service. Responsive to the UE's registration request, the RAN registers the UE and loads associated user subscription data into a session manager (SM). Based on this data, an SE connection is configured within the RAN, and the SM establishes a PDU session between the UE and the SM by establishing a secure path between the UE and the SE application server over the configured SE connection between the UE and the RAN. The SM informs the UE of a resolver. After PDU session establishment, the resolver receives a resolution request from the UE and responds by sending an IP address directing the UE over the secure path to the SE application server.Type: ApplicationFiled: October 30, 2023Publication date: May 1, 2025Inventors: Marouane BALMAKHTAR, Serge MANNING
-
Publication number: 20250133405Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.Type: ApplicationFiled: December 30, 2024Publication date: April 24, 2025Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
-
Patent number: 12218958Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.Type: GrantFiled: September 6, 2022Date of Patent: February 4, 2025Assignee: T-Mobile Innovations LLCInventors: Marouane Balmakhtar, Serge Manning, Gregory Schumacher
-
Patent number: 12219361Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.Type: GrantFiled: June 16, 2023Date of Patent: February 4, 2025Assignee: T-Mobile Innovations LLCInventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
-
Patent number: 12200495Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.Type: GrantFiled: November 18, 2022Date of Patent: January 14, 2025Assignee: T-Mobile USA, Inc.Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
-
Patent number: 12108244Abstract: Systems, methods, and processing nodes for managing a wireless communication session perform and/or comprise: receiving a privacy enable request from an application associated with a wireless communication device; masking an application identifier corresponding to the application, thereby to generate a masked application identifier; receiving an application attribute request from a route selection manager, the application attribute request including a request for the application identifier; and in response to the privacy enable request and the application attribute request, returning an application attribute request response to the route selection manager, the application attribute request including the masked application identifier.Type: GrantFiled: December 8, 2021Date of Patent: October 1, 2024Assignee: T-Mobile Innovations LLCInventors: Gregory Schumacher, Marouane Balmakhtar, Serge Manning
-
Publication number: 20240171980Abstract: A system includes a policy control function (PCF) that receives an indication from a mobile device in a wireless cellular network that indicates a secure connection between the mobile device and an endpoint in the wireless cellular network. The secure connection is associated with a security policy that includes a first set of parameters and operates at a first level of granularity and a routing policy that includes a second set of parameters and operates at a second level of granularity. The PCF then determines a mapping between the first set of parameters and the second set of parameters that aligns the first level of granularity with the second level of granularity. In an example, the alignment improves the utilization of network resources in the wireless cellular network. The mapping is then transmitted to the mobile device, which enables the mobile device to use the secure connection.Type: ApplicationFiled: November 18, 2022Publication date: May 23, 2024Inventors: Serge Manning, Gregory Schumacher, Marouane Balmakhtar
-
Publication number: 20240080323Abstract: A method comprises receiving, by a threat level engine (TLE) in the network, security data from a plurality of different sources, wherein the security data comprises data regarding traffic related to a security threat occurring in the network, determining, by the TLE, a security related event indicating a security threat occurring at network elements in the network based on security key performance indicators and the security data, when a threat impact level of the security related event exceeds a threshold, determining, by the TLE, a remediation action for the security related event based on the threat impact level, transmitting, by the TLE to a policy decision point, an instruction to generate and store a rule based on the remediation action for the security related event, and transmitting, to a policy enforcement point, an authorization to create the secure tunnel between the one or more network elements and another endpoint.Type: ApplicationFiled: September 6, 2022Publication date: March 7, 2024Inventors: Marouane BALMAKHTAR, Serge MANNING, Gregory SCHUMACHER
-
Publication number: 20230403304Abstract: A method of testing a communication system implementing a zero trust architecture. The method comprises sending a request by a test equipment platform to access a microsegment to a policy enforcement point (PEP); sending an authorization request by the PEP to a policy decision point (PDP); authorizing access of the test equipment platform to the microsegment by the PDP; sending authorization of access of the test equipment platform to the microsegment by the PDP to the PEP; establishing a secure tunnel by the PEP between the test equipment platform and the microsegment; sending a command to provide test data by the test equipment platform via the secure tunnel to a probe in the microsegment; analyzing the test data by the test equipment platform; and producing a test result by the test equipment platform based on analyzing the test data.Type: ApplicationFiled: June 9, 2022Publication date: December 14, 2023Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
-
Publication number: 20230354143Abstract: Systems and methods are provided for rapid user equipment route selection policy rule processing. A method includes determining an applicable routing policy based on user equipment route selection policy (URSP) rules for an established protocol data unit (PDU) session and storing PDU session information with the established uplink PDU session in a cache. The method further includes examining subsequent uplink packets for PDU session information and checking the cache for an established PDU session with matching uplink PDU session information. The method additionally includes routing the subsequent uplink packets to the established PDU session having the matching PDU session information, causing the subsequent uplink packet to be processed in accordance with the applicable routing policy as previously determined based on the URSP rules.Type: ApplicationFiled: May 2, 2022Publication date: November 2, 2023Inventors: Gregory SCHUMACHER, Marouane BALMAKHTAR, Serge MANNING
-
Publication number: 20230337001Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.Type: ApplicationFiled: June 16, 2023Publication date: October 19, 2023Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
-
Patent number: 11751058Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.Type: GrantFiled: January 14, 2022Date of Patent: September 5, 2023Assignee: T-Mobile Innovations LLCInventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
-
Publication number: 20230232236Abstract: A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.Type: ApplicationFiled: January 14, 2022Publication date: July 20, 2023Inventors: Marouane Balmakhtar, Serge Manning, Greg Schumacher
-
Patent number: 9271197Abstract: An embodiment method for session handling for a connection between an UE and a network includes establishing, at a first distributed EPC, user and IP sessions over the connection through the first distributed EPC. The first distributed EPC includes a first PGW at which the IP session is anchored. The method also includes holding original IP resources and releasing original connection resources for the sessions at the first distributed EPC when the UE moves beyond the first distributed EPC to a second distributed EPC. The method then establishes a tunnel between the first PGW and a second PGW for the second distributed EPC. The tunnel utilizes the original IP resources and new connection resources at the second distributed EPC. The method then routes data from the tunnel, through the first PGW, and to the network.Type: GrantFiled: May 21, 2014Date of Patent: February 23, 2016Assignee: Futurewei Technologies, Inc.Inventors: John Kaippallimalil, Hinghung Anthony Chan, Zhixian Xiang, Khosrow Tony Saboorian, Serge Manning
-
Patent number: 9001741Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.Type: GrantFiled: October 29, 2013Date of Patent: April 7, 2015Assignee: Sprint Spectrum L.P.Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
-
Publication number: 20140348130Abstract: An embodiment method for session handling for a connection between an UE and a network includes establishing, at a first distributed EPC, user and IP sessions over the connection through the first distributed EPC. The first distributed EPC includes a first PGW at which the IP session is anchored. The method also includes holding original IP resources and releasing original connection resources for the sessions at the first distributed EPC when the UE moves beyond the first distributed EPC to a second distributed EPC. The method then establishes a tunnel between the first PGW and a second PGW for the second distributed EPC. The tunnel utilizes the original IP resources and new connection resources at the second distributed EPC. The method then routes data from the tunnel, through the first PGW, and to the network.Type: ApplicationFiled: May 21, 2014Publication date: November 27, 2014Inventors: John Kaippallimalil, Hinghung Anthony Chan, Zhixian Xiang, Khosrow Tony Saboorian, Serge Manning
-
Publication number: 20140056226Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.Type: ApplicationFiled: October 29, 2013Publication date: February 27, 2014Applicant: Sprint Spectrum L.P.Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
-
Patent number: 8594105Abstract: Exemplary methods and systems for providing access to IMS services are disclosed herein.Type: GrantFiled: July 12, 2011Date of Patent: November 26, 2013Assignee: Sprint Spectrum L.P.Inventors: Jeremy Breau, Serge Manning, Pallavur Sankaranaraynan
-
Patent number: 8170529Abstract: A method, system, and computer-readable media are provided for determining connection needs of a mobile device connecting to a wireless network. In one aspect, the computer-readable media provide a method that includes receiving a request from a mobile device to access a wireless network, and performing an authentication phase related to the mobile device attempting to access the wireless network. Furthermore, the method includes evaluating signaling behavior of the mobile device during the authentication phase to determine which access technology from a plurality of types of access technologies to use to connect the mobile device to the wireless network. Moreover, the method includes connecting the mobile device to the wireless network using the determined access technology.Type: GrantFiled: February 8, 2007Date of Patent: May 1, 2012Assignee: Clearwire IP Holdings LLCInventors: Jeremy R. Breau, Arun Santharam, Serge Manning, Reza Jafari, Shingara Dhanoa