Patents by Inventor Shawn David Corey

Shawn David Corey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11663313
    Abstract: Systems and methods for authenticating a peripheral device prior to allowing the peripheral device access to components and data stored on user equipment. In some examples, the user equipment may include an authorization component that is configured to physically decouple a hardware interface from other components of the user equipment until the authorization component is able to authenticate the peripheral device. Both authorized peripheral devices and the user equipment may be provisioned with authorization data and/or credentials from a system outside the control of the individual users of the user equipment.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: May 30, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Michael Bishop, Shawn David Corey
  • Publication number: 20220114268
    Abstract: Systems and methods for encrypting and decrypting data sent to and received from a peripheral device physically coupled to a hardware interface of a user equipment. In some examples, the user equipment may include an encrypting/decryption component that is configured to physically between a hardware interface of the user equipment and the other components of the user equipment. The encrypting/decryption component may be configured to receive a plurality of encryption/decryption schemes from a remote system. The encrypting/decryption component may select and apply one or more of the plurality of encryption/decryption schemes to data being downloaded and/or uploaded to the peripheral device.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventors: Michael Bishop, Shawn David Corey
  • Publication number: 20220108004
    Abstract: Described herein are techniques for performing a trusted execution environment (TEE) detection of systemic malware in a computing system that hosts the TEE. As described, the techniques may include a TEE obtaining data from one or more subsystems of a computing system that hosts the TEE. The TEE is configured to execute components in isolation from the one or more subsystems of the computing system. Based on the data obtained, the TEE detects systemic malware on the one or more subsystems of the computing system. In response to the detected malware, the TEE reports the detection of malware on the one or more subsystems of the computing system.
    Type: Application
    Filed: October 6, 2020
    Publication date: April 7, 2022
    Inventors: Shawn David Corey, Michael David Bishop
  • Publication number: 20220092167
    Abstract: Systems and methods for authenticating a peripheral device prior to allowing the peripheral device access to components and data stored on user equipment. In some examples, the user equipment may include an authorization component that is configured to physically decouple a hardware interface from other components of the user equipment until the authorization component is able to authenticate the peripheral device. Both authorized peripheral devices and the user equipment may be provisioned with authorization data and/or credentials from a system outside the control of the individual users of the user equipment.
    Type: Application
    Filed: September 23, 2020
    Publication date: March 24, 2022
    Inventors: Michael Bishop, Shawn David Corey
  • Patent number: 11133983
    Abstract: Technologies for using edge devices in a cellular network as compute nodes to participate in a blockchain network are described. A cellular network may provision one or more edge devices in communication with the cellular network to instantiate a virtual machine on the edge device to act as a compute node. The cellular network may submit a bid to solve a blockchain hash function using the compute nodes and may instruct the edge to solve the blockchain hash function.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: September 28, 2021
    Assignee: T-Mobile USA, Inc.
    Inventors: Ahmad Arash Obaidi, Shawn David Corey, Andrew Lee Watts
  • Patent number: 10848942
    Abstract: In a wireless communication network such as a cellular network, cellular devices may receive over-the-air (OTA) configuration commands that specify requested device configuration settings. For example, an OTA configuration command may be a binary short message service (SMS) message specifying a configuration parameter and a requested value of the configuration parameter. Upon receiving an OTA configuration command, the cellular device refers to a blockchain that specifies permissible values for various configuration parameters. If a requested configuration parameter value is not indicated by the blockchain to be permissible, the cellular device disregards the OTA configuration command and refuses to implement the requested setting. The cellular device may periodically retrieve updates to the blockchain and may attempt to validate any updated blocks, based on previously validated blocks. If the updates cannot be validated, the cellular device may decline to implement any requested configuration settings.
    Type: Grant
    Filed: January 8, 2020
    Date of Patent: November 24, 2020
    Assignee: T-Mobile USA, Inc.
    Inventors: Shawn David Corey, Michael Cleat Bishop, II
  • Patent number: 10757097
    Abstract: A temporal identity vault used to authenticate an individual is described herein. User identifying input is received on a device, such as a cell phone. The identifying input is, in some examples, encrypted and stored as a temporal identity vault. The temporal identity vault is configured for a use. The use may be a time, location, or the like. A beacon is associated with the temporal identity vault. If the beacon is at a location relative to an object, the authentication process is started. The information stored in the temporal identity vault is authenticated at a central service. Upon authentication, the user is permitted to operate an object. The temporal identity vault may thereafter be deleted.
    Type: Grant
    Filed: August 28, 2017
    Date of Patent: August 25, 2020
    Assignee: T-Mobile USA, Inc.
    Inventors: Eric Wayne Yocam, Shawn David Corey
  • Publication number: 20200195497
    Abstract: Technologies for using edge devices in a cellular network as compute nodes to participate in a blockchain network are described. A cellular network may provision one or more edge devices in communication with the cellular network to instantiate a virtual machine on the edge device to act as a compute node. The cellular network may submit a bid to solve a blockchain hash function using the compute nodes and may instruct the edge to solve the blockchain hash function.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Inventors: Ahmad Arash Obaidi, Shawn David Corey, Andrew Lee Watts
  • Publication number: 20190068586
    Abstract: A temporal identity vault used to authenticate an individual is described herein. User identifying input is received on a device, such as a cell phone. The identifying input is, in some examples, encrypted and stored as a temporal identity vault. The temporal identity vault is configured for a use. The use may be a time, location, or the like. A beacon is associated with the temporal identity vault. If the beacon is at a location relative to an object, the authentication process is started. The information stored in the temporal identity vault is authenticated at a central service. Upon authentication, the user is permitted to operate an object. The temporal identity vault may thereafter be deleted.
    Type: Application
    Filed: August 28, 2017
    Publication date: February 28, 2019
    Inventors: Eric Wayne Yocam, Shawn David Corey