Patents by Inventor Sunil Lingayat

Sunil Lingayat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11943387
    Abstract: A system and method for monitoring calls or other communications between two parties by a monitoring service. The system may be configured to determine whether the caller is a known or unknown caller. In the event that the system determines that the caller is an unknown caller (i.e., not in either of a “good” caller or “bad” caller database), then the system may process dialog between the two parties to determine whether a potential fraud is being committed. The processing may be performed using artificial intelligence (AI) in real-time. In response to determining that a potential fraud is being committed, the call may be interdicted by automatically adding a third party, such as a security agent, to the call. The system may be configured to selectively play a pre-call message to a non-subscriber of the monitoring service to notify the non-subscriber that the call is being monitored.
    Type: Grant
    Filed: May 19, 2022
    Date of Patent: March 26, 2024
    Assignee: Sentien Corporation
    Inventors: Robert Wolinsky, Jonathan Wolinsky, Sunil Lingayat, Thomas Funk
  • Publication number: 20240015171
    Abstract: The disclosed embodiments include a software-defined security (SDS) service that can monitor runtime behavior of a network of nodes of a wireless network and detect anomalous activity indicating contamination of the network of nodes, where the contamination includes unauthorized instructions designed to damage or interrupt a function of the network of nodes. The SDS service can dynamically coordinate a blacklist and a whitelist, where the blacklist includes an indication of contaminated assets and the whitelist includes an indication of non-contaminated assets. The contaminated assets are isolated with a cleanroom environment, where the security resources sanitize the contaminated assets. Then, indications of the decontaminated assets are moved from the blacklist to the whitelist, and the use of the security resources are dynamically adjusted according to a load ratio between the whitelist and the blacklist.
    Type: Application
    Filed: September 25, 2023
    Publication date: January 11, 2024
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11824881
    Abstract: The disclosed embodiments include a method performed by a wireless network to dynamically provision security resources during runtime execution of a service environment. The security resources are distributed across cell sites that provide coverage areas for multiple wireless devices (WDs) in multiple service environments. The cell sites are monitored during runtime execution of the multiple service environments to detect risk levels that indicate a vulnerability to the wireless network. When an elevated risk level is detected for a particular cell site, security resources of the security layer are dynamically provisioned for the particular cell site to safeguard the entire wireless network. Hence, the provisioned security resources can include a security resource from a different cell site.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: November 21, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11799878
    Abstract: The disclosed embodiments include a software-defined security (SDS) service that can monitor runtime behavior of a network of nodes of a wireless network and detect anomalous activity indicating contamination of the network of nodes, where the contamination includes unauthorized instructions designed to damage or interrupt a function of the network of nodes. The SDS service can dynamically coordinate a blacklist and a whitelist, where the blacklist includes an indication of contaminated assets and the whitelist includes an indication of non-contaminated assets. The contaminated assets are isolated with a cleanroom environment, where the security resources sanitize the contaminated assets. Then, indications of the decontaminated assets are moved from the blacklist to the whitelist, and the use of the security resources are dynamically adjusted according to a load ratio between the whitelist and the blacklist.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: October 24, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11765227
    Abstract: The technology described herein documents interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting.
    Type: Grant
    Filed: July 20, 2022
    Date of Patent: September 19, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11659396
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: May 23, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20230091852
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Application
    Filed: November 18, 2022
    Publication date: March 23, 2023
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20230093627
    Abstract: The technology described herein allocates resources in a cloud computing environment using a 5G network. The system can connect a device to the 5G network and collect data related to the device such as a location of the device and characteristics of use of the device with the 5G network. The system can create a device service profile of the device based at least in part on the data related to the device. The system can then dynamically partition computing resources within the cloud computing environment for the device based on the device service profile and a time-of-day in the location of the device to thereby provide on-demand access to content or services in the cloud computing environment to the device over the 5G network.
    Type: Application
    Filed: November 23, 2022
    Publication date: March 23, 2023
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11558747
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: January 17, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11539787
    Abstract: The technology described herein allocates resources in a cloud computing environment using a 5G network. The system can connect a device to the 5G network and collect data related to the device such as a location of the device and characteristics of use of the device with the 5G network. The system can create a device service profile of the device based at least in part on the data related to the device. The system can then dynamically partition computing resources within the cloud computing environment for the device based on the device service profile and a time-of-day in the location of the device to thereby provide on-demand access to content or services in the cloud computing environment to the device over the 5G network.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: December 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11533624
    Abstract: The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
    Type: Grant
    Filed: July 6, 2021
    Date of Patent: December 20, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Publication number: 20220360626
    Abstract: The technology described herein documents interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting.
    Type: Application
    Filed: July 20, 2022
    Publication date: November 10, 2022
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11444980
    Abstract: The disclosed embodiments include a method performed by a wireless network to mitigate a security risk arising from an application-layer transaction and contextual scenario of a wireless device (WD). A security resource can be maintained inactive by default and configured for on-demand activation in response to a security risk associated with the WD. The method can include monitoring the WD for application-layer transactions and contextual scenarios, and detecting a security risk relative to a particular type of a application-layer transaction and a contextual scenario of the WD. In response to detecting the security risk, the security resource is activated to support the application-layer transaction while safeguarding the entire wireless network. In response to detecting a change to the application-layer transaction or the particular contextual scenario, the security resource for the WD can be deactivated.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: September 13, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11418587
    Abstract: The technology described herein documents and verifies interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting. The system can receive a request from the first entity for an interaction with the second entity and can activate the blockchain ledger. In response to receiving consensus from a blockchain community within the cloud computing environment, the system can allow the interaction, where the interaction is appended to the blockchain ledger.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: August 16, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11206542
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a connected device with the 5G network and request a personalized signature from the connected device. The system can create a schedule for the personalized signature to be sent from the connected device to the 5G network and send the connected device the schedule. The 5G network can monitor for the personalized signature at the times in the schedule. In response to not receiving the personalized signature from the connected device at a scheduled time in the schedule, the system can determine that the connected device is at risk of a cyber-attack. In response to determining that the connected device is at risk of the cyber-attack, the system can deauthorize the connected device.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: December 21, 2021
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20210360408
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a connected device with the 5G network and request a personalized signature from the connected device. The system can create a schedule for the personalized signature to be sent from the connected device to the 5G network and send the connected device the schedule. The 5G network can monitor for the personalized signature at the times in the schedule. In response to not receiving the personalized signature from the connected device at a scheduled time in the schedule, the system can determine that the connected device is at risk of a cyber-attack. In response to determining that the connected device is at risk of the cyber-attack, the system can deauthorize the connected device.
    Type: Application
    Filed: May 14, 2020
    Publication date: November 18, 2021
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20210360405
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Application
    Filed: June 22, 2021
    Publication date: November 18, 2021
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20210344744
    Abstract: The technology described herein allocates resources in a cloud computing environment using a 5G network. The system can connect a device to the 5G network and collect data related to the device such as a location of the device and characteristics of use of the device with the 5G network. The system can create a device service profile of the device based at least in part on the data related to the device. The system can then dynamically partition computing resources within the cloud computing environment for the device based on the device service profile and a time-of-day in the location of the device to thereby provide on-demand access to content or services in the cloud computing environment to the device over the 5G network.
    Type: Application
    Filed: April 30, 2020
    Publication date: November 4, 2021
    Inventors: Venson Shaw, Sunil Lingayat
  • Publication number: 20210345115
    Abstract: The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
    Type: Application
    Filed: July 6, 2021
    Publication date: November 4, 2021
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Publication number: 20210344751
    Abstract: The technology described herein documents and verifies interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting. The system can receive a request from the first entity for an interaction with the second entity and can activate the blockchain ledger. In response to receiving consensus from a blockchain community within the cloud computing environment, the system can allow the interaction, where the interaction is appended to the blockchain ledger.
    Type: Application
    Filed: April 30, 2020
    Publication date: November 4, 2021
    Inventors: Venson Shaw, Sunil Lingayat