Patents by Inventor Tatiana Dashevskiy

Tatiana Dashevskiy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570210
    Abstract: A fraud monitor in a managed network is provided. The fraud monitor uses the network's instrumentation data, configuration data, and account information to detect fraudulent activities in the network, such as fraudulent advertisement or other types of fraudulent data traffic, including fraudulent responses (e.g., fraudulent clicks) to advertisement. The fraud monitor receives configuration data and identification data for physical resources of the network. The fraud monitor receives instrumentation data of packet traffic in the network. The fraud monitor receives account information for users of the network. The fraud monitor analyzes the instrumentation data to detect a violation of a fraud detection policy that prevents malicious or fraudulent online advertisement activity based on the configuration data, identification data, or account information.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: January 31, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Michael Chin, Aaron Drake, Rami Al-Kabra, Adam Profitt, Tatiana Dashevskiy, Jonathan Nolz
  • Patent number: 11546327
    Abstract: A computing system may generate and/or use a behavior photographic identification (“behavior photo ID”) that is based, at least in part, on anonymized parameters related to the behavior of a person. The behavior can include a history of phone calls, texts, or internet browsing. The behavior photo ID, which may be used to uniquely identify the person, may digitally modify a digital photo to encode behaviors or activities of the person. In some implementations, the behavior photo ID may be modified periodically, or from time to time, to produce an updated behavior photo ID that reflects new external events as well as relatively recent behaviors or activities of the person.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: January 3, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Tatiana Dashevskiy, Rami Al-Kabra
  • Patent number: 11537751
    Abstract: Techniques for identifying certain types of network activity are disclosed, including parsing of a Uniform Resource Locator (URL) to identify a plurality of key-value pairs in a query string of the URL. The plurality of key-value pairs may include one or more potential anonymous identifiers. In an example embodiment, a machine learning algorithm is trained on the URL to determine whether the one or more potential anonymous identifiers are actual anonymous identifiers (i.e., advertising identifiers) that provide advertisers a method to identify a user device without using, for example, a permanent device identifier. In this embodiment, a ranking threshold is used to verify the URL. A verified URL associate the one or more potential anonymous identifiers with the user device as actual anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: December 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Rami Al-Kabra, Douglas Galagate, Eric Yatskowitz, Chuong Phan, Tatiana Dashevskiy, Prem Kumar Bodiga, Noah Dahlstrom, Ruchir Sinha, Jonathan Morrow, Aaron Drake
  • Patent number: 11526778
    Abstract: Aspects of the present disclosure provide for future user device preference prediction based on telecom data. In one aspect, a computer-implemented method includes collecting the telecom data from at least one node of a wireless communication network, where the telecom data includes records for a plurality of occurrences of user interaction with the wireless communication network via a respective current user device. The telecom data is then applied to a predictive model to obtain a prediction of future user device preferences. The prediction of the future user device preferences may include an indication that a user will switch from the respective current user device to another user device for future use with the wireless communication network. The method further includes performing an action with respect to the wireless communication network in response to the prediction of future user device preferences.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: December 13, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Tatiana Dashevskiy, Rami Al-kabra, Zunyan Xiong
  • Publication number: 20210042442
    Abstract: Techniques for identifying certain types of network activity are disclosed, including parsing of a Uniform Resource Locator (URL) to identify a plurality of key-value pairs in a query string of the URL. The plurality of key-value pairs may include one or more potential anonymous identifiers. In an example embodiment, a machine learning algorithm is trained on the URL to determine whether the one or more potential anonymous identifiers are actual anonymous identifiers (i.e., advertising identifiers) that provide advertisers a method to identify a user device without using, for example, a permanent device identifier. In this embodiment, a ranking threshold is used to verify the URL. A verified URL associate the one or more potential anonymous identifiers with the user device as actual anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic.
    Type: Application
    Filed: October 22, 2020
    Publication date: February 11, 2021
    Applicant: T-Mobile USA, Inc.
    Inventors: Rami Al-Kabra, Douglas Galagate, Eric Yatskowitz, Chuong Phan, Tatiana Dashevskiy, Prem Kumar Bodiga, Noah Dahlstrom, Ruchir Sinha, Jonathan Morrow, Aaron Drake
  • Patent number: 10785369
    Abstract: Call record data for telephone numbers of callers are received. A telephone number of a caller is determined as used to place a telephone call to a recipient telephone number of a call recipient. The call record data are analyzed using graph analytics to generate a reliability score for the telephone number that represents a likelihood that the caller is known to the call recipient. The call record data are analyzed using entropy analysis to generate a behavior score for the telephone number that represents a behavior trustworthiness of the caller. The reliability score, the behavior score, and the telephone number of the caller are sent to a user device of the call recipient for the user device to generate a first indication that represents a value of the reliability score and a second indication that represents a value of the behavior score for display along with the telephone number.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: September 22, 2020
    Assignee: T-Mobile USA, Inc.
    Inventors: Tatiana Dashevskiy, Rami Al-Kabra
  • Publication number: 20200202234
    Abstract: Aspects of the present disclosure provide for future user device preference prediction based on telecom data. In one aspect, a computer-implemented method includes collecting the telecom data from at least one node of a wireless communication network, where the telecom data includes records for a plurality of occurrences of user interaction with the wireless communication network via a respective current user device. The telecom data is then applied to a predictive model to obtain a prediction of future user device preferences. The prediction of the future user device preferences may include an indication that a user will switch from the respective current user device to another user device for future use with the wireless communication network. The method further includes performing an action with respect to the wireless communication network in response to the prediction of future user device preferences.
    Type: Application
    Filed: December 19, 2018
    Publication date: June 25, 2020
    Inventors: Tatiana Dashevskiy, Rami Al-kabra, Zunyan Xiong
  • Publication number: 20190355015
    Abstract: This disclosure describes techniques for identifying most influential customers by determining various influence scores and metrics associated with each in-network customer and off-network customers that communicate with one or more in-network customers. A particular in-network customer can be assigned or have calculated for him or her a social media influence score, a voice call score, and an SMS score, and a particular off-network customer can be assigned or have calculated for him or her an acquisition score. The scores can be used in various context to generate recommendations for products and/or services, provide targeted marketing, and/or conduct performance analysis.
    Type: Application
    Filed: May 17, 2018
    Publication date: November 21, 2019
    Inventors: Tatiana DASHEVSKIY, Rami AL-KABRA, Jeffrey SEWELL
  • Publication number: 20190342287
    Abstract: A computing system may generate and/or use a behavior photographic identification (“behavior photo ID”) that is based, at least in part, on anonymized parameters related to the behavior of a person. The behavior can include a history of phone calls, texts, or internet browsing. The behavior photo ID, which may be used to uniquely identify the person, may digitally modify a digital photo to encode behaviors or activities of the person. In some implementations, the behavior photo ID may be modified periodically, or from time to time, to produce an updated behavior photo ID that reflects new external events as well as relatively recent behaviors or activities of the person.
    Type: Application
    Filed: May 4, 2018
    Publication date: November 7, 2019
    Inventors: Tatiana Dashevskiy, Rami Al-Kabra
  • Publication number: 20190230122
    Abstract: A fraud monitor in a managed network is provided. The fraud monitor uses the network's instrumentation data, configuration data, and account information to detect fraudulent activities in the network, such as fraudulent advertisement or other types of fraudulent data traffic, including fraudulent responses (e.g., fraudulent clicks) to advertisement. The fraud monitor receives configuration data and identification data for physical resources of the network. The fraud monitor receives instrumentation data of packet traffic in the network. The fraud monitor receives account information for users of the network. The fraud monitor analyzes the instrumentation data to detect a violation of a fraud detection policy that prevents malicious or fraudulent online advertisement activity based on the configuration data, identification data, or account information.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Inventors: Michael Chin, Aaron Drake, Rami Al-Kabra, Adam Profitt, Tatiana Dashevskiy