Patents by Inventor Venson Shaw

Venson Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11496522
    Abstract: A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an on-demand coupon to protect the wireless device against the cybersecurity threat, and send the on-demand coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the on-demand coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: November 8, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11487836
    Abstract: Personalized sensory services are provided to mobile devices. As a sensor monitors an area of surveillance, the sensor may detect a passing mobile device. The sensor may thus ally itself to the passing mobile device and provide personalized sensory operations.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: November 1, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11483301
    Abstract: Aspects of the subject disclosure may include, for example, detecting a request for access to a wireless network via an access point. Responsive to a first determination that the identifier corresponds to an entry in the list, access is facilitated to the wireless network via the access point without the equipment of the requesting user providing credentials to the wireless network. The list includes a first set of entries corresponding to a first set of users having unrestricted access and a second set of entries corresponding to a second set of users having restricted access. Responsive to a second determination that the identifier does not correspond to any of the entries, a message is transmitted to equipment of the host regarding the request, and responsive to receiving approval, the list is updated to include the identifier. Other embodiments are disclosed.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: October 25, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Zhi Cui, Venson Shaw
  • Patent number: 11483177
    Abstract: Dynamic intelligent analytics VPN instantiation and/or aggregation facilitating secured access to the cloud network device are provided herein. A system can comprise: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: identifying an application for execution on a user device of user devices connected to first network devices of a first network, wherein the system is part of second devices of a second network communicatively coupled to and remote from the first network; and determining virtual private network attributes for a virtual private network for the user device, wherein the virtual private network attributes are based on the application; and generating a message notification to send to the user device, wherein the message notification comprises the virtual private network attributes to enable the user device to update the virtual private network.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: October 25, 2022
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Publication number: 20220321460
    Abstract: Aspects of the subject disclosure may include, for example, a method including selecting a second network slice, according to first information and a first characteristic of a first service associated with a communication device. The first network slice is directed to route a first portion of user plane traffic between the communication device and the second network slice, while retaining a second portion according to a second characteristic of the first service. The first network slice retains control plane processing for the communication device. The second network slice is directed to facilitate providing the first service via the first portion of the user plane traffic. Anticipated resource usage information associated with the second network slice is determined and a first virtual network function is instantiated at the second network slice according to the anticipated resource usage information associated with the second network slice. Other embodiments are disclosed.
    Type: Application
    Filed: June 17, 2022
    Publication date: October 6, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Publication number: 20220311765
    Abstract: A biometrics hub may establish a session with a first biometric device, receive first biometric data of a user from the first biometric device, establish a session with a second biometric device, receive second biometric data of the user from the second biometric device, and store the first biometric data and the second biometric data at the biometrics hub. The biometrics hub may further detect a power event associated with at least one of the first biometric device or the second biometric device, and change, in response to detecting the power event, a schedule for processing at least one of the first biometric data or the second biometric data.
    Type: Application
    Filed: June 13, 2022
    Publication date: September 29, 2022
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Patent number: 11457361
    Abstract: A method to prevent or reduce cyberattacks can include analyzing information of users of a 5G network. The information can include user profile data and social media data. The method can further include ranking the users according to a network security ranking based on a social media ranking, to identify target users as potential hotspots for cyberattacks. The 5G network dynamically assigns computing resources based on the network security ranking to monitor computing device(s) associated with the target users and receives an indication of a malicious software of the computing device(s) as detected by the computing resources.
    Type: Grant
    Filed: August 31, 2020
    Date of Patent: September 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11451397
    Abstract: A method to configure a virtual integrated universal integrated circuit card (UICC) that is integrated in a narrowband Internet-of-Things (NB-IoT) host device of a telecommunications network. One or more network nodes can configure one or more authentication and encryption functions for the UICC based on a capability of the NB-IoT device and a condition of the 5G network. The network node(s) can detect a change in a condition of the network or the capability of the NB-IoT device and, in response, reconfigure the UICC for one or more second authentication and encryption functions.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: September 20, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Publication number: 20220295243
    Abstract: Systems and processes that incorporate teachings of the subject disclosure may include, for example, receiving a request for a streaming video application service from a mobile device and, responsive to determining a relationship between a service provider of a wireless access point and a service provider of a cellular network providing the streaming video application service via the cellular services. Responsive to determining that the wireless access point is in a communication range of the mobile device based on a proximity of the wireless access point to the mobile device, a communication session is initiated between the mobile device and the wireless access point. Delivery of the streaming video application service to the mobile device is switched from over the cellular network to over the wireless access point. Other embodiments are disclosed.
    Type: Application
    Filed: June 2, 2022
    Publication date: September 15, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Jin He
  • Patent number: 11444980
    Abstract: The disclosed embodiments include a method performed by a wireless network to mitigate a security risk arising from an application-layer transaction and contextual scenario of a wireless device (WD). A security resource can be maintained inactive by default and configured for on-demand activation in response to a security risk associated with the WD. The method can include monitoring the WD for application-layer transactions and contextual scenarios, and detecting a security risk relative to a particular type of a application-layer transaction and a contextual scenario of the WD. In response to detecting the security risk, the security resource is activated to support the application-layer transaction while safeguarding the entire wireless network. In response to detecting a change to the application-layer transaction or the particular contextual scenario, the security resource for the WD can be deactivated.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: September 13, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat, Gaviphat Lekutai
  • Patent number: 11431746
    Abstract: A method performed by a cybersecurity system includes monitoring multiple network functions (NFs) of a service-based architecture (SBA) of a 5G network. The NFs are communicatively interconnected over an HTTP/2 interface. The cybersecurity system detects potentially malicious network traffic communicated over the HTTP/2 interface, identifies a NFs or associated services that are susceptible to a cyberattack based on the potentially malicious network traffic and deploys resources to secure the NFs or associated services. In one example, the resources are prioritized for a most frequently used (MFU) or most recently used (MRU) NF or associated service.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: August 30, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Patent number: 11418587
    Abstract: The technology described herein documents and verifies interactions in a cloud computing environment. The system creates a first partition within the cloud computing environment for a first entity and a second partition within the cloud computing environment for a second entity. A blockchain ledger can be created for a set of interactions between the first entity and the second entity, where the blockchain ledger is disengaged when the first entity and the second entity are not interacting. The system can receive a request from the first entity for an interaction with the second entity and can activate the blockchain ledger. In response to receiving consensus from a blockchain community within the cloud computing environment, the system can allow the interaction, where the interaction is appended to the blockchain ledger.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: August 16, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11412386
    Abstract: An inbound roaming system processes a connection of a wireless device to roam on a visited wireless network. The system queries a network resource that stores security data of a home wireless network for the wireless device. In response to the query, the system receives an indication of a security parameter that relates the security data to a potential cyberattack enabled by the wireless device roaming on the visited wireless network. The system then performs, based on the security parameter, an action to mitigate the potential cyberattack.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: August 9, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220245674
    Abstract: Commerce is suggested based on sensory outputs associated with a mobile device. The sensory outputs may represent any parameter, such as physical location or visual gaze. A product in a merchant's inventor may then be recommended, based on the sensory outputs.
    Type: Application
    Filed: April 20, 2022
    Publication date: August 4, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah, Zhi Cui
  • Patent number: 11405310
    Abstract: Aspects of the subject disclosure may include, for example, a method including selecting a second network slice, according to first information and a first characteristic of a first service associated with a communication device. The first network slice is directed to route a first portion of user plane traffic between the communication device and the second network slice, while retaining a second portion according to a second characteristic of the first service. The first network slice retains control plane processing for the communication device. The second network slice is directed to facilitate providing the first service via the first portion of the user plane traffic. Anticipated resource usage information associated with the second network slice is determined and a first virtual network function is instantiated at the second network slice according to the anticipated resource usage information associated with the second network slice. Other embodiments are disclosed.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: August 2, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Patent number: 11381939
    Abstract: Systems and processes that incorporate teachings of the subject disclosure may include, for example, receiving a request for a streaming video application service from a mobile device and, responsive to determining a relationship between a service provider of a wireless access point and a service provider of a cellular network providing the streaming video application service via the cellular services. Responsive to determining that the wireless access point is in a communication range of the mobile device based on a proximity of the wireless access point to the mobile device, a communication session is initiated between the mobile device and the wireless access point. Delivery of the streaming video application service to the mobile device is switched from over the cellular network to over the wireless access point. Other embodiments are disclosed.
    Type: Grant
    Filed: January 6, 2021
    Date of Patent: July 5, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Jin He
  • Publication number: 20220210179
    Abstract: A system obtains security data of interconnected networks. The visibility of the security data is asymmetric for each interconnected network relative to the other. The security data is continuously stored and used in real-time or near real-time to identify services of the interconnected networks that require safeguards against a potential cyberattack. The interworking system determines a security parameter that relates the security data to the potential cyberattack and communicates the security parameter to the interconnected networks. The interconnected networks can safeguard against the potential cyberattack based on the security parameter.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220210656
    Abstract: An inbound roaming system processes a connection of a wireless device to roam on a visited wireless network. The system queries a network resource that stores security data of a home wireless network for the wireless device. In response to the query, the system receives an indication of a security parameter that relates the security data to a potential cyberattack enabled by the wireless device roaming on the visited wireless network. The system then performs, based on the security parameter, an action to mitigate the potential cyberattack.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220210651
    Abstract: An outbound roaming system detects that a wireless device has left a home wireless network and, in response, identifies a visited wireless network on which the wireless device is likely to roam or is currently roaming. The outbound roaming system queries the visited wireless network to offer security information for the wireless device. The security information can include a security parameter for the visited wireless network to mitigate a potential cyberattack enabled by the wireless device. In response to receiving an acceptance of the offer and satisfying a condition, the outbound roaming system provides the security information to the visited wireless network. As such, the visited wireless network can dynamically defend against cyberattacks enabled by roaming devices.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai
  • Publication number: 20220191712
    Abstract: A security system generates a digital signature for a small cell of a wireless network and assigns the digital signature to the small cell for connecting to the wireless network. The digital signature can be generated based on a connectivity schedule for the small cell. When the security system obtains a connection request from the small cell to connect to the wireless network, the security system compares an instance of the digital signature included in the connection request with an expected digital signature and compares the point in time when the connection request was communicated with an expected time indicated in the connectivity schedule. The security system detects an anomaly when the instance of the digital signature deviates from the expected digital signature or the point in time deviates from the expected time, and causes performance of an action based on a type or degree of the anomaly.
    Type: Application
    Filed: December 14, 2020
    Publication date: June 16, 2022
    Inventors: Venson Shaw, Gaviphat Lekutai