Patents by Inventor Venson Shaw

Venson Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11362918
    Abstract: Aspects of the subject disclosure may include, for example, detecting a request for a network service between two network nodes and identifying a network path between the two network nodes, wherein the network path is realized by equipment performing a number of network functions. A first network function of the number of network functions is associated with a first number of redundant virtualized network resources performing at least a similar network function as the first network function. Usage metrics are determined corresponding to the first number of redundant virtualized network resources and a first virtualized network resource of the first number of redundant virtualized network resources is assigned to the network path based on the usage metrics to obtain a first assigned virtualized network resource. The network service is provided between the two network nodes using the first assigned virtualized network resource. Other embodiments are disclosed.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: June 14, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Rajendra Prasad Kodaypak
  • Patent number: 11363016
    Abstract: A biometrics hub may establish a session with a first biometric device, receive first biometric data of a user from the first biometric device, establish a session with a second biometric device, receive second biometric data of the user from the second biometric device, and store the first biometric data and the second biometric data at the biometrics hub. The biometrics hub may further detect a power event associated with at least one of the first biometric device or the second biometric device, and change, in response to detecting the power event, a schedule for processing at least one of the first biometric data or the second biometric data.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: June 14, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Publication number: 20220174559
    Abstract: Aspects of the subject disclosure may include, for example, a method including receiving, from a first network, a first node identifier associated with a second network, transmitting the first node identifier to a small cell node, receiving a handover initiation signal from the first network responsive to a request for a handover, from a macro cell node of the second network to the small cell node of the first network, of a communication session associated with a first wireless communication link to a communication device, where the request is triggered at the second network responsive to identification of the first node identifier in a first wireless signal from the communication device, and where the first node identifier is obtained by the communication device via a second wireless signal from the small cell node, and facilitating a second wireless communication link to the communication device via the small cell node to complete the handover. Other embodiments are disclosed.
    Type: Application
    Filed: February 15, 2022
    Publication date: June 2, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11350285
    Abstract: A method performed by a wireless device on a wireless network. The method includes sending an access request for an application. In response to sending the access request, the wireless device receives a visual voicemail message including authentication information. The wireless device can access and send the authentication information of the visual voicemail message to an authentication system. The wireless device is then authenticated to participate in a restricted activity or access restricted content in response to the sent authentication information.
    Type: Grant
    Filed: September 15, 2020
    Date of Patent: May 31, 2022
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Publication number: 20220167346
    Abstract: In 5G Non-Standalone (NSA), to balance the load on 5G users and 4G users effectively, the disclosed technology selects the proper secondary cell group (SCG), when the master cell group (MCG) is provided by 4G infrastructure. E-UTRAN New Radio-Dual Connectivity (ENDC) allows users to connect to a 4G MCG and a 5G SCG (SCG). The technology selects the SCG based on each user's application's attributes such as UL/DL data volume, speed or bandwidth.
    Type: Application
    Filed: February 10, 2022
    Publication date: May 26, 2022
    Inventors: Gaviphat Lekutai, Venson Shaw
  • Patent number: 11341533
    Abstract: Commerce is suggested based on sensory outputs associated with a mobile device. The sensory outputs may represent any parameter, such as physical location or visual gaze. A product in a merchant's inventor may then be recommended, based on the sensory outputs.
    Type: Grant
    Filed: October 9, 2020
    Date of Patent: May 24, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah, Zhi Cui
  • Publication number: 20220103588
    Abstract: A method performed by a security system that can analyze a vulnerability or a risk applicable to a network entity to identify a cybersecurity threat and associated risk level. The security system can store indications of cybersecurity threats and risk levels in a database of a Domain Name System (DNS). The security system can monitor and resolve network traffic to determine IP addresses or URLs associated with the cybersecurity threats. The security system stores a map of the cybersecurity threats and IP addresses or URLs such that the security system can protect a network entity by processing network traffic to sources or destinations of network traffic that can harm particular network entities, and execute personalized security procedures to protect the network entities.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventor: Venson Shaw
  • Publication number: 20220103596
    Abstract: A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an on-demand coupon to protect the wireless device against the cybersecurity threat, and send the on-demand coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the on-demand coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventor: Venson Shaw
  • Patent number: 11284314
    Abstract: Aspects of the subject disclosure may include, for example, a method including receiving, from a first network, a first node identifier associated with a second network, transmitting the first node identifier to a small cell node, receiving a handover initiation signal from the first network responsive to a request for a handover, from a macro cell node of the second network to the small cell node of the first network, of a communication session associated with a first wireless communication link to a communication device, where the request is triggered at the second network responsive to identification of the first node identifier in a first wireless signal from the communication device, and where the first node identifier is obtained by the communication device via a second wireless signal from the small cell node, and facilitating a second wireless communication link to the communication device via the small cell node to complete the handover. Other embodiments are disclosed.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: March 22, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11284399
    Abstract: In 5G Non-Standalone (NSA), to balance the load on 5G users and 4G users effectively, the disclosed technology selects the proper secondary cell group (SCG), when the master cell group (MCG) is provided by 4G infrastructure. E-UTRAN New Radio-Dual Connectivity (ENDC) allows users to connect to a 4G MCG and a 5G SCG (SCG). The technology selects the SCG based on each user's application's attributes such as UL/DL data volume, speed or bandwidth.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: March 22, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Gaviphat Lekutai, Venson Shaw
  • Publication number: 20220086629
    Abstract: A method for authenticating a network entity to access restricted information. The method includes receiving a request to generate a visual voicemail message based on an analysis of network entity profile data and contextual information relating to the network entity. The method includes generating the visual voicemail message based on the network entity profile data and the contextual information, sending the visual voicemail message to the network entity and requesting authentication information included with the visual voicemail message. In response to receiving the requested authentication information, the network entity is authenticated to access to the restricted information.
    Type: Application
    Filed: September 15, 2020
    Publication date: March 17, 2022
    Inventor: Venson Shaw
  • Publication number: 20220086630
    Abstract: A method performed by a wireless device on a wireless network. The method includes sending an access request for an application. In response to sending the access request, the wireless device receives a visual voicemail message including authentication information. The wireless device can access and send the authentication information of the visual voicemail message to an authentication system. The wireless device is then authenticated to participate in a restricted activity or access restricted content in response to the sent authentication information.
    Type: Application
    Filed: September 15, 2020
    Publication date: March 17, 2022
    Inventor: Venson Shaw
  • Publication number: 20220086729
    Abstract: Aspects of the subject disclosure may include, for example, a method including determining according to first information associated with a first wireless access network and second information associated with a second wireless access network, whether to facilitate communication in a geographic area between a first wireless communication device and a communication network via the second wireless access network, and, in turn, directing a second wireless access device of the second wireless access network to facilitate the communication between the first wireless communication device and the communication network, and directing a first wireless access device of the first wireless access network to stop facilitating second communication between the first wireless communication device and the communication network. Other embodiments are disclosed.
    Type: Application
    Filed: November 29, 2021
    Publication date: March 17, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Publication number: 20220070673
    Abstract: A method to prevent or reduce cyberattacks can include analyzing information of users of a 5G network. The information can include user profile data and social media data. The method can further include ranking the users according to a network security ranking based on a social media ranking, to identify target users as potential hotspots for cyberattacks. The 5G network dynamically assigns computing resources based on the network security ranking to monitor computing device(s) associated with the target users and receives an indication of a malicious software of the computing device(s) as detected by the computing resources.
    Type: Application
    Filed: August 31, 2020
    Publication date: March 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220046330
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, dividing a media content item into a plurality of media content segments, at each media content segment of the plurality of media content segments, applying motion estimation between at least two video frames of the media content segment to determine a content weight for the media content segment, determining a bit rate for the media content segment according to the determined content weight for the media content segment, and encoding the media content segment at the determined bit rates to generate a data stream for the media content segment, whereby a plurality of data streams for the plurality of media content segments of the media content are generated, and transmitting the plurality of data streams for the plurality of media content segments of the media content to the one or more media devices. Other embodiments are disclosed.
    Type: Application
    Filed: October 26, 2021
    Publication date: February 10, 2022
    Applicants: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Venson Shaw, Jun Shen
  • Publication number: 20220038907
    Abstract: A method performed by a network node that generates a schedule of communication exchanges between the network node and a small cell of a telecommunications network. The schedule is unique for the small cell among multiple small cells and sets times for sending status signals to the small cell and receiving counterpart response signals from the small cell. When the network node detects non-compliance with the schedule, the network node can begin to monitor the small cell for anomalous activity. Upon detecting that the anomalous activity includes malicious activity, the network node can communicate with the small cell wirelessly to deauthorize the small cell.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220038286
    Abstract: A method to configure a virtual integrated universal integrated circuit card (UICC) that is integrated in a narrowband Internet-of-Things (NB-IoT) host device of a telecommunications network. One or more network nodes can configure one or more authentication and encryption functions for the UICC based on a capability of the NB-IoT device and a condition of the 5G network. The network node(s) can detect a change in a condition of the network or the capability of the NB-IoT device and, in response, reconfigure the UICC for one or more second authentication and encryption functions.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220039109
    Abstract: A method performed by one or more network nodes of a wireless telecommunications network to schedule intermittent connectivity of multiple narrowband Internet-of-Things (NB-IoT) devices with the network. The network node(s) can maintain a connectivity schedule that includes profiles for NB-IoT devices and cause the multiple NB-IoT devices to connect to the network in accordance with the schedule at different times based on priority levels associated with the NB-IoT devices. The network node(s) can adjust the connectivity schedule in response to detection of a condition of the network or the NB-IoT device.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220038265
    Abstract: A method performed by one or more network node(s) of a wireless telecommunications network to dynamically manage encryption keys for multiple narrowband Internet of Things (NB-IoT) devices of the network. The network node(s) can maintain a database that stores a device profile for each of the NB-IoT devices and obtain multiple encryption keys for the multiple NB-IoT devices. The encryption keys are associated with different encryption strengths ranging from high to ultra-low encryption strengths. The network node(s) can allocate the encryption keys to the NB-IoT devices, detect a change in the condition of the network, capability or communications service of NB-IoT devices, and refresh the encryption keys accordingly to ensure that the network nodes properly balance encryption while providing efficient network performance.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220026901
    Abstract: Remote provision of a drone resource is disclosed. A user equipment (UE) can generate a request for drone resources that can be employed to find an appropriate drone from a set of drones. The drone can be automatically provisioned to allow access to the drone resource in accord with the request. The set of drones can comprise different tiers of drones. A response can be generated indicating the state of provisioning a drone in accord with the request. The user equipment can make the request available to a drone allocation component via a communication framework that can comprise a wireless interface. Provisioning of the drone can similarly be accomplished via the communication framework. As such, the set of drones can be distributed and can be provisioned from a UE located remotely from the drone allocation component and/or the drones comprising the set of drones.
    Type: Application
    Filed: October 1, 2021
    Publication date: January 27, 2022
    Inventor: Venson Shaw