Patents by Inventor Venson Shaw

Venson Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220070673
    Abstract: A method to prevent or reduce cyberattacks can include analyzing information of users of a 5G network. The information can include user profile data and social media data. The method can further include ranking the users according to a network security ranking based on a social media ranking, to identify target users as potential hotspots for cyberattacks. The 5G network dynamically assigns computing resources based on the network security ranking to monitor computing device(s) associated with the target users and receives an indication of a malicious software of the computing device(s) as detected by the computing resources.
    Type: Application
    Filed: August 31, 2020
    Publication date: March 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220046330
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, dividing a media content item into a plurality of media content segments, at each media content segment of the plurality of media content segments, applying motion estimation between at least two video frames of the media content segment to determine a content weight for the media content segment, determining a bit rate for the media content segment according to the determined content weight for the media content segment, and encoding the media content segment at the determined bit rates to generate a data stream for the media content segment, whereby a plurality of data streams for the plurality of media content segments of the media content are generated, and transmitting the plurality of data streams for the plurality of media content segments of the media content to the one or more media devices. Other embodiments are disclosed.
    Type: Application
    Filed: October 26, 2021
    Publication date: February 10, 2022
    Applicants: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Venson Shaw, Jun Shen
  • Publication number: 20220038907
    Abstract: A method performed by a network node that generates a schedule of communication exchanges between the network node and a small cell of a telecommunications network. The schedule is unique for the small cell among multiple small cells and sets times for sending status signals to the small cell and receiving counterpart response signals from the small cell. When the network node detects non-compliance with the schedule, the network node can begin to monitor the small cell for anomalous activity. Upon detecting that the anomalous activity includes malicious activity, the network node can communicate with the small cell wirelessly to deauthorize the small cell.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220038286
    Abstract: A method to configure a virtual integrated universal integrated circuit card (UICC) that is integrated in a narrowband Internet-of-Things (NB-IoT) host device of a telecommunications network. One or more network nodes can configure one or more authentication and encryption functions for the UICC based on a capability of the NB-IoT device and a condition of the 5G network. The network node(s) can detect a change in a condition of the network or the capability of the NB-IoT device and, in response, reconfigure the UICC for one or more second authentication and encryption functions.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220039109
    Abstract: A method performed by one or more network nodes of a wireless telecommunications network to schedule intermittent connectivity of multiple narrowband Internet-of-Things (NB-IoT) devices with the network. The network node(s) can maintain a connectivity schedule that includes profiles for NB-IoT devices and cause the multiple NB-IoT devices to connect to the network in accordance with the schedule at different times based on priority levels associated with the NB-IoT devices. The network node(s) can adjust the connectivity schedule in response to detection of a condition of the network or the NB-IoT device.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220038265
    Abstract: A method performed by one or more network node(s) of a wireless telecommunications network to dynamically manage encryption keys for multiple narrowband Internet of Things (NB-IoT) devices of the network. The network node(s) can maintain a database that stores a device profile for each of the NB-IoT devices and obtain multiple encryption keys for the multiple NB-IoT devices. The encryption keys are associated with different encryption strengths ranging from high to ultra-low encryption strengths. The network node(s) can allocate the encryption keys to the NB-IoT devices, detect a change in the condition of the network, capability or communications service of NB-IoT devices, and refresh the encryption keys accordingly to ensure that the network nodes properly balance encryption while providing efficient network performance.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventor: Venson Shaw
  • Publication number: 20220026901
    Abstract: Remote provision of a drone resource is disclosed. A user equipment (UE) can generate a request for drone resources that can be employed to find an appropriate drone from a set of drones. The drone can be automatically provisioned to allow access to the drone resource in accord with the request. The set of drones can comprise different tiers of drones. A response can be generated indicating the state of provisioning a drone in accord with the request. The user equipment can make the request available to a drone allocation component via a communication framework that can comprise a wireless interface. Provisioning of the drone can similarly be accomplished via the communication framework. As such, the set of drones can be distributed and can be provisioned from a UE located remotely from the drone allocation component and/or the drones comprising the set of drones.
    Type: Application
    Filed: October 1, 2021
    Publication date: January 27, 2022
    Inventor: Venson Shaw
  • Patent number: 11222303
    Abstract: A method includes detecting, via an RFID reader of a package repository, an RFID tag associated with a package and, based on detecting the RFID tag, communicating, to a network device, an update for a shipping history. The method includes detecting, by a sensor associated with the package repository, a presence in a vicinity of the package repository. The method also includes detecting that the RFID tag is outside a range of the RFID reader and, responsive to the RFID tag being outside the range of the RFID reader, transmitting at least a portion of sensor data captured subsequent to detecting the presence to the network device.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: January 11, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Publication number: 20220007191
    Abstract: The technology includes a method performed by a system of a telecommunications network to manage network traffic of a 5G network. The system can instantiate a security system to sort incoming or outgoing network traffic at a perimeter of the 5G network into multiple groups that are each uniquely associated with multiple traffic types and multiple security levels. The system can inspect segments of data included in the incoming network traffic and sort multiple portions of the network traffic into the groups based in part on the inspection of the segments of the data. The system can dynamically adjust an available bandwidth of the 5G network based on each load of each of the groups and dispatch the portions of the network traffic in accordance with a traffic type and a security level of each of the groups.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventor: Venson Shaw
  • Publication number: 20220007195
    Abstract: The technology includes a method performed by a security system of a 5G network. The security system is instantiated to sort incoming or outgoing network traffic at a perimeter of the 5G network into one of multiple groups that are each uniquely associated with one of multiple functions or applications and one of multiple security levels. The system can inspect portions of incoming network traffic that contain addressing information required for the network traffic to reach an intended application or function, sorting the incoming network traffic into the groups based in part on the inspection of the portions of the network traffic, and dynamically directing the network traffic for the 5G network based on a particular security level associated with a particular application or a particular function of each of the groups.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventor: Venson Shaw
  • Publication number: 20220007193
    Abstract: The technology includes a method performed by a security system of a 5G network to thwart a cyberattack. The security system is instantiated to monitor and control network traffic at a perimeter of the 5G network in accordance with a security model based on a vulnerability parameter, a risk parameter, and a threat parameter. The security system can process the network traffic with the security model to output a vulnerability-risk-threat (VRT) score that characterizes the network traffic in relation to the parameters. Based on the VRT score, the system redirects the network traffic to a containment area that mimics an intended destination or related process of the network traffic to induce malicious VRT traffic. When malicious VRT traffic is detected, the security system can, for example, prevent the network traffic from being communicated the 5G network.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventor: Venson Shaw
  • Publication number: 20220006869
    Abstract: Concepts and technologies disclosed herein are directed to master service orchestration of virtual network functions (“VNFs”). According to one aspect of the concepts and technologies disclosed herein, a network functions virtualization (“NFV”) platform includes a hardware resources layer including a plurality of hardware resources, a plurality of VNF resource pools, a plurality of service controllers corresponding to the plurality of VNF resource pools, and a master service orchestrator. The master service orchestrator can, when executed by at least a portion of the plurality of hardware resources, causes the master service orchestrator to perform operations. In particular, the master service orchestrator can receive, from a user equipment (“UE”), a service request.
    Type: Application
    Filed: September 20, 2021
    Publication date: January 6, 2022
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Rajendra Prasad Kodaypak, Venson Shaw
  • Publication number: 20220007192
    Abstract: The technology includes a method performed by a security system of a 5G network to protect against a cyberattack. The system can instantiate a function to monitor and control incoming network traffic at a perimeter of the 5G network in accordance with a security model that is based on a vulnerability parameter, a risk parameter, and a threat parameter. The system can process the incoming network traffic with the security model to output a vulnerability-risk-threat (VRT) score that characterizes the incoming network traffic in relation to the vulnerability parameter, the risk parameter, and the threat parameter, and causes one or more actions based on the VRT score to mitigate the cyberattack. The action(s) can include blocking the incoming network traffic at the perimeter of the 5G network.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventor: Venson Shaw
  • Publication number: 20220007194
    Abstract: The technology includes a method performed by a security system of a 5G network. The system can instantiate an agent that monitors and control incoming network traffic at a perimeter of the 5G network in accordance with a security model. The agent can process the incoming network traffic with the security model to output a vulnerability-risk-threat (VRT) score that characterizes the incoming network traffic in relation to a vulnerability parameter, a risk parameter, and a threat parameter. The agent compares the VRT score with a threshold value to determine a likelihood that the incoming network traffic includes VRT traffic. The agent communicates at least an indication of the VRT score and incoming network traffic to a central component, which collects VRT information from multiple agents to generate an update for the security model.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventor: Venson Shaw
  • Patent number: 11218941
    Abstract: Aspects of the subject disclosure may include, for example, a method including determining according to first information associated with a first wireless access network and second information associated with a second wireless access network, whether to facilitate communication in a geographic area between a first wireless communication device and a communication network via the second wireless access network, and, in turn, directing a second wireless access device of the second wireless access network to facilitate the communication between the first wireless communication device and the communication network, and directing a first wireless access device of the first wireless access network to stop facilitating second communication between the first wireless communication device and the communication network. Other embodiments are disclosed.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: January 4, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Venson Shaw, Sangar Dowlatkhah
  • Patent number: 11206542
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a connected device with the 5G network and request a personalized signature from the connected device. The system can create a schedule for the personalized signature to be sent from the connected device to the 5G network and send the connected device the schedule. The 5G network can monitor for the personalized signature at the times in the schedule. In response to not receiving the personalized signature from the connected device at a scheduled time in the schedule, the system can determine that the connected device is at risk of a cyber-attack. In response to determining that the connected device is at risk of the cyber-attack, the system can deauthorize the connected device.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: December 21, 2021
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11202255
    Abstract: A method performed by a network access node (NAN) can re-authenticate a network entity for a telecommunications network with a locally cached profile. The NAN can receive a connection request of a wireless device to access the network, receive an indication that the network entity has been authenticated by the unified data management (UDM) to provide access to the network, fetch entity profile data from the UDM, and cache the entity profile data locally, along with an indication of a time period during which the cached profile data is available for re-authenticating the network entity without needing to re-fetch the entity profile data or check with the UDM.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: December 14, 2021
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Publication number: 20210374009
    Abstract: Aspects of the subject disclosure may include, for example, a method including enabling, by a system comprising a processor, a first modification of a first user profile at a secondary data repository of a communication network; the first modification is directed by a first application operating at a first communication device of the communication network. A usage event is identified that is associated with the first communication device according to the first modification to the first user profile. A second modification to a second user profile is replicated at a primary data repository according to a change in operation of a second application associated with the usage event that is identified to the first communication device; the replication is performed according to an update policy for the primary data repository. Other embodiments are disclosed.
    Type: Application
    Filed: August 13, 2021
    Publication date: December 2, 2021
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw
  • Patent number: 11184681
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, dividing a media content item into a plurality of media content segments, at each media content segment of the plurality of media content segments, applying motion estimation between at least two video frames of the media content segment to determine a content weight for the media content segment, determining a bit rate for the media content segment according to the determined content weight for the media content segment, and encoding the media content segment at the determined bit rates to generate a data stream for the media content segment, whereby a plurality of data streams for the plurality of media content segments of the media content are generated, and transmitting the plurality of data streams for the plurality of media content segments of the media content to the one or more media devices. Other embodiments are disclosed.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: November 23, 2021
    Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Venson Shaw, Jun Shen
  • Publication number: 20210360408
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a connected device with the 5G network and request a personalized signature from the connected device. The system can create a schedule for the personalized signature to be sent from the connected device to the 5G network and send the connected device the schedule. The 5G network can monitor for the personalized signature at the times in the schedule. In response to not receiving the personalized signature from the connected device at a scheduled time in the schedule, the system can determine that the connected device is at risk of a cyber-attack. In response to determining that the connected device is at risk of the cyber-attack, the system can deauthorize the connected device.
    Type: Application
    Filed: May 14, 2020
    Publication date: November 18, 2021
    Inventors: Venson Shaw, Sunil Lingayat