Patents by Inventor Vinod Kumar Choyi
Vinod Kumar Choyi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230064698Abstract: Systems and methods leverage trust anchors to generate tokens which can then be used by network functions (NFs). A virtualization infrastructure manager (VIM) for a virtualized platform receives a NF software package and a certificate request token (CRT) from a management function. The NF is a virtual NF, a containerized NF, or another virtual entity (xNF) to be deployed. The CRT is digitally signed by the management function and includes a network address of a trust anchor platform and a NF profile. The VIM deploys the NF and provides the CRT to the NF. The NF obtains from the CRT the network address of the trust anchor platform, generates a certificate signing request (CSR) for a digital certificate, and submits the CSR and the CRT to the trust anchor platform. The NF receives a digital certificate from the trust anchor platform based on validation of both the CSR and CRT.Type: ApplicationFiled: November 9, 2022Publication date: March 2, 2023Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Jayesh Kumar Laad
-
Publication number: 20230047880Abstract: Disclosed are embodiments for injecting sidecar proxy capabilities into non-sidecar applications, allowing such non-sidecar applications to communicate with a service mesh architecture. In an embodiment, a method comprises receiving a request to instantiate a proxy for a non-sidecar application at a service mesh gateway (SMG). The SMG then instantiates the proxy in response to the request and broadcasts network information of the non-sidecar application to a mesh controller deployed in a containerized environment. Finally, the SMG (via the proxy) transmits data over a control plane that is communicatively coupled to the mesh controller.Type: ApplicationFiled: August 12, 2021Publication date: February 16, 2023Applicant: VERIZON PATENT AND LICENSING INC.Inventors: David Robert LENROW, Myron Eugene BAGWELL, Vinod Kumar CHOYI, Michael A. GALLAGHER
-
Patent number: 11582589Abstract: A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.Type: GrantFiled: June 11, 2020Date of Patent: February 14, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: David Taft, Vinod Kumar Choyi, Maqbool Chauhan, Jerry Steben, Parry Cornell Booker, Hossein M. Ahmadi, Minbao Li, Sudhakar Reddy Patil
-
Publication number: 20220408256Abstract: One or more devices may include a credentials server. The credentials server may be configured to: receive primary Standalone Non-Public Network (SNPN) credentials for a User Equipment device (UE) and SNPN information. The primary SNPN credentials and the SNPN information are associated with the UE and an SNPN. The devices may be configured to generate temporary SNPN credentials based on the primary SNPN credentials and the SNPNN information. The devices may forward the temporary SNPN credentials to the SNPN.Type: ApplicationFiled: June 16, 2021Publication date: December 22, 2022Inventors: Vinod Kumar Choyi, Samita Chakrabarti
-
Patent number: 11522721Abstract: Systems and methods leverage trust anchors to generate tokens which can then be used by network functions (NFs). A virtualization infrastructure manager (VIM) for a virtualized platform receives a NF software package and a certificate request token (CRT) from a management function. The NF is a virtual NF, a containerized NF, or another virtual entity (xNF) to be deployed. The CRT is digitally signed by the management function and includes a network address of a trust anchor platform and a NF profile. The VIM deploys the NF and provides the CRT to the NF. The NF obtains from the CRT the network address of the trust anchor platform, generates a certificate signing request (CSR) for a digital certificate, and submits the CSR and the CRT to the trust anchor platform. The NF receives a digital certificate from the trust anchor platform based on validation of both the CSR and CRT.Type: GrantFiled: April 7, 2020Date of Patent: December 6, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Jayesh Kumar Laad
-
Publication number: 20220386130Abstract: In some implementations, a device of a network may receive, from a user equipment (UE), a request associated with enabling the UE to access a network, wherein the request includes a first routing indicator. The device may identify an authentication manager, of the network, that is mapped to the first routing indicator in an entry of a routing table of the network. The device may route the request to the authentication manager of the network to permit the authentication manager to authenticate the UE. The device may purge, based on the request being routed to the authentication manager, the entry to remove the first routing indicator from the routing table. The device may store, after purging the entry, a second routing indicator in the entry to map the second routing indicator to the authentication manager, wherein the second routing indicator is different from the first routing indicator.Type: ApplicationFiled: August 11, 2022Publication date: December 1, 2022Applicant: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar CHOYI, Sudhakar Reddy PATIL, Robert AVANES
-
Patent number: 11509476Abstract: Systems and methods enable secure service-based communications in networks that use a Services Communications Proxy (SCP). A Network Function (NF) producer receives a service request including an authorization token and a signed service request object, wherein the service request originates from an NF consumer of the wireless core network and is forwarded to the NF producer via the SCP. The NF producer verifies the signed service request object and generates, after the verifying, a service response. The service response includes a signed service response object. The NF producer sends, to the NF consumer and via the SCP, the service response with the signed service response object.Type: GrantFiled: February 12, 2020Date of Patent: November 22, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Hossein M. Ahmadi, Sudhakar Reddy Patil
-
Publication number: 20220353263Abstract: A network device receives, from a requester, an access token request associated with subscribing a consumer network function (NF) to a resource provided by a producer NF, where the access token request includes a notification identifier identifying where the consumer NF is to receive content and/or notifications, associated with the resource, from the producer NF. The network device validates the requester and generates an access token and an access token response based on successfully validating the requester. The network device signs the notification identifier as a component of the access token response and sends the access token response, with the signed notification identifier, to the requester for use in requesting a subscription to the resource for the consumer NF from the producer NF.Type: ApplicationFiled: April 28, 2021Publication date: November 3, 2022Inventors: Vinod Kumar Choyi, Ali Imdad Malik, Sudhakar Reddy Patil
-
Publication number: 20220337994Abstract: A method may include receiving, at a network device, a registration request that comprises a subscription concealed identifier (SUCI) associated with a particular user equipment (UE) device. The network device determines whether the SUCI indicates a request for null-scheme network access; and retrieves a scheme authorization parameter for the UE device when it is determined that the SUCI indicates a request for null-scheme network access. The scheme authorization parameter indicates whether the UE device is authorized for null-scheme access to a service provider network. The network device determines whether the UE device is authorized for null-scheme network access based on the retrieved scheme authorization parameter and performs processing associated with null-scheme network access when it is determined that the particular UE device is authorized for null-scheme network access.Type: ApplicationFiled: April 16, 2021Publication date: October 20, 2022Inventors: Yousif Targali, Vinod Kumar Choyi, Sudhakar Reddy Patil, Michael A. Gallagher
-
Publication number: 20220321678Abstract: A caching entity may store a cached copy of a service layer resource. An original hosting entity may maintain a registry of the corresponding cached resources. Optionally, the original hosting entity may set cache parameters to govern the lifetime of the cache on a caching entity. The caching entity may keep storing the cached copy of the resource and the original hosting entity may obtain statistics about the cached resource. By knowing the statistics, e.g. how many times a resource is retrieved on each caching entity, the original hosting entity may better manage the resource.Type: ApplicationFiled: June 16, 2022Publication date: October 6, 2022Inventors: Zhuo Chen, Dale N. Seed, Michael Starsinic, William Robert Flynn, IV, Rocco Di Girolamo, Quang Ly, Shamim Akbar Rahman, Gregory S. Sternberg, Catalina Mihaela Mladin, Yogendra C. Shah, Vinod Kumar Choyi
-
Patent number: 11451555Abstract: Embodiments concern a dynamic authorization framework. Security Classification Process (SCP) is the process of classifying raw data, information extracted from raw data, content or code from security-value perspective. Security Achievability Determination Process (SADP) is a process based on a SV/SC that has been assigned, the RHE may determine the Security Requirements and how the security requirements may be achieved. During the Security Achievability Listing Process (SALP), the RHE uploads onto the Resource Listing Entity (RLE) the URI of the resource, the SAM associated with the resource and optionally a digital certificate associated with the resource. During the SAM Assessment Process (SAMAP) process, a Client evaluates the security mechanisms that must be carried out in order to meet the SAM that was provided as part of the Discovery Process (DP). Based on the SAM obtained from the RLE, the Client may initiate a Security Achievability Enabling Process (SAEP).Type: GrantFiled: November 24, 2020Date of Patent: September 20, 2022Assignee: Convida Wireless, LLCInventors: Vinod Kumar Choyi, Chonggang Wang, Shamim Akbar Rahman, Quang Ly, Xu Li, Zhuo Chen, Rocco Di Girolamo
-
Patent number: 11432158Abstract: In some implementations, a device of a network may receive, from a user equipment (UE), a request associated with enabling the UE to access a network, wherein the request includes a first routing indicator. The device may identify an authentication manager, of the network, that is mapped to the first routing indicator in an entry of a routing table of the network. The device may route the request to the authentication manager of the network to permit the authentication manager to authenticate the UE. The device may purge, based on the request being routed to the authentication manager, the entry to remove the first routing indicator from the routing table. The device may store, after purging the entry, a second routing indicator in the entry to map the second routing indicator to the authentication manager, wherein the second routing indicator is different from the first routing indicator.Type: GrantFiled: August 10, 2020Date of Patent: August 30, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Robert Avanes
-
Patent number: 11405481Abstract: A caching entity may store a cached copy of a service layer resource. An original hosting entity may maintain a registry of the corresponding cached resources. Optionally, the original hosting entity may set cache parameters to govern the lifetime of the cache on a caching entity. The caching entity may keep storing the cached copy of the resource and the original hosting entity may obtain statistics about the cached resource. By knowing the statistics, e.g. how many times a resource is retrieved on each caching entity, the original hosting entity may better manage the resource.Type: GrantFiled: June 13, 2017Date of Patent: August 2, 2022Assignee: Convida Wireless, LLCInventors: Zhuo Chen, Dale N. Seed, Michael F. Starsinic, William Robert Flynn, IV, Rocco Di Girolamo, Quang Ly, Shamim Akbar Rahman, Gregory S. Sternberg, Catalina Mihaela Mladin, Yogendra C. Shah, Vinod Kumar Choyi
-
Publication number: 20220217540Abstract: Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.Type: ApplicationFiled: January 7, 2021Publication date: July 7, 2022Inventors: Vinod Kumar Choyi, Kristen Sydney Young, Yousif Targali, Michael A. Gallagher
-
Publication number: 20220191667Abstract: It is recognized herein that current approaches to traffic steering in M2M systems lack capabilities, particularly with respect to traversing value added services in an operator's network. As described herein, nodes or apparatuses at a machine-to-machine (M2M) service layer can leverage value added services that are deployed in an operator's network. The M2M service layer may add metadata to downlink traffic so that the metadata can be used to assist with steering and processing data in the operator's value added services (VASs) network. By of example, the M2M service layer can use a control plane interface to push polices into a network operator's VASs network, and to allow functions in the VASs network to extract information from the M2M service layer.Type: ApplicationFiled: March 3, 2022Publication date: June 16, 2022Inventors: Michael F. Starsinic, Dale N. Seed, William Robert Flynn, IV, Vinod Kumar Choyi, Quang Ly, Shamim Akbar Rahman, Zhuo Chen, Yogendra C. Shah, Rocco Di Girolamo
-
Publication number: 20220141262Abstract: IoT service layer capabilities may be employed to automate and simplify the service enrollment process for IoT service subscribers/enrollees. These capabilities enable virtualization of a service subscriber and the physical IoT devices, applications, data and authorized users of the subscriber into a software profile that is representative of the subscriber. Once virtualized, a service subscriber may then delegate the complexities and burden of service enrollment to an automated IoT service enrollment software function.Type: ApplicationFiled: January 19, 2022Publication date: May 5, 2022Inventors: Dale N. Seed, William Robert Flynn, IV, Quang Ly, Rocco Di Girolamo, Zhuo Chen, Catalina Mihaela Mladin, Shoshana Loeb, Mahmoud Watfa, Michael F. Starsinic, Vinod Kumar Choyi
-
Patent number: 11323862Abstract: It is recognized herein that current approaches to traffic steering in M2M systems lack capabilities, particularly with respect to traversing value added services in an operator's network. As described herein, nodes or apparatuses at a machine-to-machine (M2M) service layer can leverage value added services that are deployed in an operator's network. The M2M service layer may add metadata to downlink traffic so that the metadata can be used to assist with steering and processing data in the operator's value added services (VASs) network. By of example, the M2M service layer can use a control plane interface to push polices into a network operator's VASs network, and to allow functions in the VASs network to extract information from the M2M service layer.Type: GrantFiled: May 4, 2017Date of Patent: May 3, 2022Assignee: Convida Wireless, LLCInventors: Michael F. Starsinic, Dale N. Seed, William Robert Flynn, IV, Vinod Kumar Choyi, Quang Ly, Shamim Akbar Rahman, Zhuo Chen, Yogendra C. Shah, Rocco Di Girolamo
-
Publication number: 20220109660Abstract: Existing approaches to security within network, for instance oneM2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be “at rest,” such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.Type: ApplicationFiled: December 20, 2021Publication date: April 7, 2022Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly, Zhuo Chen, William Robert Flynn, IV
-
Patent number: 11265383Abstract: Systems and methods for enabling proximity services to be delivered as part of an application service and/or for providing tailored services and/or a differential quality of service (QoS) to a flow may be disclosed. For example, a temporary service name between an application and a server such as a D2D server may be established such that a UE and/or network may execute such a service at a later time without later involvement by the application and/or without exchanging credentials for the application with the network and vice versa.Type: GrantFiled: April 27, 2013Date of Patent: March 1, 2022Assignee: InterDigital Patent Holdings, Inc.Inventors: Alexander Reznik, Yogendra C. Shah, Eldad M. Zeira, Ravikumar V. Pragada, Balaji Raghothaman, Kiran K. Vanganuru, Gregory S. Sternberg, Vinod Kumar Choyi, Xavier De Foy
-
Patent number: 11265353Abstract: IoT service layer capabilities may be employed to automate and simplify the service enrollment process for IoT service subscribers/enrollees. These capabilities enable virtualization of a service subscriber and the physical IoT devices, applications, data and authorized users of the subscriber into a software profile that is representative of the subscriber. Once virtualized, a service subscriber may then delegate the complexities and burden of service enrollment to an automated IoT service enrollment software function.Type: GrantFiled: September 7, 2018Date of Patent: March 1, 2022Assignee: Convida Wireless, LLCInventors: Dale N. Seed, William Robert Flynn, IV, Quang Ly, Rocco Di Girolamo, Zhuo Chen, Catalina Mihaela Mladin, Shoshana Loeb, Mahmoud Watfa, Michael F. Starsinic, Vinod Kumar Choyi