Patents by Inventor Vinod Kumar Choyi

Vinod Kumar Choyi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230106668
    Abstract: Systems and methods described herein provide for User Equipment (UE)-initiated authentication and authorization updates to Network Slice-Specific Authentication and Authorization (NSSAA). A network device in a core network receives a message from a user device outside of the core network, wherein the message includes a request to initiate a NSSAA procedure. The network device initiates the NSSAA procedure in response to the request. The systems and methods also provide for UE-initiated authorization revocation of NSSAA.
    Type: Application
    Filed: October 1, 2021
    Publication date: April 6, 2023
    Inventors: David Taft, Maqbool Chauhan, Sudhakar Reddy Patil, Vinod Kumar Choyi, Jerry Steben
  • Publication number: 20230106940
    Abstract: Systems and methods enable secure service-based communications in networks that use a Services Communications Proxy (SCP). A Network Function (NF) producer receives a service request including an authorization token and a signed service request object, wherein the service request originates from an NF consumer of the wireless core network and is forwarded to the NF producer via the SCP. The NF producer verifies the signed service request object and generates, after the verifying, a service response. The service response includes a signed service response object. The NF producer sends, to the NF consumer and via the SCP, the service response with the signed service response object.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 6, 2023
    Inventors: Vinod Kumar Choyi, Hossein M. Ahmadi, Sudhakar Reddy Patil
  • Publication number: 20230064698
    Abstract: Systems and methods leverage trust anchors to generate tokens which can then be used by network functions (NFs). A virtualization infrastructure manager (VIM) for a virtualized platform receives a NF software package and a certificate request token (CRT) from a management function. The NF is a virtual NF, a containerized NF, or another virtual entity (xNF) to be deployed. The CRT is digitally signed by the management function and includes a network address of a trust anchor platform and a NF profile. The VIM deploys the NF and provides the CRT to the NF. The NF obtains from the CRT the network address of the trust anchor platform, generates a certificate signing request (CSR) for a digital certificate, and submits the CSR and the CRT to the trust anchor platform. The NF receives a digital certificate from the trust anchor platform based on validation of both the CSR and CRT.
    Type: Application
    Filed: November 9, 2022
    Publication date: March 2, 2023
    Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Jayesh Kumar Laad
  • Publication number: 20230047880
    Abstract: Disclosed are embodiments for injecting sidecar proxy capabilities into non-sidecar applications, allowing such non-sidecar applications to communicate with a service mesh architecture. In an embodiment, a method comprises receiving a request to instantiate a proxy for a non-sidecar application at a service mesh gateway (SMG). The SMG then instantiates the proxy in response to the request and broadcasts network information of the non-sidecar application to a mesh controller deployed in a containerized environment. Finally, the SMG (via the proxy) transmits data over a control plane that is communicatively coupled to the mesh controller.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 16, 2023
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: David Robert LENROW, Myron Eugene BAGWELL, Vinod Kumar CHOYI, Michael A. GALLAGHER
  • Patent number: 11582589
    Abstract: A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: February 14, 2023
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: David Taft, Vinod Kumar Choyi, Maqbool Chauhan, Jerry Steben, Parry Cornell Booker, Hossein M. Ahmadi, Minbao Li, Sudhakar Reddy Patil
  • Publication number: 20220408256
    Abstract: One or more devices may include a credentials server. The credentials server may be configured to: receive primary Standalone Non-Public Network (SNPN) credentials for a User Equipment device (UE) and SNPN information. The primary SNPN credentials and the SNPN information are associated with the UE and an SNPN. The devices may be configured to generate temporary SNPN credentials based on the primary SNPN credentials and the SNPNN information. The devices may forward the temporary SNPN credentials to the SNPN.
    Type: Application
    Filed: June 16, 2021
    Publication date: December 22, 2022
    Inventors: Vinod Kumar Choyi, Samita Chakrabarti
  • Patent number: 11522721
    Abstract: Systems and methods leverage trust anchors to generate tokens which can then be used by network functions (NFs). A virtualization infrastructure manager (VIM) for a virtualized platform receives a NF software package and a certificate request token (CRT) from a management function. The NF is a virtual NF, a containerized NF, or another virtual entity (xNF) to be deployed. The CRT is digitally signed by the management function and includes a network address of a trust anchor platform and a NF profile. The VIM deploys the NF and provides the CRT to the NF. The NF obtains from the CRT the network address of the trust anchor platform, generates a certificate signing request (CSR) for a digital certificate, and submits the CSR and the CRT to the trust anchor platform. The NF receives a digital certificate from the trust anchor platform based on validation of both the CSR and CRT.
    Type: Grant
    Filed: April 7, 2020
    Date of Patent: December 6, 2022
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Jayesh Kumar Laad
  • Publication number: 20220386130
    Abstract: In some implementations, a device of a network may receive, from a user equipment (UE), a request associated with enabling the UE to access a network, wherein the request includes a first routing indicator. The device may identify an authentication manager, of the network, that is mapped to the first routing indicator in an entry of a routing table of the network. The device may route the request to the authentication manager of the network to permit the authentication manager to authenticate the UE. The device may purge, based on the request being routed to the authentication manager, the entry to remove the first routing indicator from the routing table. The device may store, after purging the entry, a second routing indicator in the entry to map the second routing indicator to the authentication manager, wherein the second routing indicator is different from the first routing indicator.
    Type: Application
    Filed: August 11, 2022
    Publication date: December 1, 2022
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Vinod Kumar CHOYI, Sudhakar Reddy PATIL, Robert AVANES
  • Patent number: 11509476
    Abstract: Systems and methods enable secure service-based communications in networks that use a Services Communications Proxy (SCP). A Network Function (NF) producer receives a service request including an authorization token and a signed service request object, wherein the service request originates from an NF consumer of the wireless core network and is forwarded to the NF producer via the SCP. The NF producer verifies the signed service request object and generates, after the verifying, a service response. The service response includes a signed service response object. The NF producer sends, to the NF consumer and via the SCP, the service response with the signed service response object.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: November 22, 2022
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Vinod Kumar Choyi, Hossein M. Ahmadi, Sudhakar Reddy Patil
  • Publication number: 20220353263
    Abstract: A network device receives, from a requester, an access token request associated with subscribing a consumer network function (NF) to a resource provided by a producer NF, where the access token request includes a notification identifier identifying where the consumer NF is to receive content and/or notifications, associated with the resource, from the producer NF. The network device validates the requester and generates an access token and an access token response based on successfully validating the requester. The network device signs the notification identifier as a component of the access token response and sends the access token response, with the signed notification identifier, to the requester for use in requesting a subscription to the resource for the consumer NF from the producer NF.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 3, 2022
    Inventors: Vinod Kumar Choyi, Ali Imdad Malik, Sudhakar Reddy Patil
  • Publication number: 20220337994
    Abstract: A method may include receiving, at a network device, a registration request that comprises a subscription concealed identifier (SUCI) associated with a particular user equipment (UE) device. The network device determines whether the SUCI indicates a request for null-scheme network access; and retrieves a scheme authorization parameter for the UE device when it is determined that the SUCI indicates a request for null-scheme network access. The scheme authorization parameter indicates whether the UE device is authorized for null-scheme access to a service provider network. The network device determines whether the UE device is authorized for null-scheme network access based on the retrieved scheme authorization parameter and performs processing associated with null-scheme network access when it is determined that the particular UE device is authorized for null-scheme network access.
    Type: Application
    Filed: April 16, 2021
    Publication date: October 20, 2022
    Inventors: Yousif Targali, Vinod Kumar Choyi, Sudhakar Reddy Patil, Michael A. Gallagher
  • Publication number: 20220321678
    Abstract: A caching entity may store a cached copy of a service layer resource. An original hosting entity may maintain a registry of the corresponding cached resources. Optionally, the original hosting entity may set cache parameters to govern the lifetime of the cache on a caching entity. The caching entity may keep storing the cached copy of the resource and the original hosting entity may obtain statistics about the cached resource. By knowing the statistics, e.g. how many times a resource is retrieved on each caching entity, the original hosting entity may better manage the resource.
    Type: Application
    Filed: June 16, 2022
    Publication date: October 6, 2022
    Inventors: Zhuo Chen, Dale N. Seed, Michael Starsinic, William Robert Flynn, IV, Rocco Di Girolamo, Quang Ly, Shamim Akbar Rahman, Gregory S. Sternberg, Catalina Mihaela Mladin, Yogendra C. Shah, Vinod Kumar Choyi
  • Patent number: 11451555
    Abstract: Embodiments concern a dynamic authorization framework. Security Classification Process (SCP) is the process of classifying raw data, information extracted from raw data, content or code from security-value perspective. Security Achievability Determination Process (SADP) is a process based on a SV/SC that has been assigned, the RHE may determine the Security Requirements and how the security requirements may be achieved. During the Security Achievability Listing Process (SALP), the RHE uploads onto the Resource Listing Entity (RLE) the URI of the resource, the SAM associated with the resource and optionally a digital certificate associated with the resource. During the SAM Assessment Process (SAMAP) process, a Client evaluates the security mechanisms that must be carried out in order to meet the SAM that was provided as part of the Discovery Process (DP). Based on the SAM obtained from the RLE, the Client may initiate a Security Achievability Enabling Process (SAEP).
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: September 20, 2022
    Assignee: Convida Wireless, LLC
    Inventors: Vinod Kumar Choyi, Chonggang Wang, Shamim Akbar Rahman, Quang Ly, Xu Li, Zhuo Chen, Rocco Di Girolamo
  • Patent number: 11432158
    Abstract: In some implementations, a device of a network may receive, from a user equipment (UE), a request associated with enabling the UE to access a network, wherein the request includes a first routing indicator. The device may identify an authentication manager, of the network, that is mapped to the first routing indicator in an entry of a routing table of the network. The device may route the request to the authentication manager of the network to permit the authentication manager to authenticate the UE. The device may purge, based on the request being routed to the authentication manager, the entry to remove the first routing indicator from the routing table. The device may store, after purging the entry, a second routing indicator in the entry to map the second routing indicator to the authentication manager, wherein the second routing indicator is different from the first routing indicator.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: August 30, 2022
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Vinod Kumar Choyi, Sudhakar Reddy Patil, Robert Avanes
  • Patent number: 11405481
    Abstract: A caching entity may store a cached copy of a service layer resource. An original hosting entity may maintain a registry of the corresponding cached resources. Optionally, the original hosting entity may set cache parameters to govern the lifetime of the cache on a caching entity. The caching entity may keep storing the cached copy of the resource and the original hosting entity may obtain statistics about the cached resource. By knowing the statistics, e.g. how many times a resource is retrieved on each caching entity, the original hosting entity may better manage the resource.
    Type: Grant
    Filed: June 13, 2017
    Date of Patent: August 2, 2022
    Assignee: Convida Wireless, LLC
    Inventors: Zhuo Chen, Dale N. Seed, Michael F. Starsinic, William Robert Flynn, IV, Rocco Di Girolamo, Quang Ly, Shamim Akbar Rahman, Gregory S. Sternberg, Catalina Mihaela Mladin, Yogendra C. Shah, Vinod Kumar Choyi
  • Publication number: 20220217540
    Abstract: Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
    Type: Application
    Filed: January 7, 2021
    Publication date: July 7, 2022
    Inventors: Vinod Kumar Choyi, Kristen Sydney Young, Yousif Targali, Michael A. Gallagher
  • Publication number: 20220191667
    Abstract: It is recognized herein that current approaches to traffic steering in M2M systems lack capabilities, particularly with respect to traversing value added services in an operator's network. As described herein, nodes or apparatuses at a machine-to-machine (M2M) service layer can leverage value added services that are deployed in an operator's network. The M2M service layer may add metadata to downlink traffic so that the metadata can be used to assist with steering and processing data in the operator's value added services (VASs) network. By of example, the M2M service layer can use a control plane interface to push polices into a network operator's VASs network, and to allow functions in the VASs network to extract information from the M2M service layer.
    Type: Application
    Filed: March 3, 2022
    Publication date: June 16, 2022
    Inventors: Michael F. Starsinic, Dale N. Seed, William Robert Flynn, IV, Vinod Kumar Choyi, Quang Ly, Shamim Akbar Rahman, Zhuo Chen, Yogendra C. Shah, Rocco Di Girolamo
  • Publication number: 20220141262
    Abstract: IoT service layer capabilities may be employed to automate and simplify the service enrollment process for IoT service subscribers/enrollees. These capabilities enable virtualization of a service subscriber and the physical IoT devices, applications, data and authorized users of the subscriber into a software profile that is representative of the subscriber. Once virtualized, a service subscriber may then delegate the complexities and burden of service enrollment to an automated IoT service enrollment software function.
    Type: Application
    Filed: January 19, 2022
    Publication date: May 5, 2022
    Inventors: Dale N. Seed, William Robert Flynn, IV, Quang Ly, Rocco Di Girolamo, Zhuo Chen, Catalina Mihaela Mladin, Shoshana Loeb, Mahmoud Watfa, Michael F. Starsinic, Vinod Kumar Choyi
  • Patent number: 11323862
    Abstract: It is recognized herein that current approaches to traffic steering in M2M systems lack capabilities, particularly with respect to traversing value added services in an operator's network. As described herein, nodes or apparatuses at a machine-to-machine (M2M) service layer can leverage value added services that are deployed in an operator's network. The M2M service layer may add metadata to downlink traffic so that the metadata can be used to assist with steering and processing data in the operator's value added services (VASs) network. By of example, the M2M service layer can use a control plane interface to push polices into a network operator's VASs network, and to allow functions in the VASs network to extract information from the M2M service layer.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: May 3, 2022
    Assignee: Convida Wireless, LLC
    Inventors: Michael F. Starsinic, Dale N. Seed, William Robert Flynn, IV, Vinod Kumar Choyi, Quang Ly, Shamim Akbar Rahman, Zhuo Chen, Yogendra C. Shah, Rocco Di Girolamo
  • Publication number: 20220109660
    Abstract: Existing approaches to security within network, for instance oneM2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be “at rest,” such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.
    Type: Application
    Filed: December 20, 2021
    Publication date: April 7, 2022
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly, Zhuo Chen, William Robert Flynn, IV