Patents by Inventor Yanbing Su

Yanbing Su has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250119369
    Abstract: A network assessment system for generating subjective quality ratings for Internet protocol multimedia subsystem (IMS) data sessions in real-time. The system measures real-time telecommunications network data during an IMS data session, processes the data using a trained model, and receives a subjective quality rating usable to modify the performance of a node in instances where the node does not typically have an associated subjective quality rating or in instances where the node is not associated with a standardized subjective quality rating.
    Type: Application
    Filed: October 28, 2024
    Publication date: April 10, 2025
    Inventors: Yinjun Zhu, Jan Olav Opedal, Suchit Satpathy, Srikrishna Srinivasan, Yanbing Su
  • Patent number: 12192228
    Abstract: Embodiments include a method for vulnerability management of a computer system. The method includes collecting vulnerability information over a network from a publishing source. The vulnerability information includes a known vulnerability of a first computer asset, where at least some of the vulnerability information is a set of cybersecurity vulnerabilities and exposures (CVEs) published online. Further, at least some of the CVEs is in a human-readable format. The method further includes collecting system information of the computer system subject to the vulnerability management, where the system information includes information about a second computer asset of the computer system. The method further includes processing the collected vulnerability information and the collected system information by interpreting the human-readable CVEs and correlating the interpreted CVEs with the collected system information.
    Type: Grant
    Filed: June 9, 2023
    Date of Patent: January 7, 2025
    Assignee: T-Mobile USA, Inc.
    Inventors: Pradeep Cruz, Jan Olav Opedal, Srikrishna Srinivasan, Yanbing Su
  • Patent number: 12132627
    Abstract: A network assessment system for generating subjective quality ratings for Internet protocol multimedia subsystem (IMS) data sessions in real-time. The system measures real-time telecommunications network data during an IMS data session, processes the data using a trained model, and receives a subjective quality rating usable to modify the performance of a node in instances where the node does not typically have an associated subjective quality rating or in instances where the node is not associated with a standardized subjective quality rating.
    Type: Grant
    Filed: August 4, 2023
    Date of Patent: October 29, 2024
    Assignee: T-Mobile USA, Inc.
    Inventors: Yinjun Zhu, Jan Olav Opedal, Suchit Satpathy, Srikrishna Srinivasan, Yanbing Su
  • Patent number: 11848814
    Abstract: In various examples, description data may be used by an engine to correlate a subset of alarms representing a network incident. A machine learning model may then be used to predict a likelihood that one or more of the alarms within the subset is a root cause of the network incident. This root cause may then be displayed on a graphical user interface. As a result, alarm fatigue experienced by network administrators may be reduced.
    Type: Grant
    Filed: November 17, 2021
    Date of Patent: December 19, 2023
    Assignee: T-Mobile Innovations LLC
    Inventors: Srikrishna Srinivasan, Yanbing Su, Jia Yan, Faisal Waris, Pradeep Christopher Cruz
  • Publication number: 20230319096
    Abstract: Embodiments include a method for vulnerability management of a computer system. The method includes collecting vulnerability information over a network from a publishing source. The vulnerability information includes a known vulnerability of a first computer asset, where at least some of the vulnerability information is a set of cybersecurity vulnerabilities and exposures (CVEs) published online. Further, at least some of the CVEs is in a human-readable format. The method further includes collecting system information of the computer system subject to the vulnerability management, where the system information includes information about a second computer asset of the computer system. The method further includes processing the collected vulnerability information and the collected system information by interpreting the human-readable CVEs and correlating the interpreted CVEs with the collected system information.
    Type: Application
    Filed: June 9, 2023
    Publication date: October 5, 2023
    Inventors: Pradeep Cruz, Jan Olav Opedal, Srikrishna Srinivasan, Yanbing Su
  • Patent number: 11729197
    Abstract: Embodiments include a method for vulnerability management of a computer system. The method includes collecting vulnerability information over a network from a publishing source. The vulnerability information includes a known vulnerability of a first computer asset, where at least some of the vulnerability information is a set of cybersecurity vulnerabilities and exposures (CVEs) published online. Further, at least some of the CVEs is in a human-readable format. The method further includes collecting system information of the computer system subject to the vulnerability management, where the system information includes information about a second computer asset of the computer system. The method further includes processing the collected vulnerability information and the collected system information by interpreting the human-readable CVEs and correlating the interpreted CVEs with the collected system information.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: August 15, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Pradeep Cruz, Jan Olav Opedal, Srikrishna Srinivasan, Yanbing Su
  • Publication number: 20230155881
    Abstract: In various examples, description data may be used by an engine to correlate a subset of alarms representing a network incident. A machine learning model may then be used to predict a likelihood that one or more of the alarms within the subset is a root cause of the network incident. This root cause may then be displayed on a graphical user interface. As a result, alarm fatigue experienced by network administrators may be reduced.
    Type: Application
    Filed: November 17, 2021
    Publication date: May 18, 2023
    Inventors: Srikrishna Srinivasan, Yanbing Su, Jia Yan, Faisal Waris, Pradeep Christopher Cruz
  • Publication number: 20210152588
    Abstract: Embodiments include a method for vulnerability management of a computer system. The method includes collecting vulnerability information over a network from a publishing source. The vulnerability information includes a known vulnerability of a first computer asset, where at least some of the vulnerability information is a set of cybersecurity vulnerabilities and exposures (CVEs) published online. Further, at least some of the CVEs is in a human-readable format. The method further includes collecting system information of the computer system subject to the vulnerability management, where the system information includes information about a second computer asset of the computer system. The method further includes processing the collected vulnerability information and the collected system information by interpreting the human-readable CVEs and correlating the interpreted CVEs with the collected system information.
    Type: Application
    Filed: November 19, 2019
    Publication date: May 20, 2021
    Inventors: Pradeep Cruz, Jan Olav Opedal, Srikrishna Srinivasan, Yanbing Su