Patents by Inventor Yogendra C. Shah

Yogendra C. Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11102122
    Abstract: Methods, system, and apparatuses may support end-to-end (E2E) quality of service (QoS) through the use of service layer (SL) sessions. For example, an application can communicate with a targeted device based on application specified schedule, latency, jitter, error rate, throughput, level of security, and cost requirements.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: August 24, 2021
    Assignee: Convida Wireless, LLC
    Inventors: Dale N. Seed, Michael F. Starsinic, Vinod Kumar Choyi, Quang Ly, Yogendra C. Shah, William Robert Flynn, IV, Shamim Akbar Rahman, Zhuo Chen
  • Patent number: 10999289
    Abstract: An IoT E2E Service Layer Security Management system supports methods and procedures to allow an application to establish, use, and teardown an IoT SL communication session that has application specified E2E security preferences and that targets one or more SL addressable targets (e.g., an IoT application, device, or gateway SL addressable resource). E2E SL Session based methods and procedures described herein achieve a required overall E2E security level, by allowing IoT SL instances to influence and coordinate hop security for a multi-hop communication path spanning across multiple intermediary nodes. The methods and procedures described herein reduce overhead, simplify and obviate the need for E2E service level nodes (initiation and termination nodes) from having to perform security service negotiation, in order to establish secure hop-by-hop security associations aligned with an E2E security requirement.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: May 4, 2021
    Assignee: Convida Wireless, LLC
    Inventors: Yogendra C. Shah, Vinod Kumar Choyi, Dale N. Seed, Michael F. Starsinic, William Robert Flynn, IV, Zhuo Chen
  • Patent number: 10880294
    Abstract: In a machine-to-machine/Internet-of-things environment, end-to-end authentication of devices separated by multiple hops is achieved via direct or delegated/intermediated negotiations using pre-provisioned hop-by-hop credentials, uniquely generated hop-by-hop credentials, and-or public key certificates, whereby remote resources and services may be discovered via single-hop communications, and then secure communications with the remote resources may be established using secure protocols appropriate to the resources and services and capabilities of end devices, and communication thereafter conducted directly without the overhead or risks engendered hop-by-hop translation.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: December 29, 2020
    Assignee: Convida Wireless, LLC
    Inventors: Vinod Kumar Choyi, Dale N. Seed, Yogendra C. Shah, Quang Ly, William Robert Flynn, IV, Michael F. Starsinic, Shamim Akbar Rahman, Zhuo Chen, Qing Li
  • Publication number: 20200351146
    Abstract: Enhancements to the device management functionality within service layer architecture of a Gateway node are described. The SL application registration procedure can be enhanced for devices in support of device management. Functionality can be added to the service layer to initiate automated request notification for DM purposes. Lightweight SL Transport Protocol bindings can support sending multiple DM commands called DM Action Scripts with a specific focus on the Constrained Application Protocol (CoAP) Protocol.
    Type: Application
    Filed: July 16, 2020
    Publication date: November 5, 2020
    Inventors: Quang Ly, Dale N. SEED, Michael F. Starsinic, Chonggang Wang, Rocco Di Girolamo, Vinod Kumar Choyi, William Robert Flynn, IV, Zhuo Chen, Shamim Akbar Rahman, Yogendra C. Shah, Xu Li, Catalina Mihaela Mladin, Lijun Dong
  • Patent number: 10797935
    Abstract: Enhancements to the device management functionality within service layer architecture of a Gateway node are described. The SL application registration procedure can be enhanced for devices in support of device management. Functionality can be added to the service layer to initiate automated request notification for DM purposes. Lightweight SL Transport Protocol bindings can support sending multiple DM commands called DM Action Scripts with a specific focus on the Constrained Application Protocol (CoAP) Protocol.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: October 6, 2020
    Assignee: Convida Wireless, LLC
    Inventors: Quang Ly, Dale N. Seed, Michael F. Starsinic, Chonggang Wang, Rocco Di Girolamo, Vinod Kumar Choyi, William Robert Flynn, IV, Zhuo Chen, Shamim Akbar Rahman, Yogendra C. Shah, Xu Li, Catalina Mihaela Mladin, Lijun Dong
  • Publication number: 20200287876
    Abstract: Existing approaches to security within network, for instance oneM2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be “at rest,” such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.
    Type: Application
    Filed: March 23, 2020
    Publication date: September 10, 2020
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly, Zhuo Chen, William Robert Flynn, IV
  • Patent number: 10637836
    Abstract: Existing approaches to security within network, for instance one M2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be “at rest,” such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 28, 2020
    Assignee: Convida Wireless, LLC
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly, Zhuo Chen, William Robert Flynn, IV
  • Publication number: 20190182098
    Abstract: Enhancements to the device management functionality within service layer architecture of a Gateway node are described. The SL application registration procedure can be enhanced for devices in support of device management. Functionality can be added to the service layer to initiate automated request notification for DM purposes. Lightweight SL Transport Protocol bindings can support sending multiple DM commands called DM Action Scripts with a specific focus on the Constrained Application Protocol (CoAP) Protocol.
    Type: Application
    Filed: September 2, 2016
    Publication date: June 13, 2019
    Inventors: Quang LY, Dale N. SEED, Michael F. STARSINIC, Chonggang WANG, Rocco DI GIROLAMO, Vinod Kumar CHOYI, William Robert FLYNN, IV, Zhuo CHEN, Shamim Akbar RAHMAN, Yogendra C. SHAH, Xu LI, Catalina Mihaela MLADIN, Lijun DONG
  • Publication number: 20190158997
    Abstract: It is recognized herein that current approaches to traffic steering in M2M systems lack capabilities, particularly with respect to traversing value added services in an operator's network. As described herein, nodes or apparatuses at a machine-to-machine (M2M) service layer can leverage value added services that are deployed in an operator's network. The M2M service layer may add metadata to downlink traffic so that the metadata can be used to assist with steering and processing data in the operator's value added services (VASs) network. By of example, the M2M service layer can use a control plane interface to push polices into a network operator's VASs network, and to allow functions in the VASs network to extract information from the M2M service layer.
    Type: Application
    Filed: May 4, 2017
    Publication date: May 23, 2019
    Inventors: Michael F. STARSINIC, Dale N. SEED, William Robert FLYNN, IV, Vinod Kumar CHOYI, Quang LY, Shamim Akbar RAHMAN, Zhuo CHEN, Yogendra C. SHAH, Rocco DI GIROLAMO
  • Publication number: 20190132236
    Abstract: IoT twinning groups can be dynamically created. These twinning groups can be activated based on selected triggers. As part of twinning operation, service delivery can be re-directing away from the primary device to the IoT twinning group. Messages originating from members of the IoT twinning group can be processed and forwarded externally as if they came from the primary device. Further, the twinning service can be de-activated based on selected triggers.
    Type: Application
    Filed: April 25, 2017
    Publication date: May 2, 2019
    Applicant: CONVIDA WIRELESS, LLC
    Inventors: Shamim Akbar RAHMAN, Dale N. SEED, Michael F. STARSINIC, Quang LY, William Robert FLYNN, IV, Vinod Kumar CHOYI, Zhuo CHEN, Yogendra C. SHAH
  • Publication number: 20190132412
    Abstract: A caching entity may store a cached copy of a service layer resource. An original hosting entity may maintain a registry of the corresponding cached resources. Optionally, the original hosting entity may set cache parameters to govern the lifetime of the cache on a caching entity. The caching entity may keep storing the cached copy of the resource and the original hosting entity may obtain statistics about the cached resource. By knowing the statistics, e.g. how many times a resource is retrieved on each caching entity, the original hosting entity may better manage the resource.
    Type: Application
    Filed: June 13, 2017
    Publication date: May 2, 2019
    Inventors: Zhuo CHEN, Dale N. SEED, Michael F. STARSINIC, William Robert FLYNN, IV, Rocco DI GIROLAMO, Quang LY, Shamim Akbar RAHMAN, Gregory S. STERNBERG, Catalina Mihaela MLADIN, Yogendra C. SHAH, Vinod Kumar CHOYI
  • Patent number: 10278231
    Abstract: In an embodiment, a client proxy provides an operating-system-functions (OS-functions) interface to client applications. The client proxy and each of the client applications resides on a wireless transmit/receive unit (WTRU). The client proxy receives, via the OS-functions interface, respective registrations from each of a plurality of the client applications. Each respective registration indicates a respective keep-alive-message signaling rate for the corresponding registered client application. The client proxy determines an optimal signaling rate based on the respective keep-alive message signaling rates indicated by the respective registrations. The client proxy generates proxy keep-alive signaling messages that collectively convey keep-alive-message information on behalf of the registered client applications. The client proxy transmits the generated proxy keep-alive signaling messages to a network node at the determined optimal signaling rate.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: April 30, 2019
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Dolores F. Howry, Ulises Olvera-Hernandez, Yogendra C. Shah, Peter S. Wang
  • Publication number: 20190036910
    Abstract: In a machine-to-machine/Internet-of-things environment, end-to-end authentication of devices separated by multiple hops is achieved via direct or delegated/intermediated negotiations using pre-provisioned hop-by-hop credentials, uniquely generated hop-by-hop credentials, and-or public key certificates, whereby remote resources and services may be discovered via single-hop communications, and then secure communications with the remote resources may be established using secure protocols appropriate to the resources and services and capabilities of end devices, and communication thereafter conducted directly without the overhead or risks engendered hop-by-hop translation.
    Type: Application
    Filed: September 21, 2018
    Publication date: January 31, 2019
    Inventors: Vinod Kumar Choyi, Dale N. Seed, Yogendra C. Shah, Quang Ly, William Robert Flynn, IV, Michael F. Starsinic, Shamim Akbar Rahman, Zhuo Chen, Qing Li
  • Publication number: 20190018979
    Abstract: In this disclosure, various issues related to data (information) privacy are addressed. For example, in an example embodiment, privacy and confidentiality of data is maintained while being consumed by a third party entity. As described herein, an entity may be able to perform secure and trustworthy operations, such as various computations and algorithmic functions for example, on private data without having direct access to the data, thereby protecting the data.
    Type: Application
    Filed: December 29, 2016
    Publication date: January 17, 2019
    Inventors: Alec BRUSILOVSKY, Yogendra C. SHAH
  • Publication number: 20190007406
    Abstract: Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a WTRU, may request access to a service controlled by an access control entity (ACE). The user may be authenticated with a user authenticator and assertion function (UAAF), producing a result. A user assertion may be provided that includes the user authentication result, a user assurance level, and/or a user freshness level. The WTRU may be authenticated with a device authenticator and assertion function (DAAF), producing an associated result. A device assertion may be provided that may include the device authentication result, a device assurance level, and/or a device freshness level. The assertions may be bound together to receive access to a service or resource.
    Type: Application
    Filed: July 25, 2018
    Publication date: January 3, 2019
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Michael V. Meyerstein, Louis J. Guccione
  • Publication number: 20180332047
    Abstract: An IoT E2E Service Layer Security Management system supports methods/procedures to allow an application to establish, use, and teardown an IoT SL communication session that has application specified E2E security preferences and that targets one or more SL addressable targets (e.g. an IoT application, device, or gateway SL addressable resource). E2E SL Session based methods/procedures achieve a required overall E2E security level, by allowing IoT SL instances to influence and coordinate hop security for a multi-hop communication path spanning across multiple intermediary nodes. Methods/procedures reduce overhead, simplify and obviate the need for E2E service level nodes (initiation/termination nodes) from having to perform security service negotiation, in order to establish secure hop-by-hop security associations aligned with an E2E security requirement.
    Type: Application
    Filed: October 28, 2016
    Publication date: November 15, 2018
    Inventors: Yogendra C. SHAH, VInod Kumar CHOYI, Dale N. SEED, IV, Michael F. STARSINIC, William Robert FLYNN, IV, Zhuo CHEN
  • Patent number: 10110595
    Abstract: In a machine-to-machine/Internet-of-things environment, end-to-end authentication of devices separated by multiple hops is achieved via direct or delegated/intermediated negotiations using pre-provisioned hop-by-hop credentials, uniquely generated hop-by-hop credentials, and-or public key certificates, whereby remote resources and services may be discovered via single-hop communications, and then secure communications with the remote resources may be established using secure protocols appropriate to the resources and services and capabilities of end devices, and communication thereafter conducted directly without the overhead or risks engendered hop-by-hop translation.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: October 23, 2018
    Assignee: Convida Wireless, LLC
    Inventors: Vinod Kumar Choyi, Dale N. Seed, Yogendra C. Shah, Quang Ly, William Robert Flynn, IV, Michael F. Starsinic, Shamim Akbar Rahman, Zhuo Chen, Qing Li
  • Publication number: 20180242129
    Abstract: A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Additionally, methods and apparatus for use in validating, authenticating and provisioning a M2ME is also disclosed. The validation procedures disclosed include an autonomous, semi-autonomous, and remote validation are disclosed. The provisioning procedures include methods for re-provisioning the M2ME. Procedures for updating software, and detecting tampering with the M2ME are also disclosed.
    Type: Application
    Filed: April 17, 2018
    Publication date: August 23, 2018
    Inventors: Yogendra C. SHAH, Inhyok CHA, Michael V. MEYERSTEIN, Andreas SCHMIDT
  • Patent number: 10038692
    Abstract: Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a WTRU, may request access to a service controlled by an access control entity (ACE). The user may be authenticated with a user authenticator and assertion function (UAAF), producing a result. A user assertion may be provided that includes the user authentication result, a user assurance level, and/or a user freshness level. The WTRU may be authenticated with a device authenticator and assertion function (DAAF), producing an associated result. A device assertion may be provided that may include the device authentication result, a device assurance level, and/or a device freshness level. The assertions may be bound together to receive access to a service or resource.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: July 31, 2018
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Michael V. Meyerstein, Louis J. Guccione
  • Publication number: 20180212962
    Abstract: Approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (MEP) and an external network. A token may be generated in the MEP that may associate a mobile network identity and an external network identity. The token may be negotiated on a per-session basis or on a per-wireless transmit/receive unit (WTRU) identity (WTRU-ID) basis. In an example method performed by a WTRU camped on a small cell network covered by the MEP, an enterprise bring your own device (BYOD) client (EBC) application may establish a secure link with an enterprise BYOD agent (EBA) application running on the MEP using an initial connection procedure. The EBC application may initiate an application-level authentication procedure with an enhanced evolved packet core (EPC) network. The EBC application may generate and provide a token to the EBA application via the established secure link.
    Type: Application
    Filed: August 1, 2016
    Publication date: July 26, 2018
    Applicant: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Alexander Reznik, Yogendra C. Shah