Patents by Inventor Yousif Targali
Yousif Targali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12368599Abstract: In some implementations, a policy control function (PCF) device may receive a PCF device key uniquely associated with a user equipment (UE). The PCF device may generate an integrity key and an encryption key based on the PCF device key and an identifier of the PCF device. The PCF device may generate, based on the integrity key, integrity data associated with policy information related to the UE. The PCF device may encrypt, based on the encryption key, the policy information to generate encrypted policy information. The PCF device may send, for the UE, a UE policy message indicating the integrity data, the encrypted policy information, and the identifier of the PCF device.Type: GrantFiled: July 18, 2023Date of Patent: July 22, 2025Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Shanthala Kuravangi-Thammaiah, Yousif Targali
-
Patent number: 12342395Abstract: A method performed by a STA may comprise receiving a frame, from a first AP including an indication of a configuration change counter (CCC) associated with a second AP. The CCC may be an unsigned integer that increments when an update to one or more AP parameters of the second AP has occurred. The method may further comprise establishing a first wireless link with the first AP and establishing a master key via at least the first wireless link.Type: GrantFiled: December 22, 2023Date of Patent: June 24, 2025Inventors: Lei Wang, Yousif Targali, Sudheer A. Grandhi, Xiaofei Wang, Guodong Zhang
-
Publication number: 20250175803Abstract: A device described herein may establish a communication session with a first Security Edge Protection Proxy (“SEPP”) of a first network, and further with a second SEPP of a second network. The device may be or may implement an intermediary gateway between the SEPPs. The communication session may be associated with an N32-F interface that includes the SEPPs, the intermediary gateway, and one or more other intermediary gateways. The device may receive traffic from the first SEPP, and may determine that the traffic satisfies one or more error conditions. The device may identify an error reporting policy associated with the identified error condition, and may output, to the first SEPP and/or to the second SEPP (e.g., in accordance with the error reporting policy), an indication that the traffic satisfies the one or more error conditions.Type: ApplicationFiled: November 29, 2023Publication date: May 29, 2025Applicant: Verizon Patent and Licensing Inc.Inventors: Yousif Targali, Hossein M. Ahmadi, Vinod Kumar Choyi, Jignesh Patel, Gerardo S. Libunao, Jay J. Lee
-
Publication number: 20250133487Abstract: A device may include a processor. The processor may be configured to: receive, from a User Equipment device (UE) over a wireless connection, a request to enroll an application installed on the UE to receive a service from a network slice; select a network slice to provide the service to the application on the UE; bind the application on the UE to the selected network slice; and send an enrollment reply to the UE. The processor may perform a dynamic, short-term application enrollment or a long-term application enrollment, to enable the application to access the service.Type: ApplicationFiled: October 18, 2023Publication date: April 24, 2025Inventors: Yousif Targali, Vinod Kumar Choyi
-
Publication number: 20250112908Abstract: A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an application authorization service. The application authorization service may be performed at an end device and invoked responsive to the launching of an application. The application authorization service may include validating an application certificate associated with the application, validating an attestation value, and validating a token provided by the application. The application may provide a request that includes an application identifier and a token. The application may be granted access to a network or denied access depending on the outcome of the validation procedures. The granted access may include assignment of a network slice. The application certificate, a secured token, and a secured attestation value may be stored in a secure environment at the end device and used for validation procedures.Type: ApplicationFiled: October 2, 2023Publication date: April 3, 2025Inventors: Vinod Kumar Choyi, Yousif Targali
-
Patent number: 12262206Abstract: Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.Type: GrantFiled: May 9, 2023Date of Patent: March 25, 2025Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Kristen Sydney Young, Yousif Targali, Michael A. Gallagher
-
Publication number: 20250088424Abstract: A system described herein may maintain a set of policies associated with accessing a radio access network (“RAN”), may receive a request for a particular network function (“NF”) to access the RAN, and may determine, based on the set of policies and information included in the request, whether to grant the request to access the RAN. The system may establish, when determining that the request should be granted, connectivity between the particular NF and the RAN, where establishing the connectivity includes assigning a particular address to the particular NF, routing traffic, addressed to the particular address, to the particular NF, routing traffic, received from the particular NF, to the RAN. The system may forgo establishing connectivity between the particular NF and the RAN when determining that the request should not be granted. The RAN may include an Open RAN (“O-RAN”).Type: ApplicationFiled: September 11, 2023Publication date: March 13, 2025Applicant: Verizon Patent and Licensing Inc.Inventors: Yousif Targali, Shankar Venkatraman, Vishwanath Ramamurthi
-
Publication number: 20250030554Abstract: In some implementations, a policy control function (PCF) device may receive a PCF device key uniquely associated with a user equipment (UE). The PCF device may generate an integrity key and an encryption key based on the PCF device key and an identifier of the PCF device. The PCF device may generate, based on the integrity key, integrity data associated with policy information related to the UE. The PCF device may encrypt, based on the encryption key, the policy information to generate encrypted policy information. The PCF device may send, for the UE, a UE policy message indicating the integrity data, the encrypted policy information, and the identifier of the PCF device.Type: ApplicationFiled: July 18, 2023Publication date: January 23, 2025Applicant: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar CHOYI, Shanthala KURAVANGI-THAMMAIAH, Yousif TARGALI
-
Publication number: 20250008323Abstract: In some implementations, an key management server function (KMSF) may generate a security policy, wherein the security policy is an application function (AF)-specific security policy or a network function (NF)-specific security policy. The KMSF may transmit, to one of an AF or an NF, the security policy, wherein the AF-specific security policy is associated with a derivation of an AF-specific session key, or the NF-specific security policy is associated with a derivation of an NF-specific session key.Type: ApplicationFiled: June 28, 2023Publication date: January 2, 2025Applicant: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar CHOYI, Shanthala KURAVANGI-THAMMAIAH, Yousif TARGALI
-
Publication number: 20240129965Abstract: A method performed by a STA may comprise receiving a frame, from a first AP including an indication of a configuration change counter (CCC) associated with a second AP. The CCC may be an unsigned integer that increments when an update to one or more AP parameters of the second AP has occurred. The method may further comprise establishing a first wireless link with the first AP and establishing a master key via at least the first wireless link.Type: ApplicationFiled: December 22, 2023Publication date: April 18, 2024Applicant: InterDigital Patent Holdings, Inc.Inventors: Lei Wang, Yousif Targali, Sudheer A. Grandhi, Xiaofei Wang, Guodong Zhang
-
Patent number: 11910480Abstract: A method may include receiving, at a network device, a registration request that comprises a subscription concealed identifier (SUCI) associated with a particular user equipment (UE) device. The network device determines whether the SUCI indicates a request for null-scheme network access; and retrieves a scheme authorization parameter for the UE device when it is determined that the SUCI indicates a request for null-scheme network access. The scheme authorization parameter indicates whether the UE device is authorized for null-scheme access to a service provider network. The network device determines whether the UE device is authorized for null-scheme network access based on the retrieved scheme authorization parameter and performs processing associated with null-scheme network access when it is determined that the particular UE device is authorized for null-scheme network access.Type: GrantFiled: April 16, 2021Date of Patent: February 20, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Yousif Targali, Vinod Kumar Choyi, Sudhakar Reddy Patil, Michael A. Gallagher
-
Patent number: 11856621Abstract: A method performed by a STA may comprise receiving a frame, from a first AP including an indication of a configuration change counter (CCC) associated with a second AP. The CCC may be an unsigned integer that increments when an update to one or more AP parameters of the second AP has occurred. The method may further comprise establishing a first wireless link with the first AP and establishing a master key via at least the first wireless link.Type: GrantFiled: October 29, 2021Date of Patent: December 26, 2023Assignee: InterDigital Patent Holdings, Inc.Inventors: Lei Wang, Yousif Targali, Sudheer A. Grandhi, Xiaofei Wang, Guodong Zhang
-
Patent number: 11825309Abstract: Systems and methods described herein enforce access controls for network slices via proxy in a secure enclave of a user equipment (UE) device. A UE device executes, in a rich execution environment (REE), a function or application designated for using one or more secure network slices of a telecommunications network. The UE device executes, in a trusted execution environment (TEE), a slice admission control proxy (SACP) to perform admission control for the one or more secure network slices, and forces network traffic for the function or application through the SACP.Type: GrantFiled: October 27, 2021Date of Patent: November 21, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: David Robert Lenrow, Kalyani Bogineni, Vinod Kumar Choyi, Jeffrey Melrose, Yousif Targali, Deepa Jagannatha
-
Patent number: 11785447Abstract: A network terminal, e.g., LTE or 5G, can connect to a home network via a serving network. The terminal can have a terminal identifier (TID), such as an IMEI or other PEI, and a network subscriber can have a subscriber identifier (SID), such as an IMSI or other SUPI. In some nonlimiting examples, a network node can determine that a SID and a TID are authorized for joint use and, in response, transmit authorization information. In some nonlimiting examples, a network node can receive an attach request having verification data and encrypted identification data. The network node can receive decrypted identity data and determine that the identity data corresponds with the verification data. In some nonlimiting examples, the terminal can send an attach request comprising encrypted SID and TID data, and a cryptographic hash, to a network node.Type: GrantFiled: February 28, 2022Date of Patent: October 10, 2023Assignee: T-Mobile USA, Inc.Inventor: Yousif Targali
-
Publication number: 20230284028Abstract: Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.Type: ApplicationFiled: May 9, 2023Publication date: September 7, 2023Inventors: Vinod Kumar Choyi, Kristen Sydney Young, Yousif Targali, Michael A. Gallagher
-
Patent number: 11683691Abstract: Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.Type: GrantFiled: January 7, 2021Date of Patent: June 20, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Vinod Kumar Choyi, Kristen Sydney Young, Yousif Targali, Michael A. Gallagher
-
Patent number: 11678193Abstract: A device may receive, from a network device, a user equipment (UE) parameter update request notification indicating an update to a UE parameter of a universal subscriber identity module (USIM), and may generate an encrypted UE parameter update request. The device may cause the encrypted UE parameter update request to be provided to the USIM to cause the USIM to update the UE parameter and to generate an encrypted UE parameter update response. The device may receive, from the network device, the encrypted UE parameter update response, and may verify an authenticity of content of the encrypted UE parameter update response based on whether the encrypted UE parameter update response is signed by the USIM. The device may provide, to the network device, a result indicating whether the UE parameter is updated and whether the authenticity of the content of the encrypted UE parameter update response is verified.Type: GrantFiled: July 18, 2022Date of Patent: June 13, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Sudhakar Reddy Patil, Bjorn Hjelm, Kent W. Hughes, Gerardo S. Libunao, Yousif Targali
-
Publication number: 20230128578Abstract: Systems and methods described herein enforce access controls for network slices via proxy in a secure enclave of a user equipment (UE) device. A UE device executes, in a rich execution environment (REE), a function or application designated for using one or more secure network slices of a telecommunications network. The UE device executes, in a trusted execution environment (TEE), a slice admission control proxy (SACP) to perform admission control for the one or more secure network slices, and forces network traffic for the function or application through the SACP.Type: ApplicationFiled: October 27, 2021Publication date: April 27, 2023Inventors: David Robert Lenrow, Kalyani Bogineni, Vinod Kumar Choyi, Jeffrey Melrose, Yousif Targali, Deepa Jagannatha
-
Publication number: 20230061025Abstract: A method performed by a STA may comprise receiving a frame, from a first AP including an indication of a configuration change counter (CCC) associated with a second AP. The CCC may be an unsigned integer that increments when an update to one or more AP parameters of the second AP has occurred. The method may further comprise establishing a first wireless link with the first AP and establishing a master key via at least the first wireless link.Type: ApplicationFiled: October 29, 2021Publication date: March 2, 2023Applicant: InterDigital Patent Holdings, Inc.Inventors: Lei Wang, Yousif Targali, Sudheer A. Grandhi, Xiaofei Wang, Guodong ZHANG
-
Patent number: 11582231Abstract: A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.Type: GrantFiled: April 22, 2020Date of Patent: February 14, 2023Assignee: T-Mobile USA, Inc.Inventor: Yousif Targali