Patents by Inventor Zhuoqing Morley Mao
Zhuoqing Morley Mao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170366943Abstract: Techniques are disclosed for determining whether a mobile device is located indoors or outdoors. In some embodiments, a mobile device may utilize a fusion of the information from multiple sensors, such as a RGB sensor, a proximity sensor, a light intensity sensor, and a WiFi radio, to determine whether the mobile device is located indoors or outdoors.Type: ApplicationFiled: May 2, 2017Publication date: December 21, 2017Inventors: Jong Sung Yoon, Jie Hui, Michael Mitchell, Zhuoqing Morley Mao, Yunhan Jia, Chao Kong
-
Patent number: 9813936Abstract: Aspects of the subject disclosure may include, for example, identifying a data request to transfer data for a mobile device across a mobile network. The data request occurs within a time interval of a number of time intervals, each having a duration greater than a data transfer time across the mobile network. A volume is determined of the data requested, and compared to a data transfer capacity of the wireless access terminal. A transfer of the data is scheduled within the time interval, responsive to the volume of data requested being less than the data transfer capacity. The transfer of the data is deferred to another time interval, responsive to the volume of data requested being greater than the data transfer capacity, and the deferring of the data to another time includes resubmitting the data request in another time interval of the plurality of time intervals. Other embodiments are disclosed.Type: GrantFiled: April 22, 2015Date of Patent: November 7, 2017Assignees: AT&T INTELLECTUAL PROPERTY I, L.P., THE REGENTS OF THE UNIVERSITY OF MICHIGANInventors: Sanae Leah Madeleine Rosen, Jeffrey Erman, Vijay Gopalakrishnan, Zhuoqing Morley Mao, Jeffrey Pang
-
Patent number: 9807058Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.Type: GrantFiled: September 21, 2015Date of Patent: October 31, 2017Assignee: T-Mobile USA, Inc.Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
-
Publication number: 20170238322Abstract: Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.Type: ApplicationFiled: May 2, 2017Publication date: August 17, 2017Inventors: Subhabrata Sen, Oliver Spatscheck, Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Zhaoguang Wang
-
Patent number: 9654950Abstract: Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.Type: GrantFiled: January 14, 2016Date of Patent: May 16, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Subhabrata Sen, Oliver Spatscheck, Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Zhaoguang Wang
-
Patent number: 9578441Abstract: Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application.Type: GrantFiled: January 21, 2015Date of Patent: February 21, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen, Oliver Spatscheck, Zhaoguang Wang
-
Publication number: 20170005989Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.Type: ApplicationFiled: September 21, 2015Publication date: January 5, 2017Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
-
Publication number: 20160316388Abstract: Aspects of the subject disclosure may include, for example, identifying a data request to transfer data for a mobile device across a mobile network. The data request occurs within a time interval of a number of time intervals, each having a duration greater than a data transfer time across the mobile network. A volume is determined of the data requested, and compared to a data transfer capacity of the wireless access terminal. A transfer of the data is scheduled within the time interval, responsive to the volume of data requested being less than the data transfer capacity. The transfer of the data is deferred to another time interval, responsive to the volume of data requested being greater than the data transfer capacity, and the deferring of the data to another time includes resubmitting the data request in another time interval of the plurality of time intervals. Other embodiments are disclosed.Type: ApplicationFiled: April 22, 2015Publication date: October 27, 2016Inventors: Sanae Leah Madeleine Rosen, Jeffrey Erman, Vijay Gopalakrishnan, Zhuoqing Morley Mao, Jeffrey Pang
-
Publication number: 20160165584Abstract: A more efficient mobile device can be achieved via an optimization process based on display screen dormancy. Application data transmissions can be throttled based on a screen-on or screen-off status of a mobile device. Furthermore, an application management platform can be used to prioritize application data transmissions based on data associated with each application's packet transmissions.Type: ApplicationFiled: December 4, 2014Publication date: June 9, 2016Inventors: Subhabrata Sen, Oliver Spatscheck, Junxian Huang, Zhuoqing Morley Mao, Feng Qian
-
Publication number: 20160127877Abstract: Techniques control traffic transmissions to manage radio resource utilization. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.Type: ApplicationFiled: January 14, 2016Publication date: May 5, 2016Inventors: Subhabrata Sen, Oliver Spatscheck, Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Zhaoguang Wang
-
Patent number: 9264872Abstract: Techniques for using controlling traffic transmissions to manage radio resource utilization are presented herein. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.Type: GrantFiled: June 20, 2012Date of Patent: February 16, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Subhabrata Sen, Oliver Spatscheck, Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Zhaoguang Wang
-
Publication number: 20150131471Abstract: Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application.Type: ApplicationFiled: January 21, 2015Publication date: May 14, 2015Inventors: Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen, Oliver Spatscheck, Zhaoguang Wang
-
Patent number: 8972572Abstract: Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application.Type: GrantFiled: July 31, 2013Date of Patent: March 3, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen, Oliver Spatscheck, Zhaoguang Wang
-
Patent number: 8701155Abstract: A cloud infrastructure that communicates with computing devices is provided. The computing devices install filters on other computing devices that they wish to receive items from including pictures, messages, and documents. The filters include criteria that are evaluated on the computing devices, rather than at a server, to determine if an item may be sent to another computing device. The computing devices may then send items that match the criteria to the cloud infrastructure, and the items may be stored and queued for delivery to other computing devices. The items may be encrypted before being provided to the cloud infrastructure, and decrypted when received by the computing devices.Type: GrantFiled: June 14, 2010Date of Patent: April 15, 2014Assignee: Microsoft CorporationInventors: Patrick Stuedi, Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ramasubramanian, Zhuoqing Morley Mao, Edward P. Wobber
-
Publication number: 20130315088Abstract: Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application.Type: ApplicationFiled: July 31, 2013Publication date: November 28, 2013Applicant: AT&T Intellectual Property I, L.P.Inventors: Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen, Oliver Spatscheck, Zhaoguang Wang
-
Patent number: 8527627Abstract: Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application.Type: GrantFiled: December 14, 2010Date of Patent: September 3, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen, Oliver Spatscheck, Zhaoguang Wang
-
Patent number: 8434150Abstract: Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.Type: GrantFiled: March 24, 2011Date of Patent: April 30, 2013Assignee: Microsoft CorporationInventors: Yinglian Xie, Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao, Jason D. Walter, Krishna Vitaldevara
-
Publication number: 20130035082Abstract: Techniques for using controlling traffic transmissions to manage radio resource utilization are presented herein. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE.Type: ApplicationFiled: June 20, 2012Publication date: February 7, 2013Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Subhabrata Sen, Oliver Spatscheck, Alexandre Gerber, Zhuoqing Morley Mao, Feng Qian, Zhaoguang Wang
-
Publication number: 20120246720Abstract: Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.Type: ApplicationFiled: March 24, 2011Publication date: September 27, 2012Applicant: Microsoft CorporationInventors: Yinglian Xie, Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao, Jason D. Walter, Krishna Vitaldevara
-
Patent number: 8155126Abstract: Disclosed is a method and apparatus for inferring AS paths between two endpoint nodes communicating over a network having a plurality of nodes without having access to the endpoint nodes. The method and apparatus determine routing tables of at least some of the plurality of nodes. A relationship between each node is then inferred from the routing tables. The method and apparatus then determine a path between the two endpoint nodes from the relationship and the routing table determination.Type: GrantFiled: November 30, 2005Date of Patent: April 10, 2012Assignee: AT&T Intellectual Property II, L.P.Inventors: Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang