The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 14, 2019

Filed:

Oct. 30, 2017
Applicant:

T-mobile Usa, Inc., Bellevue, WA (US);

Inventors:

Yunhan Jia, Ann Arbor, MI (US);

Jong Sung Yoon, Sammamish, WA (US);

Jie Hui, Mercer Island, WA (US);

Samson Kim-Sun Kwong, Bellevue, WA (US);

Kevin Lau, Issaquah, WA (US);

Salvador Mendoza, Issaquah, WA (US);

Zhuoqing Morley Mao, Ann Arbor, MI (US);

Assignee:

T-Mobile USA, Inc., Bellevue, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01); H04W 12/00 (2009.01); H04L 12/753 (2013.01); H04W 28/02 (2009.01); H04L 12/46 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0281 (2013.01); H04L 63/101 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 67/28 (2013.01); H04W 12/00 (2013.01); H04L 12/4633 (2013.01); H04L 67/02 (2013.01); H04W 28/0257 (2013.01); H04W 28/0263 (2013.01); H04W 28/0268 (2013.01);
Abstract

Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a 'bearer,' or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.


Find Patent Forward Citations

Loading…