-
公开(公告)号:US11677275B2
公开(公告)日:2023-06-13
申请号:US17106285
申请日:2020-11-30
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Samuel N. Zellner
CPC classification number: H02J50/30 , H02J50/80 , H04B5/0037 , H04W4/029 , H04W16/28
Abstract: Concepts and technologies directed to wireless power transfer network management are disclosed herein. Embodiments of a system can include an optical beamforming transmitter, a processor, and a memory that stores computer-executable instructions that configure a processor to perform operations. The operations can include receiving a power charge message that requests wireless power transfer to charge a battery system of a wirelessly chargeable equipment. The operations can include detecting that the wirelessly chargeable equipment is within a power transfer range of the optical beamforming transmitter. The operations can include determining that the wirelessly chargeable equipment is not stationary. The operations can include tracking movement of the wirelessly chargeable equipment and activating the optical beamforming transmitter that provides wireless power transfer to the wirelessly chargeable equipment while the wirelessly chargeable equipment is within the power transfer range.
-
12.
公开(公告)号:US11575690B2
公开(公告)日:2023-02-07
申请号:US16885376
申请日:2020-05-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate report that includes information associated with the anomaly.
-
13.
公开(公告)号:US20230014667A1
公开(公告)日:2023-01-19
申请号:US17948281
申请日:2022-09-20
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , James Ibezim
IPC: H04L41/147 , H04W72/04 , G06N20/00 , H04L43/0876 , G06Q10/02 , H04W4/021
Abstract: A method includes collecting data relating to an event, the data including a timing of the event and a location of the event, predicting attendance at the event based on the collected data, predicting network usage based on the predicted attendance of the event, instantiating virtual network resources based on the predicted network usage, collecting post event data relating to actual attendance and network metrics, comparing the post event data with the predicted attendance and predicted network usage and updating a prediction algorithm based on the comparing step.
-
公开(公告)号:US20220406020A1
公开(公告)日:2022-12-22
申请号:US17821473
申请日:2022-08-22
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Samuel N. Zellner
Abstract: In one example, a method performed by a processing system includes controlling a first device in a first location to project a virtual presences in a current field of view of a subscriber of a virtual presence projection service, computing a moving trajectory of the subscriber from the first location to a second location, identifying a second device that is located along the moving trajectory, wherein the second device includes a second set of resources for projecting virtual presences, and wherein the second device is registered with the virtual presence projection service to lend the second set of resources to subscribers of the virtual presence projection service, and controlling the second device to project the virtual presence in the current field of view of the subscriber when the subscriber is no longer within range of the first device but is within range of the second device.
-
公开(公告)号:US20220360564A1
公开(公告)日:2022-11-10
申请号:US17307976
申请日:2021-05-04
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
Abstract: A sender device can determine that data associated with an application is to be sent to a service via a network. The sender device can generate resource queries directed to at least two participant devices and receive responses indicating whether each of the participant devices has a resource available to host a virtual network function (“VNF”). The sender device can generate commands directed to security interface applications executed by the participant devices. The commands can instruct the participant devices to instantiate the VNFs. The sender device can partition the data into data partitions directed to the participant devices. The sender device can send the data partitions to the VNFs of the participant devices. The VNFs can forward the data partitions to a network access device that can combine the data partitions and send the data to the service via the network.
-
16.
公开(公告)号:US20210392052A1
公开(公告)日:2021-12-16
申请号:US16901901
申请日:2020-06-15
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , James Ibezim
Abstract: A method includes collecting data relating to an event, the data including a timing of the event and a location of the event, predicting attendance at the event based on the collected data, predicting network usage based on the predicted attendance of the event, instantiating virtual network resources based on the predicted network usage, collecting post event data relating to actual attendance and network metrics, comparing the post event data with the predicted attendance and predicted network usage and updating a prediction algorithm based on the comparing step.
-
公开(公告)号:US20210099433A1
公开(公告)日:2021-04-01
申请号:US16584670
申请日:2019-09-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude
IPC: H04L29/06 , H04L9/08 , H04L9/14 , H04N21/845
Abstract: A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.
-
公开(公告)号:US20200210960A1
公开(公告)日:2020-07-02
申请号:US16232983
申请日:2018-12-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Cristina Serban , Lalita V. Rao , Tony Hansen
Abstract: Methods are disclosed for optimizing execution of tasks for users. A processing system including a processor detects a triggering condition for a transport task for transporting a subject from a first location to a second location via usage of an autonomous vehicle, establishes a negotiated task coordination plan between a user and a third party provider for performing the transport task, and executes the negotiated task coordination plan, wherein the executing causes the autonomous vehicle to travel between the first location and the second location for transporting the subject.
-
公开(公告)号:US20200052961A1
公开(公告)日:2020-02-13
申请号:US16059509
申请日:2018-08-09
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Naila Jaoude , Cristina Serban , Lalita Rao , Tony Hansen
Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.
-
公开(公告)号:US10467893B1
公开(公告)日:2019-11-05
申请号:US16024235
申请日:2018-06-29
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Lalita V. Rao , Cristina Serban , Naila Jaoude , Tony Hansen
Abstract: A traffic navigation system having a user device configured to be used by a pedestrian. The system has memory storing instructions that cause the user device to effectuate operations, the operations including registering the user device with an authentication system, processing traffic data in the proximity of the pedestrian, comparing the traffic data with a route to be followed by the pedestrian and based on the comparing step, (a) generating a sensory alert based on the warning message; (b) sending an alert message to a vehicle associated with the traffic data; and (c) sending a cycle signal to a traffic control system.
-
-
-
-
-
-
-
-
-