Patents by Inventor Gustavo De Los Reyes

Gustavo De Los Reyes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120147824
    Abstract: Methods and apparatus to configure virtual private mobile networks are disclosed. A disclosed example method includes receiving a request at a wireless network provider from a client, the request instructing the wireless network provider to create the virtual private mobile network for the client, identifying available network elements within a wireless network of the wireless network provider based on the request from the client, configuring a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network, and enabling user equipment associated with the client to wirelessly communicatively couple to the virtual private mobile network.
    Type: Application
    Filed: December 13, 2010
    Publication date: June 14, 2012
    Inventors: Jacobus Van der Merwe, Deepak K. Chawla, Gustavo de los Reyes, Seungjoon Lee
  • Publication number: 20120151587
    Abstract: Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network.
    Type: Application
    Filed: December 8, 2010
    Publication date: June 14, 2012
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Wei Wang, Gang Xu, Gustavo de los Reyes
  • Publication number: 20120072605
    Abstract: A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed.
    Type: Application
    Filed: September 17, 2010
    Publication date: March 22, 2012
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Gang Xu, Gustavo de los Reyes, Thusitha Jayawardena, Xiao Pan
  • Publication number: 20120072218
    Abstract: Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest.
    Type: Application
    Filed: November 28, 2011
    Publication date: March 22, 2012
    Applicant: AT&T Intellectual Property II, L.P.
    Inventors: Gustavo De Los Reyes, Sanjay Macwan
  • Patent number: 8086461
    Abstract: Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest.
    Type: Grant
    Filed: June 13, 2007
    Date of Patent: December 27, 2011
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Gustavo De Los Reyes, Sanjay MacWan
  • Publication number: 20110289134
    Abstract: A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
    Type: Application
    Filed: May 18, 2010
    Publication date: November 24, 2011
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Gustavo de los Reyes, William R. Becket, III, Jerry Birkes, Deepak K. Chawla, Joshua David Knight, Sanjay Macwan, William O'Hern
  • Publication number: 20110145887
    Abstract: Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 16, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Jennifer Morovitz, Gustavo de los Reyes, Sanjay Macwan
  • Publication number: 20110141900
    Abstract: A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host. The priority rule is based upon a characteristic of packets routed in the provider network that are associated with the flash event, and the characteristic is determined not solely by information included in the packets.
    Type: Application
    Filed: December 11, 2009
    Publication date: June 16, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Thusitha Jayawardena, Gustavo de los Reyes
  • Publication number: 20110145317
    Abstract: System(s) and method(s) are provided to route data within a network of content with specific service constraints to mobile devices. A mobile network management component receives an identifier (ID) of a base station that serves a mobile device that originates a request for data, and relays the ID to a network platform that administers content. A mapping that associates one or more base stations with a deployed content node and the received ID are utilized to identify a content node to serve the request for data via the base station. The received request for data is directed to the identified content node. A service constraint configuration can be allocated for exchange of payload data between the mobile device and the network platform. For a request to consume data and a request to supply data, identified content node delivers data and receives data, respectively, in accordance with the service constraint allocation.
    Type: Application
    Filed: December 15, 2009
    Publication date: June 16, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Cristina Serban, Gustavo De Los Reyes
  • Publication number: 20110145833
    Abstract: In one or more embodiments, one or more methods and/or systems described can perform displaying, on a handheld device, multiple icons associated with multiple segments; receiving first user input indicating a first segment of the multiple segments; executing a first virtual machine associated with the first segment on the handheld device; executing a first application on the first virtual machine; receiving second user input indicating a second segment of the multiple segments; executing a second virtual machine associated with the second segment on the handheld device; and executing a second application on the second virtual machine. In one or more embodiments, one or more methods and/or systems described can further perform before executing the second virtual machine, receiving authentication information and determining that the user is authenticated. In one or more embodiments, the authentication information can include at least one of a user name, a password, and/or biometric information.
    Type: Application
    Filed: December 15, 2009
    Publication date: June 16, 2011
    Applicant: AT&T MOBILITY II LLC
    Inventors: Gustavo De Los Reyes, Michael Horton, Sanjay Macwan
  • Publication number: 20110137557
    Abstract: A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.
    Type: Application
    Filed: December 8, 2009
    Publication date: June 9, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I LP
    Inventors: Gustavo de los Reyes, Gang Xu
  • Publication number: 20110138467
    Abstract: A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.
    Type: Application
    Filed: December 8, 2009
    Publication date: June 9, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Sanjay Macwan, Deepak K. Chawla, Gustavo de los Reyes, Cristina Serban
  • Publication number: 20110131650
    Abstract: An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.
    Type: Application
    Filed: November 30, 2009
    Publication date: June 2, 2011
    Inventors: Gustavo de los Reyes, Thusitha Jayawardena, Gang Xu
  • Publication number: 20110113182
    Abstract: Devices, systems, and methods are disclosed which relate to devices utilizing time-sensitive memory storage. The time-sensitive memory storage acts as normal device memory, allowing the user of the device to store files or other data to it; however the information stored on the time-sensitive memory storage is automatically erased, based on some storage time period. A limited amount of persistent storage is used for names and message headers.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 12, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Gustavo De Los Reyes
  • Publication number: 20110107386
    Abstract: Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem.
    Type: Application
    Filed: October 30, 2009
    Publication date: May 5, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Gustavo de los Reyes, Sanjay Macwan, Jennifer Morovitz
  • Publication number: 20110093473
    Abstract: A system that incorporates teachings of the present disclosure may include, for example network device having a controller to receive multiple streams of content for portions of a multimedia work (MMW), perform a high level analysis for features in each of the streams for the MMW, perform a specialized analysis on the portion having a detected general feature to generate a content analysis output, correlate the content analysis output with other content analysis of the MMW, and output a weighted content description based on the correlation function. Other embodiments are disclosed.
    Type: Application
    Filed: October 21, 2009
    Publication date: April 21, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Andrea Basso, Gustavo De Los Reyes
  • Publication number: 20110093902
    Abstract: A computer-implemented method includes receiving a data stream at a set-top box device from a residential gateway. The data stream includes first data having a first content type, second data having a second content type, and third data having a third content type. The method includes assigning the first data for processing at a first machine of the set-top box device. The method also includes assigning the second data for processing at a second machine of the set-top box device. The method further includes assigning the third data for processing at a third machine of the set-top box device. The set-top box device is configured to selectively output at least one of the first data, the second data, and the third data for display at a display device.
    Type: Application
    Filed: October 16, 2009
    Publication date: April 21, 2011
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Gustavo De Los Reyes, Sanjay Macwan, Jennifer Morovitz
  • Publication number: 20100162378
    Abstract: Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.
    Type: Application
    Filed: December 18, 2008
    Publication date: June 24, 2010
    Inventors: Thusitha Jayawardena, Gustavo De Los Reyes, Gang Xu
  • Publication number: 20100161636
    Abstract: Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that are to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Sanjay Macwan, Gustavo De Los Reyes
  • Publication number: 20100146395
    Abstract: A method on a computer readable storage medium operable to store a virtual representation of a plurality of physical components, introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. A system having a memory configured to store a virtual representation of a plurality of physical components and a processor configured to introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component.
    Type: Application
    Filed: December 8, 2008
    Publication date: June 10, 2010
    Inventors: Gustavo de los Reyes, Sanjay Macwan