Patents by Inventor Joseph Soryal

Joseph Soryal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230125369
    Abstract: An example method for assisting humans and machines to perform workflow tasks in a coordinated manner includes collecting a plurality of signal inputs associated with a human and a machine who are cooperating to perform a workflow, delegating a first set of tasks of the workflow to the human and a second set of tasks of the workflow to the machine, sending a first signal to the human and a second signal to the machine, wherein the first signal identifies a task of the first set of tasks and the second signal identifies a task of the second set of tasks, and monitoring a progress of the workflow subsequent to sending the first signal and the second signal.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 27, 2023
    Inventor: Joseph Soryal
  • Publication number: 20230129621
    Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.
    Type: Application
    Filed: October 27, 2021
    Publication date: April 27, 2023
    Inventors: Joseph Soryal, Dylan Chamberlain Reid
  • Publication number: 20230128524
    Abstract: Aspects of the subject disclosure may include, for example, receiving first imaging data corresponding to first images of a first plurality of first users, each of the first users being located at a first location; obtaining first hierarchical rank data, the first hierarchical rank data being indicative of a first hierarchical ranking of each of the first users relative to each other of the first users; generating, based at least in part upon the first imaging data and the first hierarchical rank data, second imaging data, and sending the second imaging data to a second location, the second location being separate from the first location, the second imaging data enabling a first holographic projector at the second location to present first holograms, the first holograms comprising one or more first emphasized images representing a first particular one of the first users who is ranked highest by the first hierarchical rank data, and the first holograms further comprising one or more first un-emphasized images
    Type: Application
    Filed: October 25, 2021
    Publication date: April 27, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230130128
    Abstract: The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, facilitating, by a first device, receiving a first communication directed to a second device from a third device associated with a first telephone number. The method can further include determining, by the first device, that the first communication comprises a reference to a second telephone number different from the first telephone number, resulting in a number discrepancy. Further, based on the number discrepancy and an analysis of the first communication, the method can further include preventing, by the first device, communication of the first communication to the third device.
    Type: Application
    Filed: December 23, 2022
    Publication date: April 27, 2023
    Inventors: Howard Lang, Joseph Soryal
  • Patent number: 11634220
    Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: April 25, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
  • Patent number: 11637860
    Abstract: A method includes determining, by a vehicle, a failure with a computer or telecommunications system operating in the vehicle and when a failure is detected, activating an acoustic system on the vehicle, detecting a vibration by the vehicle; and transmitting an audible signal responsive to the detecting step. The audible signal may include words in a human vocabulary.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: April 25, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230112126
    Abstract: A system may use information obtained by a communication service provider's core network for multi-factor authentication.
    Type: Application
    Filed: October 12, 2021
    Publication date: April 13, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Howard Lang
  • Publication number: 20230107044
    Abstract: Aspects of the subject disclosure may include, for example, providing first web pages of a website to a communication device of a user, and the communication device presents the first web pages. Further embodiments can include determining a navigation path through the website that includes a portion of the first web pages during a first presentation of the website on the communication device, obtaining biometric information of the user from the communication device, and obtaining input device information from the communication device. Additional embodiments include detecting a request for web page content of the website from the communication device, adjusting the website according to the navigation path, the biometric information, and the input device information, and providing second web pages of the adjusted website to the communication device, and the communication device presents the second web pages. Other embodiments are disclosed.
    Type: Application
    Filed: October 5, 2021
    Publication date: April 6, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230107054
    Abstract: Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.
    Type: Application
    Filed: December 12, 2022
    Publication date: April 6, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Howard Lang
  • Publication number: 20230107418
    Abstract: Security mechanisms for content delivery networks (“CDNs”) are disclosed herein. One security mechanism can be used to mitigate or prevent dynamic content attacks. A system can execute a CDN manager to perform operations. In particular, the CDN manager can receive a plurality of hypertext transfer protocol (“HTTP”) requests, and parse a plurality of headers from the plurality of HTTP requests to determine a plurality uniform resource locators (“URLs”). The CDN manager can generate a plurality of web page images associated with the plurality of URLs. The CDN manager can execute a machine learning algorithm, such as a convolution neural network, to perform an analysis of the plurality of web page images. Based upon the analysis of the plurality of web page images, the CDN manager can determine whether the plurality of HTTP requests are for the same web page, which can be indicative of a dynamic content attack.
    Type: Application
    Filed: December 12, 2022
    Publication date: April 6, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Dylan C. Reid
  • Publication number: 20230096129
    Abstract: Intelligent hologram communication continuity (e.g., using a computerized tool) is enabled. A method can comprise: determining, by a device comprising a processor, a context associated with a live interaction, wherein the live interaction is associated with a user profile and transmitted via a network; determining, by the device, hardware data representative of hardware associated with transmission of the live interaction via the network; in response to a hardware criterion being determined to be threshold satisfied by the hardware data, generating, by the device, using a hologram generation model and based on the context, a synthetic hologram associated with the live interaction, wherein the hologram generation model has been generated based on machine learning applied to past context data representative of past contexts of past live interactions associated with the user profile, from prior to the live interaction; and transmitting, by the device, the synthetic hologram instead of the live interaction.
    Type: Application
    Filed: September 28, 2021
    Publication date: March 30, 2023
    Inventors: Howard L Lang, Joseph Soryal
  • Publication number: 20230103240
    Abstract: The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.
    Type: Application
    Filed: December 5, 2022
    Publication date: March 30, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Dylan Reid
  • Publication number: 20230086497
    Abstract: Aspects of the subject disclosure may include, for example, coupling a virtual network function (VNF) to a cloud computing platform, resulting in an instantiation of the VNF with respect to the cloud computing platform, obtaining, based on the coupling, data to operatively interface the VNF and the cloud computing platform, and translating a communication, a message, or a combination thereof, between the VNF and the cloud computing platform using the data. Other embodiments are disclosed.
    Type: Application
    Filed: September 21, 2021
    Publication date: March 23, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230086382
    Abstract: Image processing device security is provided herein. A method can include assembling, by a first system comprising a processor using a first virtual machine enabled via the first system, raw input data captured by an image capture device from an input image, resulting in assembled input data; generating, by the first system using a second virtual machine that is enabled via the first system and distinct from the first virtual machine, an output image from the assembled input data; reading, by the first system in response to the generating, the output image; and preventing, by the first system, a second system, distinct from the first system, from accessing the output image in response to the reading resulting in execution of unauthorized instructions at the first system.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 23, 2023
    Inventor: Joseph Soryal
  • Publication number: 20230073668
    Abstract: A man-in-the-middle protection module can monitor data traffic exchanged between a source and destination nodes over a source-destination link via a network. The module can utilize a traffic probe packet to determine a packet delay associated with the data traffic. The module can store the packet delay and can determine that the packet delay is greater than a normal packet delay. If so, the module can determine that an attacker has compromised the source-destination link. The module can command a virtual machine associated with the source node to be decommissioned. The module can instruct a virtualization orchestrator to create a new source node. The data traffic can be rerouted to be exchanged between the new source node and the destination node over a new source-destination link via the network. The module can create and send fake data traffic towards the MitM attacker over the source-destination link via the network.
    Type: Application
    Filed: November 14, 2022
    Publication date: March 9, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Patent number: 11599754
    Abstract: Concepts and technologies disclosed herein are directed to image classification attack mitigation. According to one aspect of the concepts and technologies disclosed herein, a system can obtain an original image and reduce a resolution of the original image to create a reduced resolution image. The system can classify the reduced resolution image and output a first classification. The system also can classify the original image via deep learning image classification and output a second classification. The system can compare the first classification and the second classification. In response to determining that the first classification and the second classification match, the system can output the second classification of the original image. In response to determining that the first classification and the second classification do not match, the system can output the first classification of the original image.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: March 7, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Dylan C. Reid
  • Publication number: 20230064345
    Abstract: A sender device can determine that data associated with an application is to be sent to a service via a network. The sender device can generate resource queries directed to at least two participant devices and receive responses indicating whether each of the participant devices has a resource available to host a virtual network function (“VNF”). The sender device can generate commands directed to security interface applications executed by the participant devices. The commands can instruct the participant devices to instantiate the VNFs. The sender device can partition the data into data partitions directed to the participant devices. The sender device can send the data partitions to the VNFs of the participant devices. The VNFs can forward the data partitions to a network access device that can combine the data partitions and send the data to the service via the network.
    Type: Application
    Filed: November 14, 2022
    Publication date: March 2, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11592997
    Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: February 28, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11595403
    Abstract: The concepts and technologies disclosed herein are directed to conditional temporary authentication for third party nodes. According to one aspect of the concepts and technologies disclosed herein, a first node of a plurality of nodes can provide a master authentication key to a second node of the plurality of nodes. The first node can receive, from a third node of the plurality of nodes, a temporary child authentication key derived from the master authentication by the second node. The first node can process the temporary child authentication key to determine which portion of a resource to allow the third node to access. The first node can provide the third node access to the portion of the resource.
    Type: Grant
    Filed: December 11, 2019
    Date of Patent: February 28, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11593350
    Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.
    Type: Grant
    Filed: September 11, 2020
    Date of Patent: February 28, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban