Patents by Inventor Andrea Forte
Andrea Forte has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11423388Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.Type: GrantFiled: November 25, 2019Date of Patent: August 23, 2022Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Publication number: 20200090159Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Applicant: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Patent number: 10511973Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.Type: GrantFiled: December 14, 2016Date of Patent: December 17, 2019Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Patent number: 10489772Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.Type: GrantFiled: November 27, 2013Date of Patent: November 26, 2019Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Patent number: 10467427Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.Type: GrantFiled: July 18, 2016Date of Patent: November 5, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Gustavo de los Reyes, Andrea Forte, Juan A. Garay, David Crawford Gibbon, Zhu Liu, Evgene Vahlis, Eric Zavesky
-
Patent number: 10437469Abstract: Methods of obtaining input on a physical input device are provided. A method includes superimposing an image of a virtual keypad over an image of a touchscreen keypad, wherein the virtual keypad device has a different layout than the touchscreen keypad, mapping a first input on the touchscreen keypad to a second input on the virtual keypad, wherein the second input is different from the first input, and displaying on the touchscreen keypad a visually encoded symbol that defines a mapping from the touchscreen keypad to the virtual keypad, wherein mapping the first input on the touchscreen keypad to the second input on the virtual keypad is performed in response to the visually encoded symbol.Type: GrantFiled: December 9, 2016Date of Patent: October 8, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Andrea Forte, Juan A. Garay, Trevor Jim, Evgene Vahlis
-
Publication number: 20170094526Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.Type: ApplicationFiled: December 14, 2016Publication date: March 30, 2017Applicant: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Publication number: 20170090750Abstract: Methods of obtaining input on a physical input device are provided. A method includes superimposing an image of a virtual keypad over an image of a touchscreen keypad, wherein the virtual keypad device has a different layout than the touchscreen keypad, mapping a first input on the touchscreen keypad to a second input on the virtual keypad, wherein the second input is different from the first input, and displaying on the touchscreen keypad a visually encoded symbol that defines a mapping from the touchscreen keypad to the virtual keypad, wherein mapping the first input on the touchscreen keypad to the second input on the virtual keypad is performed in response to the visually encoded symbol.Type: ApplicationFiled: December 9, 2016Publication date: March 30, 2017Inventors: Andrea Forte, Juan A. Garay, Trevor Jim, Evgene Vahlis
-
Patent number: 9600686Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.Type: GrantFiled: December 30, 2015Date of Patent: March 21, 2017Assignee: AT&T Intellectual Property I, L.P.Inventors: Andrea Forte, Evgene Vahlis
-
Patent number: 9529465Abstract: Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the physical input device, such that a first input on the physical input device is mapped to a different input on the virtual input device. In another aspect, methods of securing a transaction according include displaying a first input screen to a user, encrypting a scrambling key using a public key, the scrambling key defining a second input screen that has a different layout from the first input screen, transmitting the encrypted scrambling key to a user device, receiving an input from the user device, and mapping the input to the second input screen.Type: GrantFiled: December 2, 2013Date of Patent: December 27, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Andrea Forte, Juan A. Garay, Trevor Jim, Evgene Vahlis
-
Patent number: 9526024Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.Type: GrantFiled: August 7, 2014Date of Patent: December 20, 2016Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Publication number: 20160357986Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.Type: ApplicationFiled: July 18, 2016Publication date: December 8, 2016Inventors: Gustavo de los Reyes, Andrea Forte, Juan A. Garay, David Crawford Gibbon, Zhu Liu, Evgene Vahlis, Eric Zavesky
-
Patent number: 9396310Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.Type: GrantFiled: July 15, 2013Date of Patent: July 19, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Gustavo de los Reyes, Andrea Forte, Juan A. Garay, David Crawford Gibbon, Zhu Liu, Evgene Vahlis, Eric Zavesky
-
Patent number: 9392001Abstract: Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.Type: GrantFiled: May 21, 2014Date of Patent: July 12, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Wei Wang, Qi Shen, Andrea Forte, Jeffrey Bickford
-
Publication number: 20160110560Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.Type: ApplicationFiled: December 30, 2015Publication date: April 21, 2016Inventors: Andrea Forte, Evgene Vahlis
-
Publication number: 20160043881Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.Type: ApplicationFiled: August 7, 2014Publication date: February 11, 2016Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Andrea Forte
-
Patent number: 9251366Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.Type: GrantFiled: November 10, 2014Date of Patent: February 2, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Andrea Forte, Evgene Vahlis
-
Publication number: 20160004870Abstract: Concepts and technologies disclosed herein are directed to a personal security agent. According to one aspect disclosed herein, a compute resource includes a processor that can execute the personal security agent to perform operations. The compute resource can receive data from a data source. The compute resource can receive a job request to provide security for an entity. The job request can include a job requirement. The compute resource can analyze the job requirement and the data to determine an action. The compute resource can provide instructions for executing the action to a controller domain. The controller domain can execute the action in at least partial fulfillment of the job requirement.Type: ApplicationFiled: July 1, 2014Publication date: January 7, 2016Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Andrea Forte, Edward G. Amoroso, Gustavo de los Reyes, Mikhail Istomin
-
Publication number: 20150381572Abstract: A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.Type: ApplicationFiled: November 10, 2014Publication date: December 31, 2015Inventors: Andrea Forte, Evgene Vahlis
-
Patent number: 9143512Abstract: A message is divided into multiple message segments, and a network interface is selected from among a plurality of different types of network interfaces included within a communication device for transmitting each message segment. Each network interface is dedicated to a different type of communication protocol using a different encryption technique, and a network interface is selected for transmitting each message segment according to a pattern of the network interfaces. Secure transmission of the multiple message segments is initiated via the network interfaces according to the pattern.Type: GrantFiled: October 4, 2013Date of Patent: September 22, 2015Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Andrea Forte