Patents by Inventor Daniel Sheleheda

Daniel Sheleheda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9825973
    Abstract: Websites are monitored for changes over time. A domain name server resolves a domain name to a single internet protocol address and then performs a reverse resolution for the single internet protocol address. When multiple alias records resolve to the same host name, the domain name server determines the single internet protocol address virtually hosts multiple domain names.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: November 21, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
  • Patent number: 9736174
    Abstract: A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For example, the method receives communications traffic associated with a sensor network from a sensor that is a member of the sensor network, analyzes the communications traffic to determine if an attack is occurring on the sensor network, and generates an alarm if the attack is occurring on the sensor network.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: August 15, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Daniel Sheleheda, Donald J. Bowen, Cynthia Cama, Lusheng Ji
  • Publication number: 20170006052
    Abstract: A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For example, the method receives communications traffic associated with a sensor network from a sensor that is a member of the sensor network, analyzes the communications traffic to determine if an attack is occurring on the sensor network, and generates an alarm if the attack is occurring on the sensor network.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Inventors: DANIEL SHELEHEDA, Donald J. Bowen, Cynthia Cama, Lusheng Ji
  • Patent number: 9450973
    Abstract: A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For example, the method receives communications traffic associated with a sensor network from a sensor that is a member of the sensor network, analyzes the communications traffic to determine if an attack is occurring on the sensor network, and generates an alarm if the attack is occurring on the sensor network.
    Type: Grant
    Filed: November 21, 2011
    Date of Patent: September 20, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Daniel Sheleheda, Donald J. Bowen, Cynthia Cama, Lusheng Ji
  • Patent number: 9286784
    Abstract: A method and apparatus for ignoring a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: March 15, 2016
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Daniel Sheleheda, Michael Singer
  • Publication number: 20160014145
    Abstract: Websites are monitored for changes over time. A domain name server resolves a domain name to a single internet protocol address and then performs a reverse resolution for the single internet protocol address. When multiple alias records resolve to the same host name, the domain name server determines the single internet protocol address virtually hosts multiple domain names.
    Type: Application
    Filed: September 23, 2015
    Publication date: January 14, 2016
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
  • Patent number: 9172712
    Abstract: A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page taken at a first time, and downloading a second snapshot of the web page taken at a second time later than the first time. The method also includes enabling a comparison of the first snapshot and the second snapshot. A system for monitoring websites is provided. The system includes means for enabling a comparison of the first snapshot and the second snapshot visually or through the use of content data from that web site. A computer-readable recording medium having recorded thereon an executable program is provided. The program when executed causes a processor to perform a method for monitoring websites.
    Type: Grant
    Filed: October 7, 2009
    Date of Patent: October 27, 2015
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
  • Publication number: 20140104058
    Abstract: A method and apparatus for ignoring a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Application
    Filed: December 20, 2013
    Publication date: April 17, 2014
    Applicant: AT&T Intellectual Property II, L.P.
    Inventors: DANIEL SHELEHEDA, Michael Singer
  • Patent number: 8643485
    Abstract: A method and apparatus for ignoring a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Grant
    Filed: August 20, 2012
    Date of Patent: February 4, 2014
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Daniel Sheleheda, Michael Singer
  • Patent number: 8626691
    Abstract: Methods, systems, and products answer questions using heuristics. A question and an input are received. A set of heuristic rules is retrieved, and the question is answered by evaluating an accuracy of each heuristic rule. Multiple accuracies from the set of heuristic rules are combined to produce a confidence level for the answer to the question.
    Type: Grant
    Filed: December 19, 2009
    Date of Patent: January 7, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Matti Hiltunen, Robin Berthier, Michel Cukier, David Kormann, Daniel Sheleheda, Gregory T. Vesonder
  • Publication number: 20130127618
    Abstract: A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For example, the method receives communications traffic associated with a sensor network from a sensor that is a member of the sensor network, analyzes the communications traffic to determine if an attack is occurring on the sensor network, and generates an alarm if the attack is occurring on the sensor network.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 23, 2013
    Inventors: Daniel Sheleheda, Donald J. Bowen, Cynthia Cama, Lusheng Ji
  • Publication number: 20130097317
    Abstract: A method, non-transitory computer readable medium and apparatus for providing remote trust management for machine to machine communications in a network are disclosed. For example, the method receives a request from a sensor to join a wireless network, determines a trust score of the sensor by a server at the network, and allows the sensor to join the wireless network if the trust score is greater than a predetermined threshold.
    Type: Application
    Filed: October 18, 2011
    Publication date: April 18, 2013
    Inventors: DANIEL SHELEHEDA, Donald J. Bowen, Cynthia Cama, Lusheng Ji
  • Publication number: 20120313772
    Abstract: A method and apparatus for ignoring a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Application
    Filed: August 20, 2012
    Publication date: December 13, 2012
    Applicant: AT&T Corp.
    Inventors: Daniel Sheleheda, Michael Singer
  • Patent number: 8248227
    Abstract: A method and apparatus for suppressing a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Grant
    Filed: July 22, 2008
    Date of Patent: August 21, 2012
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Daniel Sheleheda, Michael Singer
  • Publication number: 20110153537
    Abstract: Methods, systems, and products answer questions using heuristics. A question and an input are received. A set of heuristic rules is retrieved, and the question is answered by evaluating an accuracy of each heuristic rule. Multiple accuracies from the set of heuristic rules are combined to produce a confidence level for the answer to the question.
    Type: Application
    Filed: December 19, 2009
    Publication date: June 23, 2011
    Inventors: Matti Hiltunen, Robin Berthier, Michel Cukier, David Kormann, Daniel Sheleheda, Gregory T. Vesonder
  • Patent number: 7930746
    Abstract: A method and apparatus for detecting an anomalous activity in a communications network is described. In one example, short-term event data is received from a plurality of servers. An event detection rule is then executed to process the short-term event data over a predefined time period. Afterwards, at least one alarm message is generated in response to detecting the anomalous activity in accordance with at least one predefined long-term security data mining program. In response, the at least one alarm message is provided to at least one of the plurality of servers.
    Type: Grant
    Filed: December 29, 2005
    Date of Patent: April 19, 2011
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Daniel Sheleheda, Michael Singer
  • Publication number: 20110083185
    Abstract: A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page taken at a first time, and downloading a second snapshot of the web page taken at a second time later than the first time. The method also includes enabling a comparison of the first snapshot and the second snapshot. A system for monitoring websites is provided. The system includes means for enabling a comparison of the first snapshot and the second snapshot visually or through the use of content data from that web site. A computer-readable recording medium having recorded thereon an executable program is provided. The program when executed causes a processor to perform a method for monitoring websites.
    Type: Application
    Filed: October 7, 2009
    Publication date: April 7, 2011
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
  • Publication number: 20100162149
    Abstract: Systems and methods are provided to facilitate location based services based on locations in virtual worlds and locations in the real world. In one aspect, a location server obtains and provides the locations of avatars of users in different virtual worlds and the locations of mobile devices of the corresponding users in the real world. An application server, for example, may provide location based services in a virtual world based on the location of a mobile device in the real world, or provide location based services to a mobile device based on the location of an avatar in a virtual world, or provide location based services to an avatar in one virtual world based on the location of a related avatar in another virtual world.
    Type: Application
    Filed: December 24, 2008
    Publication date: June 24, 2010
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Daniel SHELEHEDA, Cynthia CAMA, Yih-Farn CHEN, Rittwik JANA, Bernard S. RENGER, Bin WEI
  • Publication number: 20100162399
    Abstract: Methods, apparatus and computer program products that protect networks from malware and botnet activity include collecting xFlow data associated with a network, analyzing the collected xFlow data to detect anomalous traffic on the network, investigating the presence of malware on the network in response to detecting anomalous traffic on the network, and taking remedial action to eradicate and/or isolate malware detected on the network. Collecting xFlow data includes capturing xFlow data at a router that connects the network and a communications network, and sending the captured xFlow data to a local or remote xFlow collector. Analyzing collected xFlow data, locally or remotely, to detect anomalous traffic includes applying one or more activity profiling algorithms to the xFlow data.
    Type: Application
    Filed: December 18, 2008
    Publication date: June 24, 2010
    Inventors: Daniel Sheleheda, Cynthia Cama
  • Publication number: 20080284581
    Abstract: A method and apparatus for suppressing a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
    Type: Application
    Filed: July 22, 2008
    Publication date: November 20, 2008
    Inventors: Daniel Sheleheda, Michael Singer