Patents by Inventor Joseph Soryal

Joseph Soryal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230211497
    Abstract: Aspects of the subject disclosure may include, for example, a method in which a processing system identifies a type of wearable physical augmentation (PA) equipment, determines that a task is to be performed using the PA equipment; and retrieves equipment data regarding the PA equipment and experience data regarding the task. The method also includes analyzing the task to generate a procedure for performing the task; providing the procedure to a user wearing the PA equipment; and transmitting commands to the PA equipment in accordance with the procedure. The method further includes monitoring performance of the task, based on information transmitted by sensors integral to the PA equipment; and modifying, in accordance with the monitoring, the procedure during the performance of the task. Other embodiments are disclosed.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Publication number: 20230205845
    Abstract: Concepts and technologies disclosed herein are directed to image classification attack mitigation. According to one aspect of the concepts and technologies disclosed herein, a system can obtain an original image and reduce a resolution of the original image to create a reduced resolution image. The system can classify the reduced resolution image and output a first classification. The system also can classify the original image via deep learning image classification and output a second classification. The system can compare the first classification and the second classification. In response to determining that the first classification and the second classification match, the system can output the second classification of the original image. In response to determining that the first classification and the second classification do not match, the system can output the first classification of the original image.
    Type: Application
    Filed: March 6, 2023
    Publication date: June 29, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Dylan C. Reid
  • Publication number: 20230208856
    Abstract: Concepts and technologies disclosed herein are directed to encrypted applications verification. According to one aspect disclosed herein, a device can execute an application verification module to perform operations. The device can receive a hash function from a master security server. The hash function can be used to verify an application installed on the device. The device can apply the hash function to application code of the application to determine a hash result. The master security server can determine whether the application is verified based upon the hash result. The device can execute the application thereby generating data traffic to be sent via a network to a destination. The device can provide the data traffic to the network. A network node can receive the data traffic and can allow or deny the data traffic access to the destination based upon a command received from the master security server.
    Type: Application
    Filed: December 29, 2021
    Publication date: June 29, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230186779
    Abstract: A processing system including at least one processor executing a traffic management application may detect a proximity to a traffic zone for vehicular traffic, the dual-mode vehicle having two modes of operation, the two modes of operation comprising a surface mode of operation and an aerial mode of operation, and may verify a rule set for vehicular operations within the traffic zone. The processing system may then identify a leader traffic management application from among a plurality of traffic management applications of a plurality of dual-mode vehicles within or near the traffic zone, obtain at least one navigation instruction from the leader traffic management application, and perform at least one of: executing a navigation action in accordance with the at least one navigation instruction, or displaying at least a portion of a permitted route that is in conformance with the at least one navigation instruction.
    Type: Application
    Filed: December 13, 2021
    Publication date: June 15, 2023
    Inventors: Joseph Soryal, Naila Jaoude, Christina Cacioppo
  • Patent number: 11677275
    Abstract: Concepts and technologies directed to wireless power transfer network management are disclosed herein. Embodiments of a system can include an optical beamforming transmitter, a processor, and a memory that stores computer-executable instructions that configure a processor to perform operations. The operations can include receiving a power charge message that requests wireless power transfer to charge a battery system of a wirelessly chargeable equipment. The operations can include detecting that the wirelessly chargeable equipment is within a power transfer range of the optical beamforming transmitter. The operations can include determining that the wirelessly chargeable equipment is not stationary. The operations can include tracking movement of the wirelessly chargeable equipment and activating the optical beamforming transmitter that provides wireless power transfer to the wirelessly chargeable equipment while the wirelessly chargeable equipment is within the power transfer range.
    Type: Grant
    Filed: November 30, 2020
    Date of Patent: June 13, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude, Samuel N. Zellner
  • Patent number: 11677980
    Abstract: The technology is directed towards image compression and decompression, including for 3D images. A sender device obtains lower resolution sub-images of an original image, captured from different angles. The sender device uses different neural network candidate level data and groups of candidate sub-images to determine selected neural network level data and sub-images that when combined, reconstruct the original image that satisfies a function of quality loss data, for sending to a receiver device. The receiver device receives the neural network level data, the group of sub-images and the reconstruction data, and reconstructs a three-dimensional representation of the original image using the neural network level and the group of sub-images arranged based on the reconstruction data.
    Type: Grant
    Filed: June 8, 2021
    Date of Patent: June 13, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Joseph Soryal
  • Patent number: 11671910
    Abstract: The described technology is generally directed towards communication network application programming interface (API) promulgation. Using the techniques herein, APIs can be hosted at different locations within a network in a transitory manner, shifting from one location to the next. Furthermore, API configurations can change over time, in order to provide enhanced API security and/or to meet different expected needs of client equipment. An API manager can select network equipment to host APIs, in order to move the APIs between different network locations. A floater application within the core network can support the movement of the APIs by creating secure tunnels between the selected network equipment and the core network.
    Type: Grant
    Filed: March 22, 2022
    Date of Patent: June 6, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Joseph Soryal, Christina Cacioppo
  • Publication number: 20230169066
    Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.
    Type: Application
    Filed: January 27, 2023
    Publication date: June 1, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban
  • Publication number: 20230168816
    Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool.
    Type: Application
    Filed: January 26, 2023
    Publication date: June 1, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Patent number: 11656619
    Abstract: Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.
    Type: Grant
    Filed: February 18, 2021
    Date of Patent: May 23, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Joseph Soryal, Dylan C. Reid
  • Publication number: 20230152880
    Abstract: Aspects of the subject disclosure may include, for example, receiving, over a network, at an extended reality (XR) system, a movement command corresponding to a commanded movement, the commanded movement by a second user at a remote XR system to contact a first user at the XR system, determining if the commanded movement should proceed to contact the user, and responsive to a determination that the commanded movement should not contact the first user, suspending completion of the movement command at the XR system.. Other embodiments are disclosed.
    Type: Application
    Filed: November 16, 2021
    Publication date: May 18, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230155923
    Abstract: Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including selecting a first set of one or more nodes in a packet switched network to establish a primary route for data packets to pass from a source to a destination; selecting a second set of one or more nodes in the packet switched network to establish a second route for the data packets to pass from the source to the destination in the packet switched network, wherein each node in the second set of one or more nodes is different from every node in the first set of one or more nodes; and monitoring the data packets received from the packet switched network via the primary route and via the second route. Other embodiments are disclosed.
    Type: Application
    Filed: November 15, 2021
    Publication date: May 18, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Howard Lang
  • Patent number: 11647378
    Abstract: Electronic subscriber identity modules (eSIM) can be more susceptible to hackers and more vulnerable than physical subscriber identity modules. The current disclosure discusses systems and methods to facilitate eSIM security by utilizing a management software application (MSA) hosted on a mobile device. This MSA can cross-reference eSIM registration data with mobile device signature data to determine if the correct user identity is associated with mobile device prior to an eSIM being issued to the mobile device. Additionally, various degrees of data flagging can be utilized to allow an end user to properly address an indication of mobile device vulnerability.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: May 9, 2023
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230138176
    Abstract: Machine-learning based user authentication using a mobile device (e.g., using a computerized tool) is enabled. For example, a non-transitory machine-readable medium can comprise executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining an input received via a mobile device, determining, based on the input and using an authentication model, whether the input threshold matches an input pattern associated with an authorized user profile authorized to access a feature of the mobile device, wherein the input pattern has been determined based on machine learning applied to past inputs at the mobile device other than the input, and wherein the authentication model has been generated based on the machine learning applied to the input pattern, and based on a determination that the input at the mobile device is associated with an authorized user profile, granting access to the feature of the mobile device.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 4, 2023
    Inventor: Joseph Soryal
  • Publication number: 20230140098
    Abstract: Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate a report that includes information associated with the anomaly.
    Type: Application
    Filed: December 29, 2022
    Publication date: May 4, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude
  • Publication number: 20230134941
    Abstract: The described technology is generally directed towards an automated security hangar for private cellular networks. In response to detecting that a user equipment is departing a geographic area served by a private cellular network, the user equipment can encrypt its data and send it to a private cellular network server. The server can receive and securely store the encrypted data, and the server can provide a code to the user equipment. The user equipment can store the code, disconnect from the private cellular network, and depart the geographic area. When the user equipment returns to the geographic area and reconnects to the private cellular network, the user equipment can present the code to the server. The server can validate the code, the user equipment, and/or the operator of the user equipment, and the server can return the encrypted data to the user equipment.
    Type: Application
    Filed: November 2, 2021
    Publication date: May 4, 2023
    Inventor: Joseph Soryal
  • Publication number: 20230125369
    Abstract: An example method for assisting humans and machines to perform workflow tasks in a coordinated manner includes collecting a plurality of signal inputs associated with a human and a machine who are cooperating to perform a workflow, delegating a first set of tasks of the workflow to the human and a second set of tasks of the workflow to the machine, sending a first signal to the human and a second signal to the machine, wherein the first signal identifies a task of the first set of tasks and the second signal identifies a task of the second set of tasks, and monitoring a progress of the workflow subsequent to sending the first signal and the second signal.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 27, 2023
    Inventor: Joseph Soryal
  • Publication number: 20230129621
    Abstract: Improved optical network security (e.g., using a computerized tool) is enabled. Various embodiments herein can send (e.g., via a network) to a group of network devices comprising a first network device and a second network device, a first encrypted data stream, a second encrypted data stream, a first hash code, and a second hash code, wherein the first network device deletes the second encrypted data stream after the first network device hashes the second encrypted data stream, and in response to the second network device being determined not to have received the second hash code within a defined threshold time, determine that the first network device is unauthorized to use the network.
    Type: Application
    Filed: October 27, 2021
    Publication date: April 27, 2023
    Inventors: Joseph Soryal, Dylan Chamberlain Reid
  • Publication number: 20230128524
    Abstract: Aspects of the subject disclosure may include, for example, receiving first imaging data corresponding to first images of a first plurality of first users, each of the first users being located at a first location; obtaining first hierarchical rank data, the first hierarchical rank data being indicative of a first hierarchical ranking of each of the first users relative to each other of the first users; generating, based at least in part upon the first imaging data and the first hierarchical rank data, second imaging data, and sending the second imaging data to a second location, the second location being separate from the first location, the second imaging data enabling a first holographic projector at the second location to present first holograms, the first holograms comprising one or more first emphasized images representing a first particular one of the first users who is ranked highest by the first hierarchical rank data, and the first holograms further comprising one or more first un-emphasized images
    Type: Application
    Filed: October 25, 2021
    Publication date: April 27, 2023
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Joseph Soryal
  • Publication number: 20230130128
    Abstract: The technologies described herein are generally directed to modeling radio wave propagation in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, facilitating, by a first device, receiving a first communication directed to a second device from a third device associated with a first telephone number. The method can further include determining, by the first device, that the first communication comprises a reference to a second telephone number different from the first telephone number, resulting in a number discrepancy. Further, based on the number discrepancy and an analysis of the first communication, the method can further include preventing, by the first device, communication of the first communication to the third device.
    Type: Application
    Filed: December 23, 2022
    Publication date: April 27, 2023
    Inventors: Howard Lang, Joseph Soryal