Patents by Inventor LALITA RAO
LALITA RAO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230169066Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.Type: ApplicationFiled: January 27, 2023Publication date: June 1, 2023Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban
-
Patent number: 11593350Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.Type: GrantFiled: September 11, 2020Date of Patent: February 28, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban
-
Publication number: 20200409935Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.Type: ApplicationFiled: September 11, 2020Publication date: December 31, 2020Applicant: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban
-
Patent number: 10826943Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.Type: GrantFiled: August 21, 2018Date of Patent: November 3, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
-
Patent number: 10810185Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.Type: GrantFiled: September 22, 2016Date of Patent: October 20, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Tony L. Hansen, Naila Jaoude, Lalita Rao, Cristina Serban
-
Patent number: 10791023Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.Type: GrantFiled: August 9, 2018Date of Patent: September 29, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
-
Publication number: 20200067983Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
-
Publication number: 20200052961Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.Type: ApplicationFiled: August 9, 2018Publication date: February 13, 2020Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
-
Publication number: 20180081927Abstract: Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.Type: ApplicationFiled: September 22, 2016Publication date: March 22, 2018Inventors: Joseph Soryal, TONY L. HANSEN, NAILA JAOUDE, LALITA RAO, CRISTINA SERBAN