Patents by Inventor Norman L. Schryer

Norman L. Schryer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11341498
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: May 24, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Publication number: 20190156339
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Application
    Filed: January 29, 2019
    Publication date: May 23, 2019
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Patent number: 10229410
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: March 12, 2019
    Assignee: AT&T Intellectual Propery I, L.P.
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Publication number: 20150170146
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Application
    Filed: March 2, 2015
    Publication date: June 18, 2015
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Patent number: 8996867
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Grant
    Filed: February 28, 2008
    Date of Patent: March 31, 2015
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Patent number: 8799665
    Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: August 5, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Thomas Killian, Norman L. Schryer
  • Patent number: 8660019
    Abstract: A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: February 25, 2014
    Assignee: AT&T Intellectual Property I, LP
    Inventors: Norman L. Schryer, Thomas Killian
  • Publication number: 20130276148
    Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.
    Type: Application
    Filed: June 13, 2013
    Publication date: October 17, 2013
    Inventors: Thomas Killian, Norman L. Schryer
  • Patent number: 8489882
    Abstract: A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.
    Type: Grant
    Filed: March 3, 2009
    Date of Patent: July 16, 2013
    Assignee: AT&T Intellectual Property I, L. P.
    Inventors: Thomas Killian, Norman L. Schryer
  • Publication number: 20100228983
    Abstract: A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.
    Type: Application
    Filed: March 3, 2009
    Publication date: September 9, 2010
    Inventors: Thomas Killian, Norman L. Schryer
  • Publication number: 20090222660
    Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
    Type: Application
    Filed: February 28, 2008
    Publication date: September 3, 2009
    Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
  • Patent number: 7545745
    Abstract: A terminal adapter for guaranteeing the quality of service of both voice and data packets is disclosed. Such quality is ensured by inserting gaps between successive data packets in a stream of multiplexed data and/or voice packets. A gap after a particular data packet is proportional to the size of that particular data packet. In this way, bandwidth is preserved for any voice packets that may have arrived during the transfer of the data packet as well as for any voice packets that arrive during the gap. The unconstrained upstream data bandwidth and the bandwidth used by voice calls may each be estimated by taking a plurality of instantaneous measurements of the available bandwidth and/or taking individual direct measurements. The size of data packets may be limited to a maximum size in order to ensure that time-sensitive voice packets experience only an acceptable delay in queue for transmission.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: June 9, 2009
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Ali M. Cherchali, Gagan Lal Choudhury, Gerald Murray Ezrol, Marius Jonas Gudelis, Thomas Joseph Killian, Jerry A. Leger, Norman L. Schryer
  • Publication number: 20080279112
    Abstract: A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.
    Type: Application
    Filed: May 10, 2007
    Publication date: November 13, 2008
    Applicant: AT&T KNOWLEDGE VENTURES, L.P.
    Inventors: NORMAN L. SCHRYER, THOMAS KILLIAN
  • Publication number: 20080159533
    Abstract: A system and method of processing data are provided. The method may include encoding a first watermark into a data file to form first watermarked data. The data file may include audio data. The method may also include sending the first watermarked data to a remotely located user device associated with a user. The method may also include receiving a request from the user to resend the audio data. The method may further include encoding a second watermark into the data file to form second watermarked data. The method may also include sending the second watermarked data to the user device.
    Type: Application
    Filed: December 28, 2006
    Publication date: July 3, 2008
    Applicant: AT&T Knowledge Ventures, LP
    Inventors: Norman L. Schryer, Thomas Killian, Constance Coty
  • Patent number: 5631907
    Abstract: According to this invention, the system prepares user data into blocks of manageable size prior to software distribution. A block is similar in principle to memory pages in a file management system and has a predefined size, sequential ordering, and layout from which the original information can be reconstructed. The broadcast protocol is enhanced to include a block identifier to identify where the receiver performs error detection and error correction on each block. Station receiving the data maintains a list of the identity of those blocks of data that it believes have not been received properly. With each retransmission, each work station attempts to receive and recover those blocks marked on its list. Advantageously, each transmitted block is encoded using forward error correction in order to further enhance the probability of proper reception of the data.
    Type: Grant
    Filed: December 13, 1995
    Date of Patent: May 20, 1997
    Assignee: Lucent Technologies Inc.
    Inventors: Paul J. Guarneri, Thomas J. Killian, Venkata C. Majeti, Norman L. Schryer