Patents by Inventor Norman L. Schryer
Norman L. Schryer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11341498Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: January 29, 2019Date of Patent: May 24, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Publication number: 20190156339Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 10229410Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: March 2, 2015Date of Patent: March 12, 2019Assignee: AT&T Intellectual Propery I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Publication number: 20150170146Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: ApplicationFiled: March 2, 2015Publication date: June 18, 2015Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 8996867Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: February 28, 2008Date of Patent: March 31, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 8799665Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.Type: GrantFiled: June 13, 2013Date of Patent: August 5, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas Killian, Norman L. Schryer
-
Patent number: 8660019Abstract: A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.Type: GrantFiled: May 10, 2007Date of Patent: February 25, 2014Assignee: AT&T Intellectual Property I, LPInventors: Norman L. Schryer, Thomas Killian
-
Publication number: 20130276148Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.Type: ApplicationFiled: June 13, 2013Publication date: October 17, 2013Inventors: Thomas Killian, Norman L. Schryer
-
Patent number: 8489882Abstract: A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.Type: GrantFiled: March 3, 2009Date of Patent: July 16, 2013Assignee: AT&T Intellectual Property I, L. P.Inventors: Thomas Killian, Norman L. Schryer
-
Publication number: 20100228983Abstract: A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.Type: ApplicationFiled: March 3, 2009Publication date: September 9, 2010Inventors: Thomas Killian, Norman L. Schryer
-
Publication number: 20090222660Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: ApplicationFiled: February 28, 2008Publication date: September 3, 2009Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 7545745Abstract: A terminal adapter for guaranteeing the quality of service of both voice and data packets is disclosed. Such quality is ensured by inserting gaps between successive data packets in a stream of multiplexed data and/or voice packets. A gap after a particular data packet is proportional to the size of that particular data packet. In this way, bandwidth is preserved for any voice packets that may have arrived during the transfer of the data packet as well as for any voice packets that arrive during the gap. The unconstrained upstream data bandwidth and the bandwidth used by voice calls may each be estimated by taking a plurality of instantaneous measurements of the available bandwidth and/or taking individual direct measurements. The size of data packets may be limited to a maximum size in order to ensure that time-sensitive voice packets experience only an acceptable delay in queue for transmission.Type: GrantFiled: January 14, 2005Date of Patent: June 9, 2009Assignee: AT&T Intellectual Property II, L.P.Inventors: Ali M. Cherchali, Gagan Lal Choudhury, Gerald Murray Ezrol, Marius Jonas Gudelis, Thomas Joseph Killian, Jerry A. Leger, Norman L. Schryer
-
Publication number: 20080279112Abstract: A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.Type: ApplicationFiled: May 10, 2007Publication date: November 13, 2008Applicant: AT&T KNOWLEDGE VENTURES, L.P.Inventors: NORMAN L. SCHRYER, THOMAS KILLIAN
-
Publication number: 20080159533Abstract: A system and method of processing data are provided. The method may include encoding a first watermark into a data file to form first watermarked data. The data file may include audio data. The method may also include sending the first watermarked data to a remotely located user device associated with a user. The method may also include receiving a request from the user to resend the audio data. The method may further include encoding a second watermark into the data file to form second watermarked data. The method may also include sending the second watermarked data to the user device.Type: ApplicationFiled: December 28, 2006Publication date: July 3, 2008Applicant: AT&T Knowledge Ventures, LPInventors: Norman L. Schryer, Thomas Killian, Constance Coty
-
Patent number: 5631907Abstract: According to this invention, the system prepares user data into blocks of manageable size prior to software distribution. A block is similar in principle to memory pages in a file management system and has a predefined size, sequential ordering, and layout from which the original information can be reconstructed. The broadcast protocol is enhanced to include a block identifier to identify where the receiver performs error detection and error correction on each block. Station receiving the data maintains a list of the identity of those blocks of data that it believes have not been received properly. With each retransmission, each work station attempts to receive and recover those blocks marked on its list. Advantageously, each transmitted block is encoded using forward error correction in order to further enhance the probability of proper reception of the data.Type: GrantFiled: December 13, 1995Date of Patent: May 20, 1997Assignee: Lucent Technologies Inc.Inventors: Paul J. Guarneri, Thomas J. Killian, Venkata C. Majeti, Norman L. Schryer