Patents by Inventor Thomas Killian
Thomas Killian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11341498Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: January 29, 2019Date of Patent: May 24, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 11188663Abstract: A system, method and computer readable media provided for watermarking a digital file. The method comprises altering samples of the digital file available for distribution upon request by adding a number such as + or a ?1 to each sample of the digital file according to a probability value and compressing the digital file with the altered samples. Altering the sample of the digital file may be done on a per distribution or per sale basis.Type: GrantFiled: March 15, 2013Date of Patent: November 30, 2021Assignee: AT&T Intellectual Property II, L.P.Inventor: Thomas Killian
-
Patent number: 10771457Abstract: A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.Type: GrantFiled: April 16, 2019Date of Patent: September 8, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Charles D. Blewett, Megan Blewett, Juan A. Garay, Robert C. Haarde, Thomas Killian, Yitzhak H. Mandelbaum, Simon Urbanek
-
Publication number: 20190245847Abstract: A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.Type: ApplicationFiled: April 16, 2019Publication date: August 8, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Charles D. Blewett, Megan Blewett, Juan A. Garay, Robert C. Haarde, Thomas Killian, Yitzhak H. Mandelbaum, Simon Urbanek
-
Patent number: 10305890Abstract: A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.Type: GrantFiled: May 9, 2016Date of Patent: May 28, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Charles D. Blewett, Megan Blewett, Juan A. Garay, Robert C. Haarde, Thomas Killian, Yitzhak H. Mandelbaum, Simon Urbanek
-
Publication number: 20190156339Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 10229410Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: March 2, 2015Date of Patent: March 12, 2019Assignee: AT&T Intellectual Propery I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 9942758Abstract: A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.Type: GrantFiled: June 20, 2016Date of Patent: April 10, 2018Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thomas Killian, Byoung-Jo Kim, Christopher Rice, Nemmara K. Shankaranarayanan
-
Patent number: 9655035Abstract: Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.Type: GrantFiled: February 3, 2016Date of Patent: May 16, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: James Gordon Beattie, Jr., Stephen Griesmer, Thomas Killian, N. L. Schryer, Dipesh Hasmukhlal Shah, Kaushik Gohel
-
Publication number: 20170019398Abstract: A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.Type: ApplicationFiled: May 9, 2016Publication date: January 19, 2017Applicant: AT&T Intellectual Property I, L.P.Inventors: Charles D. Blewett, Megan Blewett, Juan A. Garay, Robert C. Haarde, Thomas Killian, Yitzhak H. Mandelbaum, Simon Urbanek
-
Publication number: 20160295411Abstract: A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.Type: ApplicationFiled: June 20, 2016Publication date: October 6, 2016Inventors: Thomas Killian, Byoung-Jo Kim, Christopher Rice, Nemmara K. Shankaranarayanan
-
Patent number: 9380043Abstract: A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.Type: GrantFiled: May 20, 2014Date of Patent: June 28, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Charles D. Blewett, Megan Blewett, Juan A. Garay, Robert C. Haarde, Thomas Killian, Yitzhak H. Mandelbaum, Simon Urbanek
-
Patent number: 9374362Abstract: A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.Type: GrantFiled: December 5, 2014Date of Patent: June 21, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas Killian, Byoung-Jo Kim, Christopher Rice, Nemmara K. Shankaranarayanan
-
Publication number: 20160157167Abstract: Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.Type: ApplicationFiled: February 3, 2016Publication date: June 2, 2016Inventors: James Gordon Beattie, JR., Stephen Griesmer, Thomas Killian, N.L. Schryer, Dipesh Hasmukhlal Shah, Kaushik Gohel
-
Patent number: 9288699Abstract: Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.Type: GrantFiled: January 14, 2014Date of Patent: March 15, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: James Gordon Beattie, Stephen Griesmer, Thomas Killian, N. L. Schryer, Dipesh Hasmukhlal Shah, Kaushik Gohel
-
Patent number: 9256844Abstract: A system and method for postage payment utilizes passive RFID tags as postage “stamps”, with the amount of the postage automatically billed to a previously-established customer account. The tags are stored in a separate stamp database and are “enabled” by linking the individual tag to a customer account. The use of the RFID stamps eliminates the need for the customer to know the proper postage beforehand. The existence of a customer account with a proper return address reduces the likelihood of a dead letter. Also, a special category of stamps may be used for automatic reply mail. By virtue of using an RFID tag, the mailed item's progress through the postal delivery system may be tracked from dispatch to delivery.Type: GrantFiled: July 14, 2014Date of Patent: February 9, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas Killian, Cynthia Price Killian
-
Publication number: 20150170146Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: ApplicationFiled: March 2, 2015Publication date: June 18, 2015Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Publication number: 20150095640Abstract: A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.Type: ApplicationFiled: December 5, 2014Publication date: April 2, 2015Inventors: Thomas Killian, SR., Byoung-Jo Kim, Christopher Rice, Nemmara K. Shankaranarayanan
-
Patent number: 8996867Abstract: The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.Type: GrantFiled: February 28, 2008Date of Patent: March 31, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Donald John Bowen, Thomas Killian, David Kormann, Robert R. Miller, II, Norman L. Schryer
-
Patent number: 8914628Abstract: A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.Type: GrantFiled: November 16, 2009Date of Patent: December 16, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas Killian, Byoung-Jo Kim, Christopher Rice, Nemmara K. Shankaranarayanan