Patents by Inventor Tony Hansen

Tony Hansen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11783300
    Abstract: Methods are disclosed for optimizing execution of tasks for users. A processing system including a processor detects a triggering condition for a transport task for transporting a subject from a first location to a second location via usage of an autonomous vehicle, establishes a negotiated task coordination plan between a user and a third party provider for performing the transport task, and executes the negotiated task coordination plan, wherein the executing causes the autonomous vehicle to travel between the first location and the second location for transporting the subject.
    Type: Grant
    Filed: December 26, 2018
    Date of Patent: October 10, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita V. Rao, Tony Hansen
  • Publication number: 20230227159
    Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.
    Type: Application
    Filed: March 10, 2023
    Publication date: July 20, 2023
    Applicant: AT & T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
  • Patent number: 11634220
    Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: April 25, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
  • Patent number: 10826943
    Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: November 3, 2020
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
  • Patent number: 10791023
    Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: September 29, 2020
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
  • Publication number: 20200210960
    Abstract: Methods are disclosed for optimizing execution of tasks for users. A processing system including a processor detects a triggering condition for a transport task for transporting a subject from a first location to a second location via usage of an autonomous vehicle, establishes a negotiated task coordination plan between a user and a third party provider for performing the transport task, and executes the negotiated task coordination plan, wherein the executing causes the autonomous vehicle to travel between the first location and the second location for transporting the subject.
    Type: Application
    Filed: December 26, 2018
    Publication date: July 2, 2020
    Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita V. Rao, Tony Hansen
  • Publication number: 20200067983
    Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.
    Type: Application
    Filed: August 21, 2018
    Publication date: February 27, 2020
    Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
  • Publication number: 20200052961
    Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.
    Type: Application
    Filed: August 9, 2018
    Publication date: February 13, 2020
    Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
  • Publication number: 20200039645
    Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.
    Type: Application
    Filed: August 6, 2018
    Publication date: February 6, 2020
    Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
  • Patent number: 10467893
    Abstract: A traffic navigation system having a user device configured to be used by a pedestrian. The system has memory storing instructions that cause the user device to effectuate operations, the operations including registering the user device with an authentication system, processing traffic data in the proximity of the pedestrian, comparing the traffic data with a route to be followed by the pedestrian and based on the comparing step, (a) generating a sensory alert based on the warning message; (b) sending an alert message to a vehicle associated with the traffic data; and (c) sending a cycle signal to a traffic control system.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: November 5, 2019
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
  • Patent number: 8775521
    Abstract: Disclosed is a method and system for detecting a zombie attack in a network having a plurality of computers. The method and system include a network analysis module for determining, for each computer, a working set of email addresses associated with emails sent by each computer. A zombie attack is detected by determining at least one of: 1) at least one computer in the plurality is transmitting more than a threshold rate of emails, 2) that at least one of the computers is transmitting more than a first threshold number of emails to email addresses outside of its associated working set, 3) that a first threshold number of computers in the plurality are transmitting email messages to email addresses outside of their associated working set, and 4) that more than a second threshold number of computers are transmitting more than a second threshold number of emails to a recipient computer.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: July 8, 2014
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: John Feaver, Tony Hansen
  • Publication number: 20080071918
    Abstract: A method and system for using XML for both a protocol layer and application data are described. The method comprises the steps of initiating a connection by a client to a server to form a session, responding by said server to said client indicating that said connection has been successfully completed, submitting a request by said client to said server for service, responding by said server to said client by providing said service and terminating the connection by said client. A session is maintained and a plurality of requests for service by a client and a server responds to those requests by providing the requested service or an error message. The session is maintained until all requests made by a client have been serviced and the requests made by a client may be either synchronous or asynchronous. The system comprises a client and a server coupled to said client by a communication link.
    Type: Application
    Filed: October 31, 2007
    Publication date: March 20, 2008
    Inventors: Mark Jones, Tony Hansen
  • Publication number: 20080005316
    Abstract: Disclosed is a method and system for detecting a zombie attack in a network having a plurality of computers. The method and system include a network analysis module for determining, for each computer, a working set of email addresses associated with emails sent by each computer. A zombie attack is detected by determining at least one of: 1) at least one computer in the plurality is transmitting more than a threshold rate of emails, 2) that at least one of the computers is transmitting more than a first threshold number of emails to email addresses outside of its associated working set, 3) that a first threshold number of computers in the plurality are transmitting email messages to email addresses outside of their associated working set, and 4) that more than a second threshold number of computers are transmitting more than a second threshold number of emails to a recipient computer.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: John Feaver, Tony Hansen