Patents by Inventor Tony Hansen
Tony Hansen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11783300Abstract: Methods are disclosed for optimizing execution of tasks for users. A processing system including a processor detects a triggering condition for a transport task for transporting a subject from a first location to a second location via usage of an autonomous vehicle, establishes a negotiated task coordination plan between a user and a third party provider for performing the transport task, and executes the negotiated task coordination plan, wherein the executing causes the autonomous vehicle to travel between the first location and the second location for transporting the subject.Type: GrantFiled: December 26, 2018Date of Patent: October 10, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita V. Rao, Tony Hansen
-
Publication number: 20230227159Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.Type: ApplicationFiled: March 10, 2023Publication date: July 20, 2023Applicant: AT & T Intellectual Property I, L.P.Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
-
Patent number: 11634220Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.Type: GrantFiled: August 6, 2018Date of Patent: April 25, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
-
Patent number: 10826943Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.Type: GrantFiled: August 21, 2018Date of Patent: November 3, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
-
Patent number: 10791023Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.Type: GrantFiled: August 9, 2018Date of Patent: September 29, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
-
Publication number: 20200210960Abstract: Methods are disclosed for optimizing execution of tasks for users. A processing system including a processor detects a triggering condition for a transport task for transporting a subject from a first location to a second location via usage of an autonomous vehicle, establishes a negotiated task coordination plan between a user and a third party provider for performing the transport task, and executes the negotiated task coordination plan, wherein the executing causes the autonomous vehicle to travel between the first location and the second location for transporting the subject.Type: ApplicationFiled: December 26, 2018Publication date: July 2, 2020Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita V. Rao, Tony Hansen
-
Publication number: 20200067983Abstract: In one embodiment, a method includes receiving, by a security controller, a first security sequence generated by a network controller of a network and a second security sequence generated by a node of the network. The second security sequence is a security configuration of the node when the second security sequence was generated. The method also includes generating, by the security controller, a third security sequence and detecting, by the security controller, a discrepancy between the first security sequence, the second security sequence, and the third security sequence. In response to detecting the discrepancy, the method further includes determining, by the security controller, that the security configuration of the node has been modified.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Joseph Soryal, Cristina Serban, Lalita Rao, Naila Jaoude, Tony Hansen
-
Publication number: 20200052961Abstract: In one embodiment, a method includes transmitting, by a node of a network, a first configuration file to a plurality of active nodes of the network and receiving, by the node of the network, a vote from one or more of the plurality of active nodes of the network. Each vote is generated by an active node in response to the active node comparing the first configuration file received from the node to a second configuration file received from a system administrator. The method also includes determining, based on each vote received from each active node, a percentage of the plurality of active nodes of the network that voted to approve the first configuration file. The method further includes determining, by the node of the network, whether to activate the node based on the percentage of the plurality of active nodes that voted to approve the first configuration file.Type: ApplicationFiled: August 9, 2018Publication date: February 13, 2020Inventors: Joseph Soryal, Naila Jaoude, Cristina Serban, Lalita Rao, Tony Hansen
-
Publication number: 20200039645Abstract: Autonomous unmanned aerial vehicle management service may provide a platform to manage groups of unmanned aerial vehicles to work together on a task simultaneously in an autonomous manner.Type: ApplicationFiled: August 6, 2018Publication date: February 6, 2020Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
-
Patent number: 10467893Abstract: A traffic navigation system having a user device configured to be used by a pedestrian. The system has memory storing instructions that cause the user device to effectuate operations, the operations including registering the user device with an authentication system, processing traffic data in the proximity of the pedestrian, comparing the traffic data with a route to be followed by the pedestrian and based on the comparing step, (a) generating a sensory alert based on the warning message; (b) sending an alert message to a vehicle associated with the traffic data; and (c) sending a cycle signal to a traffic control system.Type: GrantFiled: June 29, 2018Date of Patent: November 5, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Lalita V. Rao, Cristina Serban, Naila Jaoude, Tony Hansen
-
Patent number: 8775521Abstract: Disclosed is a method and system for detecting a zombie attack in a network having a plurality of computers. The method and system include a network analysis module for determining, for each computer, a working set of email addresses associated with emails sent by each computer. A zombie attack is detected by determining at least one of: 1) at least one computer in the plurality is transmitting more than a threshold rate of emails, 2) that at least one of the computers is transmitting more than a first threshold number of emails to email addresses outside of its associated working set, 3) that a first threshold number of computers in the plurality are transmitting email messages to email addresses outside of their associated working set, and 4) that more than a second threshold number of computers are transmitting more than a second threshold number of emails to a recipient computer.Type: GrantFiled: June 30, 2006Date of Patent: July 8, 2014Assignee: AT&T Intellectual Property II, L.P.Inventors: John Feaver, Tony Hansen
-
Publication number: 20080071918Abstract: A method and system for using XML for both a protocol layer and application data are described. The method comprises the steps of initiating a connection by a client to a server to form a session, responding by said server to said client indicating that said connection has been successfully completed, submitting a request by said client to said server for service, responding by said server to said client by providing said service and terminating the connection by said client. A session is maintained and a plurality of requests for service by a client and a server responds to those requests by providing the requested service or an error message. The session is maintained until all requests made by a client have been serviced and the requests made by a client may be either synchronous or asynchronous. The system comprises a client and a server coupled to said client by a communication link.Type: ApplicationFiled: October 31, 2007Publication date: March 20, 2008Inventors: Mark Jones, Tony Hansen
-
Publication number: 20080005316Abstract: Disclosed is a method and system for detecting a zombie attack in a network having a plurality of computers. The method and system include a network analysis module for determining, for each computer, a working set of email addresses associated with emails sent by each computer. A zombie attack is detected by determining at least one of: 1) at least one computer in the plurality is transmitting more than a threshold rate of emails, 2) that at least one of the computers is transmitting more than a first threshold number of emails to email addresses outside of its associated working set, 3) that a first threshold number of computers in the plurality are transmitting email messages to email addresses outside of their associated working set, and 4) that more than a second threshold number of computers are transmitting more than a second threshold number of emails to a recipient computer.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Inventors: John Feaver, Tony Hansen