AT&T INTELLECTUAL PROPERTY 1, L.P. Patent applications |
Patent application number | Title | Published |
20140250096 | Embedded Business Metadata - A methodology is disclosed for improving searches of a distributed Internet network. A distributed Internet network is searched for a particular information type, searching for a field identified using a predetermined identifier indicating that the field comprises information of the particular information type. When the field identified using the predetermined identifier is found, an association of the contents of the field with the search results is made, and repeated using the same predetermined identifier. Information of a particular information type may then be served in a field identified using a predetermined identifier that identifies the field as containing information of the particular information type. | 09-04-2014 |
20130242801 | Reverse Engineering Peering At Internet Exchange Points - A technique for examining the relationships of autonomous systems (ASes) participating in an Internet Exchange Point (IXP) utilizes packet tracing servers proximate the IXPs. Where such packet tracing servers cannot be found in the participating ASes, the methodology identifies additional vantage points by looking at a list of ASes that are one hop away from the ASes at the IXP. The choice of one-hop away ASes is made judiciously by picking ones that have better connectivity, based on past-data. Plural-hop ASes may also be used where necessary. | 09-19-2013 |
20130159343 | Embedded Business Metadata - A methodology is disclosed for improving searches of a distributed Internet network. A distributed Internet network is searched for a particular information type, searching for a field identified using a predetermined identifier indicating that the field comprises information of the particular information type. When the field identified using the predetermined identifier is found, an association of the contents of the field with the search results is made, and repeated using the same predetermined identifier. Information of a particular information type may then be served in a field identified using a predetermined identifier that identifies the field as containing information of the particular information type. | 06-20-2013 |
20120233113 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING A STANDARDIZED INTERPRETIVE ENGINE - Implementing a standardized interpretive engine includes externalizing a business requirement into a component class of a data control structure, defining a solution to the business requirement, entering the solution into metadata within the component class, and pulling data from a data warehouse into the component class based upon the business requirement. Pulling the data includes aggregating sub-tending data from the data warehouse. The aggregation is specified to a level requested via the component class. Implementing the standardized interpretive engine also includes performing a calculation on the data in accordance with the business requirement. The data is pulled away from the data warehouse and forward to the component class, such that a single data source associated with the data is usable multiple times for a plurality of component classes. | 09-13-2012 |
20120148043 | Network Access Via Telephony Services - A network provider can receive a request, via a first mobile device and a mobile wireless telephone network, for access to a wireless network secured with at least one encryption key and implemented by at least one wireless access point. In response to the request, the network provider can associate the first mobile device with a user account of a user and can provide a token to a registrar and to the first mobile device via the mobile wireless telephone network. The registrar can receive, from the first mobile device or a second mobile device associated the user via the wireless access point. After determining, based on the one or more hash values, that the first or second mobile device has possession of the token, the registrar can provide the encryption key to that mobile device. | 06-14-2012 |
20120044329 | METHODS, APPARATUSES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR HIGH DYNAMIC RANGE IMAGING - High dynamic range imaging includes creating a high dynamic range image file for a subject image captured from a first angle. The high dynamic range image file is created by an image capturing device and is stored on the image capturing device. High dynamic range imaging also includes receiving, at the image capturing device over a communications network, a second high dynamic range image file for the subject image captured from a second angle. The second high dynamic range image file is subject to an authorization requirement. High dynamic range imaging further includes creating, by the image capturing device, a composite high dynamic range image file by combining elements of both of the high dynamic range image files, and generating, by the first image capturing device, a three-dimensional high dynamic range image from the composite high dynamic range image file. | 02-23-2012 |
20120041978 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING INTELLIGENT AGENT SERVICES - Implementing intelligent agent services includes generating an ontological domain for an individual based upon sets of information elements. A set of the information elements represents aspects of a detectable behavior of the individual at a point in time. The detectable behavior is one of a number of detectable behaviors of the individual occurring within a physical and virtual geography and in relation to time. The detectable behaviors include an activity conducted by the individual at a computer and a presence of the individual at a function. Implementing the intelligent agent services also includes determining relevance of relationships among the sets of the information elements in the ontological domain, and searching sources of information using the sets of the information elements having a relationship determined to be relevant, and identifying a solution for satisfying an interest based on the search. | 02-16-2012 |
20100150170 | Scalable and Robust Mechanism for Remote IP Device Monitoring With Changing IP Address Assignment - A method is provided for monitoring devices with changing IP addresses. SNMP trap is received from a device at a first IP address to notify that a connection is up, and a SNMP poll is transmitted to the device to obtain an identifier. Predetermined consecutive SNMP GET requests are transmitted to the device in intervals. Responsive to failing to receive from the device predetermined consecutive SNMP GET responses equal to the predetermined consecutive SNMP GET requests, it is determined that there is a connection failure or a device failure and checked whether the device is in a maintenance window. If not in maintenance window, a trouble ticket is generated. Responsive to the failure, there is a predetermined waiting period for another SNMP trap from the device with a second IP address and the same identifier notifying that a connection is back up, and no trouble ticket is generated. | 06-17-2010 |
20090181668 | SYSTEM FOR AUTOMATIC SELECTION OF PROFILE BASED LOCATION - Systems for automatically selecting a user's profile based on location include a device adapted to being tracked by location and a database that includes a user's preferences for routing calls. The user's calls are routed to the user based on the user's call routing preferences and the location of the device. Other systems and methods are also provided. | 07-16-2009 |