AT&T Patent Applications

Initiating Signaling in Mobile Management Entity Pools Using Workflows

Granted: October 19, 2017
Application Number: 20170303113
Concepts and technologies are disclosed herein for initiating signaling in mobile management entity pools using workflows. A processor can execute an orchestrator application. The processor can receive location data that indicates a geographic location at which a virtual mobility management entity has been instantiated and registered. The processor can obtain a mobility management entity topology that defines boundaries of two or more mobile management entity pools and identify, based on…

Methods, Devices, and Computer Readable Storage Devices for Collecting and Reporting Location Data with a High Accuracy

Granted: October 19, 2017
Application Number: 20170303232
A mobile communication device collects and reports location data associated with itself and with mobile communication devices within a proximity. The mobile communication device determines its location and detects the presence of another communication device located within the proximity of the mobile communication device. The mobile communication device determines a location of the other mobile communication device. The mobile communication device reports its location and the location of…

Using Diversity to Provide Redundancy of Virtual Machines

Granted: October 12, 2017
Application Number: 20170293538
Concepts and technologies are disclosed herein for using diversity to provide redundancy of virtual machines. A server computer that executes an orchestrator application can receive a virtual machine instantiation request. The server computer can analyze the request to determine needs associated with a virtual machine (including a redundancy requirement). The server computer can obtain resource availability data that indicates availability of resources and includes diversity data used to…

METHODS, COMPUTER PROGRAM PRODUCTS, AND SYSTEMS FOR AUTOMATICALLY SYNCHRONIZING DIRECTORY STRUCTURES ACROSS DIFFERENT APPLICATIONS

Granted: October 12, 2017
Application Number: 20170293631
Directory structures of a messaging application and a personal file manager application are synchronized. A designated layer in the directory structure of the messaging application is associated with the designated layer in the directory structure of the personal file manager application. Each time a folder is created or an existing folder is modified or deleted in the designated layer in the directory structure of the messaging application, a corresponding folder is created, modified,…

System and Method For Delivering Content Over a Multicast Network

Granted: October 12, 2017
Application Number: 20170295030
A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session.

Auto-Scaling Software-Defined Monitoring Platform for Software-Defined Networking Service Assurance

Granted: October 12, 2017
Application Number: 20170295082
Concepts and technologies disclosed herein are directed to an auto-scaling software-defined monitoring (“SDM”) platform for software-defined networking (“SDN”) service assurance. According to one aspect of the concepts and technologies disclosed herein, an SDM controller can monitor event data associated with a network even that occurred within a virtualized IP SDN network that is monitored by a virtualized SDM resources platform. The SDM controller can measure, based upon the…

Secure Socket Layer Keystore and Truststore Generation

Granted: October 12, 2017
Application Number: 20170295152
A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a runtime environment with keystore information contained within the keystore. A method for generating a keystore may include receiving, by a distribution system, a request for a keystore from a computing device, generating a key pair including a public key and a private key, generating a…

System And Method For Providing Wearable Authentication and Management

Granted: October 12, 2017
Application Number: 20170295173
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric data or movement signatures specific to the wearer of a wearable device. Once the user and wearable device are authenticated, the system may activate and provision connectivity services for the wearable device, associate the device with a device ecosystem of the user, and push predefined settings to the wearable device.…

LOCAL CHANNELS ANYWHERE

Granted: October 5, 2017
Application Number: 20170288800
A mobile viewing method includes accessing location information indicative of a current location of a mobile device associated with a home market. A current market corresponding to the current location of the mobile device is identified. If the current market differs from the home market, the mobile device is granted access to a retransmission of at least one local channel of the current market. The location information may include GPS information indicative of GPS coordinates of the…

Providing Differentiated Service To Traffic Flows Obscured By Content Distribution Systems

Granted: October 5, 2017
Application Number: 20170289049
A system for providing differentiated services to traffic flows of a content distribution network is disclosed. In particular, the system may include determining if a first portion of an internet protocol address associated with a traffic flow includes an identifier for a node in the content distribution network by comparing the identifier to a set of prefixes for the content distribution network. Additionally, the system may include determining if a second portion of the internet…

Cloud-Based Communication Account Security

Granted: October 5, 2017
Application Number: 20170289177
A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based on the request, one of multiple available diagnostic algorithms is selected to analyze user data related to a user's account to identify symptoms of the problem and diagnose a cause of the symptoms identified.

Methods, Systems, and Devices for Securing Content

Granted: October 5, 2017
Application Number: 20170289627
Methods, systems, and devices secure content in memory. The content includes a lock that prohibits reading the content from memory. Prior to expiration of the lock the content cannot be read from the memory. However, a preview option allows at least a portion of the content to be accessed. The preview option provides a preview of the content. At expiration, the content is readable.

Video Assets

Granted: October 5, 2017
Application Number: 20170289632
A method and system for controlling viewing of multimedia content includes collecting viewing control profiles and associated viewing control passwords via an Internet-protocol television portal, a web portal, and a mobile portal. The viewing control profile may be usable to restrict access to certain multimedia programs. The viewing control may be applied using a unified storefront application, providing access to multimedia content via the Internet-protocol television portal, the web…

Tuning Networks and User Equipment Using a Power Profile

Granted: October 5, 2017
Application Number: 20170289913
Concepts and technologies are disclosed herein for tuning networks and user equipment using a power profile. A power profile can be generated for a communication device. The power profile can include power type information that can indicate a power source associated with the device. The power profile can be stored at a data storage device. A registration message can be generated. The registration message can include power profile data that is based on the power profile. The registration…

Remote Monitoring of Physiological Data via the Internet

Granted: October 5, 2017
Application Number: 20170281002
Methods, systems, and products measure health data related to a user. A time-stamped device identifier is received that uniquely identifies a communications device. A time-stamped sensor measurement is separately received. A difference in time between the time-stamped device identifier and the time-stamped sensor measurement is determined. When the difference in time is within a window of time, then the sensor measurement is associated with the device identifier.

Password Recovery

Granted: October 5, 2017
Application Number: 20170286667
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's…

Tailored Protection of Personally Identifiable Information

Granted: October 5, 2017
Application Number: 20170286719
Methods, systems, and products protect personally identifiable information. Many websites acquire the personally identifiable information without a user's knowledge or permission. Here, though, the user may control what personally identifiable information is shared with any website. For example, the personally identifiable information may be read from a header of a packet and compared to a requirement associated with a domain name.

Methods, Systems and Products for Authentication

Granted: October 5, 2017
Application Number: 20170286960
Multiple authentication procedures enhance security of Internet transactions. For example, a request is received from a customer to access a service. A first authentication request is sent to the customer for first authentication information. A second authentication request may be sent to the customer for second authentication information. The method then enables the customer to proceed with accessing the service if the second authentication information is received.

Evolved Packet Core Applications Microservices Broker

Granted: September 28, 2017
Application Number: 20170279910
Concepts and technologies disclosed herein are directed to an evolved packet core (“EPC”) applications microservices broker (“microservices broker”). According to one aspect of the concepts and technologies disclosed herein, a microservices broker can receive a microservice request that identifies a microservice. The microservices broker can check a microservices broker database for a user equipment (“UE”) that is capable of servicing the microservice request. The…

Directional Location of Sound Sources

Granted: September 21, 2017
Application Number: 20170270199
Directional sound location is used to determine security events of a security system. A sound sensor reports a vector direction to a sound source of an acoustic signal. If the vector direction is historically observed at similar times, then perhaps the sound source is not considered a security event. However, if the vector direction is unknown or unfamiliar, the security system may infer the security event and notify emergency services.