1
Mostafa Tofighbakhsh, Yuang Lou, Jacob Lahav: Methods and apparatuses for providing communications services in connection with a communications network. AT&T Mobility II, Parks IP Law, Jennifer P Medlin Esq, February 12, 2013: US08375128 (92 worldwide citation)

Systems and methods for providing differentiated user service options on communications networks are disclosed. Devices can be configured to generate service change requests, and to transmit the service change requests to a network node. The service change request can be routed to a node that determ ...


2
Lisuan Poh, Alka Roy: Systems and methods for implementing a master policy repository in a policy realization framework. AT&T Mobility II, Parks IP Law, Jennifer P Medlin Esq, August 27, 2013: US08521775 (31 worldwide citation)

Various systems and methods for providing a policy realization framework for a communications network are disclosed. The policy realization framework can be an application and service layer policy framework that is separate and distinct from the network layer policy framework. As such, policy decisi ...


3
Jack Poole, Timothy Culver: LDAP replication priority queuing mechanism. AT&T Mobility II, Parks IP Law, Jennifer P Medlin Esq, May 29, 2012: US08190561 (31 worldwide citation)

A replication priority queuing system prioritizes replication requests in accordance with a predetermined scheme. An exemplary system includes a Replication Priority Queue Manager that receives update requests and assigns a priority based upon business rules and stores the requests in associated sto ...


4
James Pratt, Steven Belz, Marc Sullivan: Systems, methods, and computer program products for user authentication. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, August 6, 2013: US08504831 (31 worldwide citation)

Responsive to receiving an authentication request from a device, an authentication server determines a confidence level for the authentication request, generates a confidence-weighted challenge to the authentication request. The confidence-weighted challenge being weighted based upon a confidence le ...


5
Samuel N Zellner, Mark J Enzmann, Robert T Moton Jr: Identity blocking service from a wireless service provider. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, April 24, 2012: US08165568 (19 worldwide citation)

Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular p ...


6
Samuel N Zellner, Mark J Enzmann, Robert T Moton Jr: Location blocking service from a wireless service provider. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, May 22, 2012: US08185130 (19 worldwide citation)

Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular p ...


7
Sanjay Macwan: Systems and methods for using voiceprints to generate passwords on mobile devices. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, July 30, 2013: US08499342 (17 worldwide citation)

Systems for verifying a user's voiceprint and generating a password for use at one or more application servers are disclosed. The systems can reside on a network or on a device. The application servers can be in communication with one or more devices or networks. Several methods for verifying the id ...


8
Jayaraman Ramachandran: Systems, methods, and computer program products for estimating crowd sizes using information collected from mobile devices in a wireless communications network. AT&T Intellectual I, Perkins IP Law, Jennifer P Medlin Esq, May 14, 2013: US08442807 (13 worldwide citation)

Systems, methods, and computer program products are for estimating crowd size at a location. An exemplary method includes determining, at a crowd size analyzer, a number of wireless service users at the location, and estimating, at the crowd size analyzer, a total number of people at the location ba ...


9
Jeffrey Aaron: Management of locations of group members via mobile communications devices. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, February 14, 2012: US08116748 (12 worldwide citation)

The location of group members having mobile communications devices such as cellular telephones, PDAs, and the like are managed by maintaining group member location awareness among the individual group members. The location of each group member is known on the basis of the determined location of the ...


10
John Ruckart: Financial transaction authentication servers, methods, and computer program products for facilitating financial transactions between buyers and sellers. AT&T Intellectual Property I, Parks IP Law, Jennifer P Medlin Esq, March 19, 2013: US08401906 (12 worldwide citation)

A financial transaction authentication server includes a wireless network interface that is configured to receive fund transfer requests from a buyer via a wireless communications terminal, a wireless terminal location module that is configured to identify the respective locations of the buyer and a ...