Thinking by Doing

By

Patent Portfolio

The following list features 3 patents as lead inventor and 3 as co-inventor. Additionally, as a Bell Labs Distinguished Technologist (DMTS) I have been engaged as a consultant for 20+ other filings. This specific set was an outcome of my research on human factors engineering (HFE) and user experience research (UXR) identifying emerging needs such as:

  • improved security for online and onsite payments with credit cards and digital wallets
  • enabling users to easily protect personal data over spanning social networks at all times
  • intelligent ad-hoc streaming media systems prioritizing the user experience at scale
  • equipping all emergency responders to assess situations, ensure public safety and cross-departmental coordination

Patent work has provided formal intellectual property protection for the companies’ products, as well as licensing deals with other global technology players and clients. Beyond patents, a large percentage of the work over the years entails trade secrets that remain confidential at the companies’ own discretion.


METHOD AND APPARATUS FOR SECURE PAYMENT USING A NETWORK CONNECTABLE DEVICE

US 20120290468A1 | Issued Nov 15, 2012

An apparatus and method for completing a payment transaction using a network-connectable device is disclosed. When a payer initiates a payment transaction to a vendor using the network connectable device, a unique identifier and current geolocation of the network-connectable device are sent to a payment server together with a server payment transaction message containing information about the payment transaction.

The payment server compares the geolocation with the vendor location and one or more predetermined locations associated with the payer, for example, a home or workplace. Upon a successful comparison, the payment retrieves a third party payment record from a mapping database and uses it to complete the payment transaction with a third party payment processing system.


METHOD OR APPARATUS TO ENHANCE SECURITY AND/OR SURVEILLANCE INFORMATION IN A COMMUNICATIONS NETWORK

US 20120183230 | Issued Jul 19, 2012

Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel are equipped with hand-held devices capable of recording video, photos, audio, and text.

This data is geo-tagged and time-stamped by the application and uploaded to the telecommunications network and stored in the network. As such, the geo-tagged, time-stamped information is immediately available to other investigators who are in the same geographic vicinity through access controls administered by a secure social network.


MULTICASTING PERSONALIZED HIGH DEFINITION VIDEO CONTENT TO CONSUMER STORAGE

US 20110112909 | Issued May 12, 2011

KR 101353103KR | JP 5525619

Example embodiments provide methods of delivering content from a content provider to a plurality of users connected to a network. In one embodiment, an indication of available content items is received at a content management server from a content provider.

An indication of the available content items is provided from the content management server to the plurality of users. The content items include at least one of programming content items and advertisement content items. A content item is selected from among the available content items for delivery. A group of users from among the plurality of users is determined to receive the selected content item. The selected content item is caused to be transmitted to the group of users via multicast streams.


CROSS-DOMAIN PRIVACY MANAGEMENT SERVICE FOR SOCIAL NETWORKING SITES

US 20120210244A1 | Issued Feb 10, 2011

A cross-domain privacy management service for social networking sites is implemented in a communication system including a user platform operably connected to an application platform. The application platform accesses one or more social networking sites on behalf of a user to obtain indicia of privacy settings of the user and displays the privacy settings via a graphical user interface accessible to the user independent of the social networking sites. The user may interact with graphical icons via the graphical user interface to change privacy settings of one or more impacted sites, and the user changes are communicated to the social networking sites via the application platform on behalf of the user.

    Leave a comment