“Bell Laboratories (also known as Bell Labs and formerly known as AT&T Bell Laboratories and Bell Telephone Laboratories) is the research and development subsidiary of Alcatel-Lucent. The historic laboratory originated in the late 19th century as the Volta Laboratory and Bureau created by Alexander Graham Bell […] Researchers working at Bell Labs are credited with the development of radio astronomy, the transistor, the laser, the charge-coupled device (CCD), information theory, the UNIX operating system, the C programming language, S programming language and the C++ programming language. Eight Nobel Prizes have been awarded for work completed at Bell Laboratories.” – Wikipedia.
“More than 32,000 active patents, more than 3,000 obtained in 2013, 14,900 pending applications […] recognized by Thomson Reuters as a Top 100 Global Innovator.”– Alcatel-Lucent.
I recently received a letter from Craig A. Thompson, Senior Vice President with Alcatel-Lucent’s Intellectual Property Group letting me know about my third patent, which called for a celebration. See below “Method and Apparatus To Enhance Security…” as well as the other inventions that I am involved in.
I would just like to share that I am very proud to team up with some of the best professionals in the high tech industry and, moreover, to get to work in an environment that inspires innovation.
As I am writing this, I cannot help thinking that I am fortunate enough to benefit from a culture where we are:
- embracing diverse workstyles to get the job done
- promoting independent thinking while fostering teamwork
- crediting everyone’s efforts and celebrating individual and collective achievements.
My experience is that this also leads to plenty of opportunities to discover, explore and create new things, most of which happen to be about solving and improving everyday things, the kind of stuff that is not necessarily subject to formal patents ; )
Method and Apparatus To Enhance Security And/Or Surveillance Information in A Communications Network. “Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel are equipped with hand-held devices capable of recording video, photos, audio, and text. This data is geo-tagged and time-stamped by the application and uploaded to the telecommunications network and stored in the network. As such, the geo-tagged, time-stamped information is immediately available to other investigators who are in the same geographic vicinity through access controls administered by a secure social network. The information may also be accessible from remote locations via the internet. All wireless and Internet communications may be protected using end-to-end secure transport layer communications protocols.” – United States US8775816.
Multicasting High-Definition Video Content To Consumer Storage. “Example embodiments provide methods of delivering content from a content provider to a plurality of users connected to a network. In one embodiment, an indication of available content items is received at a content management server from a content provider. An indication of the available content items is provided from the content management server to the plurality of users. The content items include at least one of programming content items and advertisement content items. A content item is selected from among the available content items for delivery. A group of users from among the plurality of users is determined to receive the selected content item. The selected content item is caused to be transmitted to the group of users via multicast streams.” – Japan JP5525619 and Korea KR101353103.
A Method And Apparatus For Secure Payment Using A Network Connectable Device. “An apparatus and method for completing a payment transaction using a network-connectable device is disclosed. When a payer initiates a payment transaction to a vendor using the network connectable device, a unique identifier and current geolocation of the network-connectable device are sent to a payment server together with a server payment transaction message containing information about the payment transaction. The payment server compares the geolocation with the vendor location and one or more predetermined locations associated with the payer, for example, a home or workplace. Upon a successful comparison, the payment retrieves a third party payment record from a mapping database and uses it to complete the payment transaction with a third party payment processing system.”
Cross-Domain Privacy Management Service For Social Networking Sites. “A cross-domain privacy management service for social networking sites is implemented in a communication system including a user platform operably connected to an application platform. The application platform accesses one or more social networking sites on behalf of a user to obtain indicia of privacy settings of the user and displays the privacy settings via a graphical user interface accessible to the user independent of the social networking sites. The user may interact with graphical icons via the graphical user interface to change privacy settings of one or more impacted sites, and the user changes are communicated to the social networking sites via the application platform on behalf of the user.”