Patents by Inventor Edward Kelley
Edward Kelley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060258375Abstract: Methods, brokerage systems and program products for enabling a mobile electronic device communicate with another electronic device for accomplishing a requested task without interrupting a user of the other electronic device. A task is requested at the mobile device and a transmission signal locates other electronic devices within a receivable range of the transmission signal. A number of scenarios of various combinations of located other devices is built, whereby each scenario is capable of accomplishing the requested task. One of these scenarios is selected, information relating to the task is sent to the electronic devices within such scenario, and then the requested task is performed by such selected electronic devices. Upon completion of the task, deliverables may be transmitted from the selected electronic device to a predetermined destination. Owners of the selected electronic devices may be rewarded for usage of their devices.Type: ApplicationFiled: May 12, 2005Publication date: November 16, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tijs Wilbrink, Edward Kelley
-
Publication number: 20060237529Abstract: A secure card adapter provides for writing of highly secure, single transaction information on a machine-readable medium of a card structure in accordance with a format that may be downloaded from an external data source. The card structure may be, for example, an existing access authorization card or an existing credit card containing account-specific information which can be read and stored in memory of the secure card adapter. Once such account-specific information is read from an existing access authorization or credit card, secure transaction information can be written, together with the account specific information in accordance with the downloaded format information on another card structure to provide a universal access authorization and/or credit card. Thus the secure card adapter provides an enhanced degree of security through an existing or transitional communication infrastructure.Type: ApplicationFiled: June 28, 2006Publication date: October 26, 2006Inventors: Edward Kelley, Franco Motika, Kim Ruffing
-
Publication number: 20060236236Abstract: A system and method for monitoring text input from a keyboard and from a pointing device, by monitoring input from a user keyboard for entry of text and cursor controls; monitoring input from a pointing device; logging keyboard entered text to a key log; and responsive to input selectively from the pointing device and keyboard selectively signaling a command action, determining text contents of the command action and logging the text contents to the key log in sequence with the keyboard entered text. A temporary storage is provided for storing copied content, and for storing pointing device input device definitions and key command definitions for each application. A log file stores a key log table for each application; and a key logger stores to the key log table entered text reconstructed with reference to the pointing device position, the copied content, the pointing device input device definitions, and the key command definitions.Type: ApplicationFiled: April 13, 2005Publication date: October 19, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tijs Wilbrink, Edward Kelley, Franco Motika
-
Publication number: 20060213971Abstract: A secure card adapter provides for writing of highly secure, single transaction information on a machine-readable medium of a card structure in accordance with a format that may be downloaded from an external data source. The card structure may be, for example, an existing access authorization card or an existing credit card containing account-specific information which can be read and stored in memory of the secure card adapter. Once such account-specific information is read from an existing access authorization or credit card, secure transaction information can be written, together with the account specific information in accordance with the downloaded format information on another card structure to provide a universal access authorization and/or credit card. Thus the secure card adapter provides an enhanced degree of security through an existing or transitional communication infrastructure.Type: ApplicationFiled: March 24, 2005Publication date: September 28, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika, Kim Ruffing
-
Publication number: 20060213972Abstract: A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.Type: ApplicationFiled: March 24, 2005Publication date: September 28, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika
-
Publication number: 20060212519Abstract: A remote control instant messaging method and system for automatically activating an instant messaging session based upon remote detection of a user approaching a processor capable of executing an instant message system. The method and system also automatically deactivate the instant messaging session based upon remote detection of the user's absence from such processor and automatically re-activate the instant messaging session based upon remote detection of the user's return to the processor. A second instant messaging session can also be remotely activated on a second processor operated by another user_id by detecting the first user's approach to such second processor. The first user is automatically disengaged from this second instant messaging session when the user leaves the location of the second processor.Type: ApplicationFiled: March 15, 2005Publication date: September 21, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika, Tijs Wilbrink
-
Publication number: 20060206566Abstract: The present invention discloses a method and apparatus for controlling the presentation of submissions within a real-time communication session by sequentially organizing and displaying messages immediately followed by their corresponding responses for allowing participants within the session to easily view, follow and participate within such session. Sequential tags are associated with each submission displayed within the session, whereby these tags are used to sequentially sort the messages along with their corresponding responses. Time stamps associated with each message and response may further be used for sequentially sorting such messages along with their corresponding responses. These sequentially sorted messages and corresponding responses are viewed in a modified display window, optionally along with the unmodified display window of the real-time communication session, on a display screen. This modified display window may be continually refreshed.Type: ApplicationFiled: March 8, 2005Publication date: September 14, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Tijs Wilbrink
-
Publication number: 20060196929Abstract: Diverse and or multiple functions are performed in a secure manner using a secure transaction card which validates a holder of the secure transaction card in accordance with a Personal Identification Number (PIN), generates, encrypts and transmits a pair of pseudo-random number sequences through a card reader to validate the card and generates, encrypts and transmits control signals or other information corresponding to a function comprising at least one of personal identity data, passport data, equipment control signals, an entry request to a secure area, medical records or access data therefor, note pad access data and secure telephone entry data in accordance with a protocol suitable for each function. One or more such functions can thus be performed in a secure manner from a single secure transaction card and selection, if needed, can be performed by a menu included in the secure transaction card.Type: ApplicationFiled: March 2, 2005Publication date: September 7, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika
-
Publication number: 20060200410Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.Type: ApplicationFiled: March 2, 2005Publication date: September 7, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika
-
Publication number: 20060195901Abstract: Logic scan based design and electronic fuse (e-fuse) technology are combined to create a circuit macro function that is integrated in a non-critical area of a processor chip or related circuit to provide a new means of securing electronic systems and devices such as computers, appliances, consumer electronics, automobiles, etc. from theft or unauthorized use. Level sensitive scan design (LSSD) techniques are used in conjunction with e-fuses to inhibit or enable system components and sub-components based upon a pre-initialized configuration which must be enabled by a user via password entry.Type: ApplicationFiled: May 3, 2006Publication date: August 31, 2006Inventors: Edward Kelley, Franco Motika, Paul Motika, Eric Motika
-
Publication number: 20060190273Abstract: A method for implementing transaction-based data exchange. The method includes transferring information relating to a product via a transmission means selected by an individual at a computing device requesting the information. The information includes at least one of warranty information, accounting information, pricing information, and product details. The method further includes calculating a net worth relating to the product, and updating a financial application associated with the individual with results of the calculating.Type: ApplicationFiled: February 23, 2005Publication date: August 24, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tijs Wilbrink, John Bickford, Edward Kelley
-
Publication number: 20060168455Abstract: An enhanced security method is provided for accessing information from a second computer using a password at a first computer. According to such method, a password used for accessing information is inputted to the first computer and stored on the first computer. Thereafter, the stored password is encoded using an encoding algorithm which is system specific to the first computer, and the encoded password is then transmitted to the second computer. The encoded password is used at the second computer to grant or deny access to the requested information, without the second computer having to decode the encoded password to obtain the password stored on the first computer.Type: ApplicationFiled: January 24, 2005Publication date: July 27, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika, Tijs Wilbrink
-
Publication number: 20060168548Abstract: A method and computer system for rapid and accurate automatic vectoring of a graphical user interface pointer to a selectable item on a display. Based upon pointer movement input from a pointing device (e.g., a mouse, touchpad or specially configured keyboard), a direction of travel vector from an initial anchor position towards a target item is determined. The location of the target item is extrapolated and the pointer is automatically moved to that target item. To ensure that the pointer moves to the intended target item, the location of the target item is extrapolated based upon the direction of travel vector and default and/or user defined parameters. Optional user defined parameters include initial pointer anchor position, vector sensitivity, automatic selection of target item, and user defined pointer limitations.Type: ApplicationFiled: January 24, 2005Publication date: July 27, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika
-
Publication number: 20060157553Abstract: A secure credit card provides for secure transactions by users other than a holder of the secure credit card by providing storage for additional personal identification numbers (PINs) for authorized users. Transactions for authorized users may be controlled in accordance with individual user profiles stored in the secure credit card and which may be freely and flexibly established in regard to transaction amount, merchant restrictions and the like in response to recognition of a PIN corresponding to a holder of the secure credit card to whom the card is issued.Type: ApplicationFiled: January 18, 2005Publication date: July 20, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika
-
Publication number: 20060058094Abstract: A method, a system, and a recording medium are provided herein by which a user selects a number of a plurality of events for which an outcome of each event is not known to the user. A predicted result is then automatically indicated to the user based on a probability that a predetermined outcome will occur among the user-selected number of events.Type: ApplicationFiled: September 10, 2004Publication date: March 16, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Laurence Cunningham
-
Publication number: 20050283637Abstract: A system and method for maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.Type: ApplicationFiled: May 28, 2004Publication date: December 22, 2005Applicant: International Business Machines CorporationInventors: Peter Coldicott, George Galambos, Raman Harishankar, Kerrie Holley, Edward Kelley
-
Publication number: 20050283605Abstract: A system and method for assigning security levels to a shared component is presented. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.Type: ApplicationFiled: June 17, 2004Publication date: December 22, 2005Applicant: International Business Machines CorporationInventors: Peter Coldicott, George Galambos, Raman Harishankar, Kerrie Holley, Edward Kelley
-
Publication number: 20050183022Abstract: A system, method and program product for making a presentation of screens to one or more invitees. A preliminary sequence of screens is defined to a computer. Before presenting one of the screens in the sequence to the one or more invitees, the computer presents to a presenter the one screen. Subsequently, the presenter decides whether to present the one screen to the one or more invitees and conveys the decision about the one screen to the computer. If the presenter decides to present the one screen to the one or more invitees, then the computer sends the one screen to a display device for each of the one or more invitees. If the presenter decides not to present the one screen to the one or more invitees, then the computer does not send the one screen to the display devices for the one or more invitees whereby the one or more invitees will not see the one screen.Type: ApplicationFiled: February 12, 2004Publication date: August 18, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Kelley, Franco Motika, Tijs Wilbrink
-
Publication number: 20050154673Abstract: A method for monitoring payments, payment authorizations, and payable events in an inventor recognition program for a company. The present invention comprises an Award Reminder Program (ARP), an Award Status Program (ASP), and an Award Monitoring Program (AMP). The ARP monitors the award tracking database associated with the present invention and sends the inventor's manager an email requesting authorization of payment when required. If the manager does not authorize payment, the ARP sends the manager a reminder email. If the manager still does not authorize payment, the ARP proceeds up the company's organizational chart until payment is authorized. The ASP monitors the award tracking database and updates the status of each docket in the award tracking database. The AMP allows a user to view the award tracking database, print a payment report, print a payable events report, or send a reminder email to the inventor's manager.Type: ApplicationFiled: January 13, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Craig Fellenstein, Edward Kelley
-
Publication number: 20050135621Abstract: The Nth state of an n-stage linear feedback shift register (LFSR) used to generate pseudo random binary sequences or patterns, and which may be configured as a multiple input signature register (MISR) or single input signature register (SISR) to compress data and generate signatures, is determined by building a look-up table of n-bit states for latch positions of the linear feedback shift register; obtaining the modulo remainder of the Nth state; and generating the Nth state directly from the modulo remainder and n-bit states.Type: ApplicationFiled: December 17, 2003Publication date: June 23, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Todd Burdine, Edward Kelley, Franco Motika