Patents by Inventor Edward Kelley

Edward Kelley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060258375
    Abstract: Methods, brokerage systems and program products for enabling a mobile electronic device communicate with another electronic device for accomplishing a requested task without interrupting a user of the other electronic device. A task is requested at the mobile device and a transmission signal locates other electronic devices within a receivable range of the transmission signal. A number of scenarios of various combinations of located other devices is built, whereby each scenario is capable of accomplishing the requested task. One of these scenarios is selected, information relating to the task is sent to the electronic devices within such scenario, and then the requested task is performed by such selected electronic devices. Upon completion of the task, deliverables may be transmitted from the selected electronic device to a predetermined destination. Owners of the selected electronic devices may be rewarded for usage of their devices.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tijs Wilbrink, Edward Kelley
  • Publication number: 20060237529
    Abstract: A secure card adapter provides for writing of highly secure, single transaction information on a machine-readable medium of a card structure in accordance with a format that may be downloaded from an external data source. The card structure may be, for example, an existing access authorization card or an existing credit card containing account-specific information which can be read and stored in memory of the secure card adapter. Once such account-specific information is read from an existing access authorization or credit card, secure transaction information can be written, together with the account specific information in accordance with the downloaded format information on another card structure to provide a universal access authorization and/or credit card. Thus the secure card adapter provides an enhanced degree of security through an existing or transitional communication infrastructure.
    Type: Application
    Filed: June 28, 2006
    Publication date: October 26, 2006
    Inventors: Edward Kelley, Franco Motika, Kim Ruffing
  • Publication number: 20060236236
    Abstract: A system and method for monitoring text input from a keyboard and from a pointing device, by monitoring input from a user keyboard for entry of text and cursor controls; monitoring input from a pointing device; logging keyboard entered text to a key log; and responsive to input selectively from the pointing device and keyboard selectively signaling a command action, determining text contents of the command action and logging the text contents to the key log in sequence with the keyboard entered text. A temporary storage is provided for storing copied content, and for storing pointing device input device definitions and key command definitions for each application. A log file stores a key log table for each application; and a key logger stores to the key log table entered text reconstructed with reference to the pointing device position, the copied content, the pointing device input device definitions, and the key command definitions.
    Type: Application
    Filed: April 13, 2005
    Publication date: October 19, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tijs Wilbrink, Edward Kelley, Franco Motika
  • Publication number: 20060213971
    Abstract: A secure card adapter provides for writing of highly secure, single transaction information on a machine-readable medium of a card structure in accordance with a format that may be downloaded from an external data source. The card structure may be, for example, an existing access authorization card or an existing credit card containing account-specific information which can be read and stored in memory of the secure card adapter. Once such account-specific information is read from an existing access authorization or credit card, secure transaction information can be written, together with the account specific information in accordance with the downloaded format information on another card structure to provide a universal access authorization and/or credit card. Thus the secure card adapter provides an enhanced degree of security through an existing or transitional communication infrastructure.
    Type: Application
    Filed: March 24, 2005
    Publication date: September 28, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika, Kim Ruffing
  • Publication number: 20060213972
    Abstract: A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.
    Type: Application
    Filed: March 24, 2005
    Publication date: September 28, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika
  • Publication number: 20060212519
    Abstract: A remote control instant messaging method and system for automatically activating an instant messaging session based upon remote detection of a user approaching a processor capable of executing an instant message system. The method and system also automatically deactivate the instant messaging session based upon remote detection of the user's absence from such processor and automatically re-activate the instant messaging session based upon remote detection of the user's return to the processor. A second instant messaging session can also be remotely activated on a second processor operated by another user_id by detecting the first user's approach to such second processor. The first user is automatically disengaged from this second instant messaging session when the user leaves the location of the second processor.
    Type: Application
    Filed: March 15, 2005
    Publication date: September 21, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika, Tijs Wilbrink
  • Publication number: 20060206566
    Abstract: The present invention discloses a method and apparatus for controlling the presentation of submissions within a real-time communication session by sequentially organizing and displaying messages immediately followed by their corresponding responses for allowing participants within the session to easily view, follow and participate within such session. Sequential tags are associated with each submission displayed within the session, whereby these tags are used to sequentially sort the messages along with their corresponding responses. Time stamps associated with each message and response may further be used for sequentially sorting such messages along with their corresponding responses. These sequentially sorted messages and corresponding responses are viewed in a modified display window, optionally along with the unmodified display window of the real-time communication session, on a display screen. This modified display window may be continually refreshed.
    Type: Application
    Filed: March 8, 2005
    Publication date: September 14, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Tijs Wilbrink
  • Publication number: 20060196929
    Abstract: Diverse and or multiple functions are performed in a secure manner using a secure transaction card which validates a holder of the secure transaction card in accordance with a Personal Identification Number (PIN), generates, encrypts and transmits a pair of pseudo-random number sequences through a card reader to validate the card and generates, encrypts and transmits control signals or other information corresponding to a function comprising at least one of personal identity data, passport data, equipment control signals, an entry request to a secure area, medical records or access data therefor, note pad access data and secure telephone entry data in accordance with a protocol suitable for each function. One or more such functions can thus be performed in a secure manner from a single secure transaction card and selection, if needed, can be performed by a menu included in the secure transaction card.
    Type: Application
    Filed: March 2, 2005
    Publication date: September 7, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika
  • Publication number: 20060200410
    Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.
    Type: Application
    Filed: March 2, 2005
    Publication date: September 7, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika
  • Publication number: 20060195901
    Abstract: Logic scan based design and electronic fuse (e-fuse) technology are combined to create a circuit macro function that is integrated in a non-critical area of a processor chip or related circuit to provide a new means of securing electronic systems and devices such as computers, appliances, consumer electronics, automobiles, etc. from theft or unauthorized use. Level sensitive scan design (LSSD) techniques are used in conjunction with e-fuses to inhibit or enable system components and sub-components based upon a pre-initialized configuration which must be enabled by a user via password entry.
    Type: Application
    Filed: May 3, 2006
    Publication date: August 31, 2006
    Inventors: Edward Kelley, Franco Motika, Paul Motika, Eric Motika
  • Publication number: 20060190273
    Abstract: A method for implementing transaction-based data exchange. The method includes transferring information relating to a product via a transmission means selected by an individual at a computing device requesting the information. The information includes at least one of warranty information, accounting information, pricing information, and product details. The method further includes calculating a net worth relating to the product, and updating a financial application associated with the individual with results of the calculating.
    Type: Application
    Filed: February 23, 2005
    Publication date: August 24, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tijs Wilbrink, John Bickford, Edward Kelley
  • Publication number: 20060168455
    Abstract: An enhanced security method is provided for accessing information from a second computer using a password at a first computer. According to such method, a password used for accessing information is inputted to the first computer and stored on the first computer. Thereafter, the stored password is encoded using an encoding algorithm which is system specific to the first computer, and the encoded password is then transmitted to the second computer. The encoded password is used at the second computer to grant or deny access to the requested information, without the second computer having to decode the encoded password to obtain the password stored on the first computer.
    Type: Application
    Filed: January 24, 2005
    Publication date: July 27, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika, Tijs Wilbrink
  • Publication number: 20060168548
    Abstract: A method and computer system for rapid and accurate automatic vectoring of a graphical user interface pointer to a selectable item on a display. Based upon pointer movement input from a pointing device (e.g., a mouse, touchpad or specially configured keyboard), a direction of travel vector from an initial anchor position towards a target item is determined. The location of the target item is extrapolated and the pointer is automatically moved to that target item. To ensure that the pointer moves to the intended target item, the location of the target item is extrapolated based upon the direction of travel vector and default and/or user defined parameters. Optional user defined parameters include initial pointer anchor position, vector sensitivity, automatic selection of target item, and user defined pointer limitations.
    Type: Application
    Filed: January 24, 2005
    Publication date: July 27, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika
  • Publication number: 20060157553
    Abstract: A secure credit card provides for secure transactions by users other than a holder of the secure credit card by providing storage for additional personal identification numbers (PINs) for authorized users. Transactions for authorized users may be controlled in accordance with individual user profiles stored in the secure credit card and which may be freely and flexibly established in regard to transaction amount, merchant restrictions and the like in response to recognition of a PIN corresponding to a holder of the secure credit card to whom the card is issued.
    Type: Application
    Filed: January 18, 2005
    Publication date: July 20, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika
  • Publication number: 20060058094
    Abstract: A method, a system, and a recording medium are provided herein by which a user selects a number of a plurality of events for which an outcome of each event is not known to the user. A predicted result is then automatically indicated to the user based on a probability that a predetermined outcome will occur among the user-selected number of events.
    Type: Application
    Filed: September 10, 2004
    Publication date: March 16, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Laurence Cunningham
  • Publication number: 20050283637
    Abstract: A system and method for maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
    Type: Application
    Filed: May 28, 2004
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventors: Peter Coldicott, George Galambos, Raman Harishankar, Kerrie Holley, Edward Kelley
  • Publication number: 20050283605
    Abstract: A system and method for assigning security levels to a shared component is presented. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
    Type: Application
    Filed: June 17, 2004
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventors: Peter Coldicott, George Galambos, Raman Harishankar, Kerrie Holley, Edward Kelley
  • Publication number: 20050183022
    Abstract: A system, method and program product for making a presentation of screens to one or more invitees. A preliminary sequence of screens is defined to a computer. Before presenting one of the screens in the sequence to the one or more invitees, the computer presents to a presenter the one screen. Subsequently, the presenter decides whether to present the one screen to the one or more invitees and conveys the decision about the one screen to the computer. If the presenter decides to present the one screen to the one or more invitees, then the computer sends the one screen to a display device for each of the one or more invitees. If the presenter decides not to present the one screen to the one or more invitees, then the computer does not send the one screen to the display devices for the one or more invitees whereby the one or more invitees will not see the one screen.
    Type: Application
    Filed: February 12, 2004
    Publication date: August 18, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Kelley, Franco Motika, Tijs Wilbrink
  • Publication number: 20050154673
    Abstract: A method for monitoring payments, payment authorizations, and payable events in an inventor recognition program for a company. The present invention comprises an Award Reminder Program (ARP), an Award Status Program (ASP), and an Award Monitoring Program (AMP). The ARP monitors the award tracking database associated with the present invention and sends the inventor's manager an email requesting authorization of payment when required. If the manager does not authorize payment, the ARP sends the manager a reminder email. If the manager still does not authorize payment, the ARP proceeds up the company's organizational chart until payment is authorized. The ASP monitors the award tracking database and updates the status of each docket in the award tracking database. The AMP allows a user to view the award tracking database, print a payment report, print a payable events report, or send a reminder email to the inventor's manager.
    Type: Application
    Filed: January 13, 2004
    Publication date: July 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Craig Fellenstein, Edward Kelley
  • Publication number: 20050135621
    Abstract: The Nth state of an n-stage linear feedback shift register (LFSR) used to generate pseudo random binary sequences or patterns, and which may be configured as a multiple input signature register (MISR) or single input signature register (SISR) to compress data and generate signatures, is determined by building a look-up table of n-bit states for latch positions of the linear feedback shift register; obtaining the modulo remainder of the Nth state; and generating the Nth state directly from the modulo remainder and n-bit states.
    Type: Application
    Filed: December 17, 2003
    Publication date: June 23, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd Burdine, Edward Kelley, Franco Motika