Patents by Inventor Flemming Boegelund
Flemming Boegelund has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130254863Abstract: A method and system for authenticating access of secure information by a user device. An authentication request for accessing the secure information is received, the authentication request including a user identifier of a user at the user device. A position of a secret quadrilateral within a first pattern of colored quadrilaterals is determined and is identifiable by the user identifier; the secret quadrilateral includes an authenticating color. The first pattern of colored quadrilaterals including the secret quadrilateral is generated. A second pattern including colored nodes that include the authenticating color at positions within a transparent authenticating card assigned to the user. The first pattern and the second pattern are sent to the user. Location information from the user device is received. It is determined that the subset of nodes that include the authenticating color, which allows access to the secure information by the user device.Type: ApplicationFiled: May 23, 2013Publication date: September 26, 2013Applicant: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Patent number: 8381089Abstract: A method, medium and implementing processing system are provided for book marking a combination of frame URLs within a frameset and allowing the sharing on multiple PCs the saved form data that may have been filled in. The system uses an image as a hotspot, containing a complex target destination in the form of an XML structure with multiple URLs for multiple frames as well as captured form data. This system combines file types such as XML and JPG, e.g. as in sample file name ‘MyCapturedFramesAndFormData.XML.JPG’ or ‘MyCapturedFramesAndFormData.XML.GIF’. This combination provides a surprising effect compared to the prior systems, namely, launching the image in an enhanced web browser or in a web browser containing a new plug-in, displays the frame just as it was when saved, including frame set and data input to displayed forms.Type: GrantFiled: October 26, 2007Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Flemming Boegelund, Steven Earl Hicks
-
Patent number: 8355993Abstract: A method and system for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device.Type: GrantFiled: April 24, 2012Date of Patent: January 15, 2013Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Publication number: 20120284669Abstract: A method and system for displaying slides associated with display categories. Display categories are simultaneously displayed, each display category including display sets, each display set including a set of slides. A first row of buttons is displayed for a selected display category. Each button in the first row of buttons corresponds to a different display set in the selected display category such that each display set is represented by a different button in the first row of buttons. A second row of buttons is displayed simultaneous with the displayed first row of buttons. Each button in the second row of buttons corresponds to a different slide in the display set selected via selection of the first button in the first row of buttons. The slide corresponding to the selected second button is displayed simultaneous with the displayed first row of buttons and the displayed second row of buttons.Type: ApplicationFiled: June 14, 2012Publication date: November 8, 2012Applicant: International Business Machines CorporationInventors: Carl O. Bennett, JR., Flemming Boegelund, Bruce D. Chatman, Steven Earl Hicks
-
Publication number: 20120254990Abstract: A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.Type: ApplicationFiled: June 12, 2012Publication date: October 4, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigère, Sebastian Thomschke
-
Patent number: 8260718Abstract: A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.Type: GrantFiled: December 10, 2008Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Patent number: 8260717Abstract: A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device.Type: GrantFiled: December 10, 2008Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Publication number: 20120210411Abstract: A process for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device.Type: ApplicationFiled: April 24, 2012Publication date: August 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigére, Sebastian Thomschke
-
Publication number: 20120204230Abstract: A method and System for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device.Type: ApplicationFiled: April 24, 2012Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigère, Sebastian Thomschke
-
Publication number: 20120204229Abstract: A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask.Type: ApplicationFiled: April 20, 2012Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Bauchot, Flemming Boegelund, Steven Earl Hicks, Gerard Marmigere
-
Patent number: 8234574Abstract: A method and system enabling a user to navigate through a repository of graphical displays and maintain knowledge of the location of any display in the repository. The navigation enables a user to create a slide presentation by searching, selecting, downloading and compiling slides from a central slide repository. Graphical displays are arranged in a repository in a grid-like configuration such that a list of groups displayed in one direction and the specific displays within that group are listed in another (e.g., perpendicular) direction. These groups of slides are arranged in a set of directories and sub-directories that are linked to each directory. A hierarchy of the display repository displays the particular directory and sub-directory path taken by a user to retrieve any particular graphical display. A user may navigate through the display repository and select displays and determine their location in the display repository.Type: GrantFiled: January 31, 2002Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Carl O. Bennett, Jr., Flemming Boegelund, Bruce D. Chatman, Steven Earl Hicks
-
Patent number: 8201227Abstract: A system and associated method for authenticating an end user. The method comprises generating a first mask in response to an authentication request from an end user, the first mask comprising a set of root nodes, a set of server nodes, and a set of client nodes each being unique to the end user. Next, determining the authenticity of the end user based on comparing data received from the end user with nodes contained in the first mask. The data comprising a set of nodes selected by the end user and the end user having selected the data in response to the first mask.Type: GrantFiled: May 28, 2008Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Steven Earl Hicks, Gerard Marmigere
-
Publication number: 20120141031Abstract: A method for analyzing a character string, the method including: analyzing a character string to determine one of more characters of the character string; determining from a dictionary source, an alternative character string to the analyzed character string; comparing the analyzed character string with the alternative character string to determine a weighting factor for each of the characters of the analyzed character string relative to the positional arrangement of the characters in the alternative character string; and for each determined weighting factor, generating for each of the characters in the analyzed character string a corresponding character of a particular size as determined by the weighting factor.Type: ApplicationFiled: September 27, 2011Publication date: June 7, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Flemming Boegelund
-
Patent number: 8019858Abstract: A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length.Type: GrantFiled: September 22, 2008Date of Patent: September 13, 2011Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Robert George Farrell, Gerard Marmigere
-
Patent number: 7975214Abstract: A method, medium and implementing processing system are provided for book marking a combination of frame URLs within a frameset and allowing the sharing on multiple PCs the saved form data that may have been filled in. The system uses an image as a hotspot, containing a complex target destination in the form of an XML structure with multiple URLs for multiple frames as well as captured form data. This system combines file types such as XML and JPG, e.g. as in sample file name ‘MyCapturedFramesAndFormData.XML.JPG’ or ‘MyCapturedFramesAndFormData.XML.GIF’. This combination provides a surprising effect compared to the prior systems, namely, launching the image in an enhanced web browser or in a web browser containing a new plug-in displays the frame just as it was when saved.Type: GrantFiled: October 26, 2007Date of Patent: July 5, 2011Assignee: International Business Machines CorporationInventors: Flemming Boegelund, Steven Earl Hicks
-
Publication number: 20100205547Abstract: A pop reader of a browser searches HTML code for a webpage with a plurality of links for a first link specified with a first target file name comprising a pop type element. The pop reader, responsive to detecting the first link specified with the first target file name comprising the pop type element, inserts a first command into the HTML code to disable the first link and set an event to pop up a first menu layer of a plurality of layers of a cascading menu and inserts a second command to specify the content of the first menu layer from a file accessed for the first target file name. The browser, responsive to detecting the event, displays the first menu layer with the specified content by the second command within the interface displaying the webpage.Type: ApplicationFiled: February 6, 2009Publication date: August 12, 2010Inventors: FLEMMING BOEGELUND, STEVEN E. HICKS, ANDERS WESTBERG
-
Publication number: 20100138657Abstract: A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device.Type: ApplicationFiled: December 10, 2008Publication date: June 3, 2010Applicant: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Publication number: 20100138912Abstract: A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.Type: ApplicationFiled: December 10, 2008Publication date: June 3, 2010Applicant: International Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke
-
Publication number: 20100070622Abstract: A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length.Type: ApplicationFiled: September 22, 2008Publication date: March 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederic Bauchot, Flemming Boegelund, Robert George Farrell, Gerard Marmigere
-
Patent number: 7659869Abstract: A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a login node matrix comprising a first set of transparent and opaque nodes in addition to at least one login offset. Next the method determines an authenticity status of the end user by comparing data received from the end user with said first set of transparent nodes. The data received being sent in response to sending the login field to the end user. The end user generated the data by overlaying a transparent credit card on top of the login field and aligning the login offset with a card offset and then selecting at least one node which is not opaque. Finally, the method sends the determined authenticity status to the end user via an output device.Type: GrantFiled: December 8, 2008Date of Patent: February 9, 2010Assignee: Inernational Business Machines CorporationInventors: Frederic Bauchot, Flemming Boegelund, Gerard Marmigere, Sebastian Thomschke