Patents by Inventor Kimberly Ann Wood
Kimberly Ann Wood has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10380816Abstract: A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region that is at least partly defined by an access control device. The method acquires, using at least one visual sensor, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. The method further identifies a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior indicating that the first person is in the process of manually operating the access control device, and that the security level of the first person satisfies a predetermined threshold security level associated with the access control device, the method permits the first person to physically access the secure region.Type: GrantFiled: July 23, 2018Date of Patent: August 13, 2019Assignee: Toshiba Global Commerce Solutions Holdings CorporationInventors: John David Landers, Jr., Dean Frederick Herring, Paul Morton Wilson, David John Steiner, Kimberly Ann Wood
-
Publication number: 20180350174Abstract: A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region that is at least partly defined by an access control device. The method acquires, using at least one visual sensor, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. The method further identifies a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior indicating that the first person is in the process of manually operating the access control device, and that the security level of the first person satisfies a predetermined threshold security level associated with the access control device, the method permits the first person to physically access the secure region.Type: ApplicationFiled: July 23, 2018Publication date: December 6, 2018Inventors: John David LANDERS, JR., Dean Frederick HERRING, Paul Morton WILSON, David John STEINER, Kimberly Ann WOOD
-
Publication number: 20180211460Abstract: A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.Type: ApplicationFiled: January 25, 2017Publication date: July 26, 2018Inventors: John David LANDERS, Jr., Dean Frederick HERRING, Paul Morton WILSON, David John STEINER, Kimberly Ann WOOD
-
Patent number: 10032326Abstract: A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.Type: GrantFiled: January 25, 2017Date of Patent: July 24, 2018Assignee: Toshiba Global Commerce Solutions Holdings CorporationInventors: John David Landers, Jr., Dean Frederick Herring, Paul Morton Wilson, David John Steiner, Kimberly Ann Wood
-
Patent number: 8725458Abstract: A method, a data processing system, and a computer program product identify blockages in a heat sink of a data processing system. An electromagnetic emitter and an electromagnetic detector are positioned on opposite sides of the heat sink. An intensity of a stream of electromagnetic radiation directed from the electromagnetic emitter is measured by the electromagnetic detector. Based on the measured intensity of the stream of electromagnetic radiation as measured by the electromagnetic detector, a blockage level of the heat sink is determined. If the blockage level of the heat sink exceeds a blockage threshold, an alert is generated.Type: GrantFiled: December 30, 2008Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: John David Landers, Jr., David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Patent number: 7840846Abstract: A computer implemented method and computer program product for detecting and communicating boot failures in a client device. A Dynamic Host Control Protocol server is configured to monitor Dynamic Host Control Protocol communications from one or more client devices, wherein the client devices are configured to boot from local media. A boot request is received from a client device in response to a failure of the client device to boot from the local media. Responsive to receiving the boot request, a determination is made that a boot failure has occurred on the client device.Type: GrantFiled: October 30, 2006Date of Patent: November 23, 2010Assignee: International Business Machines CorporationInventors: John David Landers, Jr., David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Patent number: 7828211Abstract: Systems and methods are disclosed for tracking items in a shopping cart using radio frequency identification. In one embodiment, a first set of items is positioned in a first item zone alongside an aisle. An electronic tag reader is capable of remotely reading identification tags on the items into an electronic record of shopping cart contents when the identification tags are within a readable range from the electronic tag reader. An energy field generator such as an electromagnetic field generator generates a first electromagnetic field extending from a location within the readable range of at least some of the items in the first item zone to a location outside the readable range of any of the items in the first item zone.Type: GrantFiled: November 30, 2007Date of Patent: November 9, 2010Assignee: International Business Machines CorporationInventors: John David Landers, Jr., David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Publication number: 20100169046Abstract: A method, a data processing system, and a computer program product identify blockages in a heat sink of a data processing system. An electromagnetic emitter and an electromagnetic detector are positioned on opposite sides of the heat sink. An intensity of a stream of electromagnetic radiation directed from the electromagnetic emitter is measured by the electromagnetic detector. Based on the measured intensity of the stream of electromagnetic radiation as measured by the electromagnetic detector, a blockage level of the heat sink is determined. If the blockage level of the heat sink exceeds a blockage threshold, an alert is generated.Type: ApplicationFiled: December 30, 2008Publication date: July 1, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John David Landers, JR., David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Publication number: 20090140046Abstract: Systems and methods are disclosed for tracking items in a shopping cart using radio frequency identification. In one embodiment, a first set of items is positioned in a first item zone alongside an aisle. An electronic tag reader is capable of remotely reading identification tags on the items into an electronic record of shopping cart contents when the identification tags are within a readable range from the electronic tag reader. An energy field generator such as an electromagnetic field generator generates a first electromagnetic field extending from a location within the readable range of at least some of the items in the first item zone to a location outside the readable range of any of the items in the first item zone.Type: ApplicationFiled: November 30, 2007Publication date: June 4, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John David Landers, Jr., David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Publication number: 20080162952Abstract: A computer implemented method for managing power usage in a data processing system. Power usage by a set of input/output devices attached to the data processing system is monitored. If it is determined that the power usage requires a change in power consumption by a processing unit, the clock speed of the processing unit is changed to change the power consumption by the processing unit.Type: ApplicationFiled: January 3, 2007Publication date: July 3, 2008Inventors: John David Landers, David John Steiner, Paul Morton Wilson, Kimberly Ann Wood
-
Publication number: 20080155332Abstract: A computer implemented method and computer program product for detecting and communicating boot failures in a client device. A Dynamic Host Control Protocol server is configured to monitor Dynamic Host Control Protocol communications from one or more client devices, wherein the client devices are configured to boot from local media. A boot request is received from a client device in response to a failure of the client device to boot from the local media. Responsive to receiving the boot request, a determination is made that a boot failure has occurred on the client device.Type: ApplicationFiled: October 30, 2006Publication date: June 26, 2008Inventors: John David Landers, David John Steiner, Paul Morton Wilson, Kimberly Ann Wood