Patents by Inventor Maria Azua Himmel

Maria Azua Himmel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6805284
    Abstract: A system and method for using write-and-destroy transaction cards which cannot be reprogrammed. The write-and-destroy transaction cards are programmed (i.e., written to) at bit increments representing, in total, the stated value of the card. The stated value may be represented in one or a plurality of denominations and currencies. In use, the remaining value of a card can be ascertained at a merchant location by reading those bits which have not been erased. The remaining value can additionally be confirmed by contacting the issuing financial institution using a unique serial number which may be encoded onto each transaction card. Upon confirmation that the card has sufficient value to conduct the desired transaction, the card is decremented by erasure of the bits representing that value.
    Type: Grant
    Filed: May 10, 2002
    Date of Patent: October 19, 2004
    Assignee: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Herman Rodriquez, Newton James Smith, Jr.
  • Publication number: 20040141616
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and providing access to the resource in dependence upon the security control data and the security request data. Embodiments include encrypting the security request data; receiving a packet through a radio transceiver set to a frequency, wherein a radio frequency identification field in the packet identifies a next frequency; and setting the transceiver to receive on the next frequency. In many embodiments, a resource comprises information, and providing access to the resource includes transmitting information from the resource over a randomly selected sequence of radio frequencies.
    Type: Application
    Filed: January 17, 2003
    Publication date: July 22, 2004
    Applicant: IBM Corporation
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040123146
    Abstract: Controlling access to a resource including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method, the security control data including a security control password in a security control language; receiving a request for access to the resource; receiving security request data, the security request data including a security request password in a security request language, the security request language being a language other than the security control language; and determining access to the resource in dependence upon the security control data and the security request data. Embodiments include converting a security request password from speech to text. Embodiments include translating a security request password from the security request language to the security control language.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20040123105
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object including security control data and at least one security method, the security control data including one or more security control CPU attributes, receiving a request for access to the resource, receiving security request data including one or more security request CPU attributes, and providing access to the resource in dependence upon the security control data and the security request data.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20040123112
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and providing access to the resource in dependence upon the security control data and the security request data, where the resource comprises information, and providing access to the resource further comprises encrypting the information. Embodiments include storing in the security object a user-selected encryption scheme. Embodiments include establishing a secret key and encrypting information from a resource with secret key encryption. Establishing a secret key is accomplished out of band or with public key encryption.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Patent number: 6751306
    Abstract: A telephone user sets up a “personalized” menu identifying a set of information options from which he or she desires to select when placed on-hold in a telephone system. The user's personal preferences are then saved. When the party later makes a call to a telephone system or is called, and then is placed on-hold, the party's telephone service provider or local equipment accesses the user's personalized menu and offers the one or more information options as defined in the menu. In an illustrative embodiment, the personalized menu options are voiced over the telephone line and the user then makes selections using keypad (i.e. DTMF signaling) or voice input. A response may be interrupted to make another menu selection, or to repeat the current response. If the response being played has not completed when the other party returns, that response is suspended and may be completed when the user is placed back on hold or the call is completed.
    Type: Grant
    Filed: April 5, 2001
    Date of Patent: June 15, 2004
    Assignee: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Jr., Clifford Jay Spinac
  • Patent number: 6742052
    Abstract: A mobile or desktop computer having a system bus that is exposed externally using a wireless transceiver so that input and output devices within proximity of the computer can be configured for immediate use. The wireless system bus of the invention provides discovery and acceptance of wireless peripheral devices within the range of the wireless transmissions. Serial or parallel communication can be supported on the same or different frequency channels. Preferably, the invention utilizes a dedicated discovery frequency for detecting the presence of peripherals in the proximity. Commands and data can be exchanged between the computer and the peripheral device in a secured manner.
    Type: Grant
    Filed: August 9, 2001
    Date of Patent: May 25, 2004
    Assignee: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Jr., Clifford Jay Spinac
  • Patent number: 6735694
    Abstract: A method and system of certifying that a copy of a Web page was made at a particular time by a user of a Web client. A client piece preferably includes a one-way hashing function that, when applied to a Web page copy, generates a unique string. The string is concatenated with a URL for the Web page, a timestamp and other identifying information, to generate a signature. Using a public key cryptosystem, the signature is provided to a certification server. Upon receipt, the server first determines whether the signature represents the Web page copy. If so, a confirmation is sent to the client, and the signature is stored in a database. Preferably, the Web page copy itself is not stored in the database. Signatures from other Web page copies received during a given period (e.g., the same day) are then summed and the sum is published.
    Type: Grant
    Filed: November 21, 1997
    Date of Patent: May 11, 2004
    Assignee: International Business Machines Corporation
    Inventors: Viktors Berstis, Maria Azua Himmel
  • Patent number: 6725252
    Abstract: A method and apparatus in a distributed data processing system for processing requests for documents. A request is received from a user for a selected page at a server. The selected page is returned to the user with a unique token, wherein each user is sent a unique token. Responsive to receiving a new request for a page, a determination is made as to whether the new request includes the unique token. Responsive to receiving the new request including the unique token, a determination is made as to whether a previous request from this user is simultaneously being processed by the server. Responsive to a new request having been received for a document while another prior request is pending, the new request is processed by either rejecting the new request, or by canceling the previous request and processing the new request, or by delaying the processing of the new request until the previous request has completed.
    Type: Grant
    Filed: June 3, 1999
    Date of Patent: April 20, 2004
    Assignee: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Michael Gerard Mall, Steven Edward Rosengren
  • Publication number: 20040064724
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, including asserting security control data as security facts into a security knowledge database and asserting security rules into the security knowledge database, the security object including security control data and at least one security method, receiving a request for access to the resource, and receiving security request data. Embodiments include asserting the security request data as security facts into the security knowledge database, and determining access to the resource in dependence upon the security facts and security rules in the security knowledge database.
    Type: Application
    Filed: September 12, 2002
    Publication date: April 1, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Patent number: 6715086
    Abstract: A time-enhanced input device driver for a data processing system is capable of generating time-enhanced output in response to input signals. The input device driver receives a first input-event signal followed by a second input-event signal. In response to the second input-event signal, the input device driver generates a character code and an associated time-span code. The time-span code reflects the amount of time that separated the first input-event signal from the second. In an illustrative embodiment, the first and second input-event signals may comprise a key-down signal from a particular key on a keyboard and a key-up signal from that key respectively, in which case the generated character code would correspond to that key.
    Type: Grant
    Filed: June 30, 1999
    Date of Patent: March 30, 2004
    Assignee: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Herman Rodriguez
  • Publication number: 20040054790
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and security methods, wherein the security control data includes security object management security control data and the security methods include at least one security object management method; receiving a request for management access to the security object; receiving security object management security request data; and determining management access to the security object in dependence upon the security object management security control data and the security object management security request data.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040054931
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method, receiving a calendar security control message from a calendar application, receiving a request for access to the resource, and determining access to the resource in dependence upon the calendar security control message.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Banjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040054896
    Abstract: Controlling access to a resource including creating a security object in dependence upon user-selected security control data types, the security object implementing a security model, the security object comprising security control data, at least one security method, and a security event manager, including creating security event definitions; detecting a security event through the security event manager in dependence upon the security event definitions; altering the security model in dependence upon the security event. The security model comprises a combination of security control data, and altering the security model comprises altering the combination of security control data. The combination of security control data comprises a list of references to objects containing security control data. Creating a security object includes creating a security event manager associated by reference with the security object and creating security event definitions associated by reference with the security event manager.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20030236996
    Abstract: Temporal control of access to a resource including creating a security object in dependence upon user-selected temporal security control data types, the security object comprising temporal security control data and at least one security method; receiving a request for access to the resource; receiving temporal security request data; and determining access to the resource in dependence upon the temporal security control data and the temporal security request data. Embodiments include storing in the security object a resource identification for the resource; storing in the security object user-selected temporal security control data types; and storing in the security object temporal security control data for each user-selected temporal security control data type. Some embodiments grant access to resources if a maximum allowable number of invocations is greater than a count of invocations. Some embodiments grant access if the time when a security object is invoked is within a validity period.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20030236979
    Abstract: Controlling access to a resource for a group of users including creating a group security object in dependence upon one or more user-selected group security control data types, the group security object comprising security control data and at least one security method, the security control data comprising at least one security control user identification; receiving a request for access to the resource; receiving security request data, wherein the security request data includes at least one security request user identification; and determining access to the resource in dependence upon the security control data and the security request data.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20030237006
    Abstract: Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20030186662
    Abstract: A broadcast receiver which automatically tunes to a signal source depending on a set of rules and vehicle state conditions, such as seat occupancy, door sensors, time, day of the week, weather conditions, program content rating, vehicle location, user language preference, user identity and driver preferences. The user can configure a set of rules which causes the receiver to be automatically retuned in response to changes in conditions of the vehicle, such as favorites for the commute to work and favorites while driving with children. This eliminates the driver's distraction while operating the vehicle of searching for stations and routinely changing the station setting, thereby enhancing the usefulness, convenience, and safety of the vehicle broadcast receiver.
    Type: Application
    Filed: March 28, 2002
    Publication date: October 2, 2003
    Applicant: International Business Machines Corporation
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Patent number: 6622015
    Abstract: A method and apparatus for using electronic documents within a smart phone. A merchant, legal organization, or other entity provides an electronic document to a subscriber as proof of registration for a service or of legal entitlement. At the time of registration, the subscriber registers a phone number of a phone at which the subscriber desires to receive the issued electronic document. After the electronic document is created, the organization transmits the electronic document to the phone at the registered phone number. The receiving smart phone allows the subscriber to manage the electronic document within the smart phone.
    Type: Grant
    Filed: January 29, 1999
    Date of Patent: September 16, 2003
    Assignee: International Business Machines
    Inventors: Maria Azua Himmel, Herman Rodriguez
  • Publication number: 20030161464
    Abstract: A customized menu of information options is created according to user data about a calling party. User data may include user location data or relationship data between the calling party and a called party. The calling party selects from the customized menu to create a “personalized” menu identifying a set of information options from which he or she desires to select when placed on-hold in a telephone system. The user's personal preferences are then saved. When the party later makes a call to a telephone system and is placed on-hold, the telephone system accesses the user's personalized menu and offers the one or more information options as defined in the menu. In an illustrative embodiment, the personalized menu options are voiced over the telephone line and the calling party then makes selections using keypad (i.e. DTMF signaling) or voice input. A response may be interrupted to make another menu selection, or to repeat the current response.
    Type: Application
    Filed: December 15, 2000
    Publication date: August 28, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Herman Rodriguez, Newton James Smith, Clifford Jay Spinac, Maria Azua Himmel