Patents by Inventor Timothy Kindberg
Timothy Kindberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9208242Abstract: A user acquires a data item 36 in a mobile device 2, the data item representing, for example, the right to a digital asset. A web page 34 including bar code symbol 40 is displayed on the display 26 of a further device such as a PC 14. The bar code symbol codes a location of a resource. The mobile device 2 reads the bar code symbol 40 and sends data from the data item to the resource at the location coded by the bar code symbol. The further device 14 subsequently carries out an action using the data-item data received at the resource, or associated data; for example, the further device uses the data to fetch a related digital asset. In one embodiment the location coded by the bar code symbol is that of a database record uniquely associated with the symbol. In another embodiment, the location coded by the bar code symbol is the address on a local network of the further device 14.Type: GrantFiled: January 31, 2008Date of Patent: December 8, 2015Assignee: QUALCOMM IncorporatedInventor: Timothy Kindberg
-
Patent number: 8204936Abstract: A computer voting system arranged to receive votes from one or more mobile communications devices through a wireless personal area network in order to select content stored on the system, each mobile device comprising a mobile device name that can be edited by a user to include a user-entered vote, the system comprising: inputs arranged to receive one or more mobile device names; a processor arranged to analyse the or each device name to determine the presence of user-entered votes; storage apparatus arranged to store content; and an output arrangement arranged to output content; wherein the processor is further arranged to determine the content to be output by the output arrangement based on the or each user-entered vote.Type: GrantFiled: April 11, 2009Date of Patent: June 19, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Timothy Kindberg, Kenton O'Hara
-
Patent number: 8170784Abstract: A method and apparatus is provided for moving content to a mobile device (2). A data item (34) of a predetermined type is received at a first device (14), the data item (34) including a content URI for fetching content associated with the data item. Upon detecting that the data item (34) is of the predetermined type, the first device (14) generates a symbol (40) representing at least: a local address of a content-retrieval device (14) on a local wireless network, and an explicit or implicit identifier of the content associated with the data item. The symbol (40) is then read using the mobile device (2). The mobile device (2) decodes the symbol and transmits a request, containing the content identifier, to the content-retrieval device (14). On receiving the request, the content-retrieval device (14) uses—the content identifier in the request to obtain that content, and replies to the request with the obtained content.Type: GrantFiled: January 31, 2008Date of Patent: May 1, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventor: Timothy Kindberg
-
Publication number: 20100278445Abstract: A method for generating data using a data-encoding symbol comprising capturing an image of the data-encoding symbol using an imaging module of a device and generating symbol data therefrom representing the image, using the symbol data to generate a measure for at least one property of the symbol, and generating experience data in the device for determining parameters associated with the capture of the image, and a device suitable for implementing the method.Type: ApplicationFiled: April 30, 2009Publication date: November 4, 2010Inventor: Timothy Kindberg
-
Publication number: 20100107092Abstract: A user acquires a data item 36 in a mobile device 2, the data item representing, for example, the right to a digital asset. A web page 34 including bar code symbol 40 is displayed on the display 26 of a further device such as a PC 14. The bar code symbol codes a location of a resource. The mobile device 2 reads the bar code symbol 40 and sends data from the data item to the resource at the location coded by the bar code symbol. The further device 14 subsequently carries out an action using the data-item data received at the resource, or associated data; for example, the further device uses the data to fetch a related digital asset. In one embodiment the location coded by the bar code symbol is that of a database record uniquely associated with the symbol. In another embodiment, the location coded by the bar code symbol is the address on a local network of the further device 14.Type: ApplicationFiled: January 31, 2008Publication date: April 29, 2010Inventor: Timothy Kindberg
-
Publication number: 20100106408Abstract: A method and apparatus is provided for moving content to a mobile device (2). A data item (34) of a predetermined type is received at a first device (14), the data item (34) including a content URI for fetching content associated with the data item. Upon detecting that the data item (34) is of the predetermined type, the first device (14) generates a symbol (40) representing at least: a local address of a content-retrieval device (14) on a local wireless network, and an explicit or implicit identifier of the content associated with the data item. The symbol (40) is then read using the mobile device (2). The mobile device (2) decodes the symbol and transmits a request, containing the content identifier, to the content-retrieval device (14). On receiving the request, the content-retrieval device (14) uses—the content identifier in the request to obtain that content, and replies to the request with the obtained content.Type: ApplicationFiled: January 31, 2008Publication date: April 29, 2010Inventor: Timothy Kindberg
-
Publication number: 20090259719Abstract: A computer voting system arranged to receive votes from one or more mobile communications devices through a wireless personal area network in order to select content stored on the system, each mobile device comprising a mobile device name that can be edited by a user to include a user-entered vote, the system comprising: inputs arranged to receive one or more mobile device names; a processor arranged to analyse the or each device name to determine the presence of user-entered votes; storage apparatus arranged to store content; and an output arrangement arranged to output content; wherein the processor is further arranged to determine the content to be output by the output arrangement based on the or each user-entered vote.Type: ApplicationFiled: April 11, 2009Publication date: October 15, 2009Inventors: Timothy Kindberg, Kenton O'Hara
-
Publication number: 20090251277Abstract: A content selection system for selecting content for delivery to a group of users in a space is provided. The system comprises inputs arranged to receive a plurality of identifier tags, each identifier tag being arranged to uniquely identify a user, data storage apparatus arranged to store content for selection, a processor arranged to select content and outputs arranged to output the selected content to a content output device. The processor is arranged to check each identifier tag received by the input means against a plurality of stored content profiles, each content profile comprising a user's identifier tag and data relating to the user's content preferences. The processor is also arranged to select content from the data storage apparatus based on content preference data from stored content profiles that have an identifier tag that matches one of the received plurality of identifier tags.Type: ApplicationFiled: April 2, 2009Publication date: October 8, 2009Inventors: Kenton O'Hara, Timothy Kindberg
-
Publication number: 20070007336Abstract: A method and service system are provided for enabling a user to access a resource associated with an intended usage zone of an artefact by reading an access code from a tag physically associated with the artefact. Prior to physical commitment of the artefact to the usage zone or its proxy, the tag access code is un-associated with the usage zone or resource in a user-accessible service system. Once the artefact has been physically committed to the usage zone or its proxy, the tag access code and a usage zone identifier are captured. The captured data is then used to establish an association in the user-accessible service system enabling the access code to be mapped to the resource or an identifier of the resource.Type: ApplicationFiled: July 7, 2006Publication date: January 11, 2007Inventor: Timothy Kindberg
-
Publication number: 20060209843Abstract: In a first aspect, the present invention provides a protocol for communications across a securable communication channel between a first device and a second device. The protocol includes the transmission of a plurality of uniquely identifiable messages which each include security-related data, from the first device to the second device. The protocol includes determining whether a subset of messages that are received by the second device comply with at least one predetermined message criterion and are identifiable as having been sent from the first device. In the event that said subset of messages are determined to comply with the predetermined verification criterion (or criteria) and are identifiable as having been sent from the first device, the security-related data is determined to have been successfully communicated to the second device.Type: ApplicationFiled: February 25, 2005Publication date: September 21, 2006Inventors: Kan Zhang, Timothy Kindberg, Jean Tourrilhes, Seunghyun Im
-
Publication number: 20060031675Abstract: In a first aspect the present invention provides a method for verifying that a secure association has been formed between a first device and a second device. The method includes, enabling a user of the first device to select a verification indicator, and encrypting the verification indicator using an encryption key of the first device to form cipher text. The cipher text is then communication to the second device using a multi-part communication protocol, and decrypted using an encryption key of the second device to obtain a received verification indicator. The method includes verifying the association is secure if the received verification indicator is the same as the selected verification indicator.Type: ApplicationFiled: August 3, 2004Publication date: February 9, 2006Inventors: Kan Zhang, Timothy Kindberg, Seunghyun Im
-
Publication number: 20060020797Abstract: There is disclosed a method for verifying that a secure association has been formed between a first device and a second device by comparing a secret key of the first device to a secret key of the second device. The method includes transforming the secret key of the first device and the second device using a predetermined transformation. A user verifiable comparison of the transformed secret key of the first and second devices is performed and if the transformed secret keys of the first and second devices match the association is verified as being secure. The method can include representing the transformed secret keys of the first device and the second device in a user perceptible manner.Type: ApplicationFiled: July 8, 2004Publication date: January 26, 2006Inventors: Kan Zhang, Timothy Kindberg, Seunghyun Im
-
Publication number: 20050246337Abstract: The method discloses: scanning an original copy of a handwritten identifier; comparing the identifier to a set of prerecorded identifiers; adding the identifier to the set of prerecorded identifiers, if the identifier shares less than a predetermined similarity with any identifier within the set of prerecorded identifiers; linking the identifier to a set of information; scanning the original copy a second time; matching the second scan of the original copy with the first scan of the original copy; and retrieving the set of information in response to the matching. The system discloses: a computer system; a handwritten identifier; an imaging device for scanning an original copy of a handwritten identifier; an image processing and matching module for comparing the identifier to a set of prerecorded identifiers; a linking module for linking the identifier to a set of information.Type: ApplicationFiled: April 29, 2004Publication date: November 3, 2005Inventors: George Forman, Timothy Kindberg
-
Publication number: 20050080818Abstract: Technologies are disclosed for creating non-digital active images by associating specified regions, of a base image including non-digital content fixed in a tangible medium, with arbitrary digital content that can be electronically outputted upon later selection of any of the specified regions. Technologies are also disclosed for creating similar content-associated regions of a digital image, and for using the resulting digital active image, in a collaborative environment.Type: ApplicationFiled: October 10, 2003Publication date: April 14, 2005Inventors: Timothy Kindberg, Rakhl Rajani, Mirjana Spasojevic, Ella Tallyn
-
Publication number: 20050081135Abstract: An exemplary method for conveying access to digital content using a physical token comprises receiving a first identifier, receiving a second identifier, determining whether any of the first and second identifiers is associated with digital content, associating the digital content associated with one of the first and second identifiers with another of the first and second identifiers, and enabling a conveyance of the another of the first and second identifiers as a physical token.Type: ApplicationFiled: October 10, 2003Publication date: April 14, 2005Inventors: Timothy Kindberg, Rakhl Rajani, Mirjana Spasojevic
-
Publication number: 20030061515Abstract: A mechanism for providing a user with selective access to resources on an intranet. In a communications network accessible using HTTP, a reverse proxy server is coupled to an intranet and also coupled to a browser enabled client. Requests for access to resources inside the intranet are made through the reverse proxy server. Access to the requested resource is provided to the client by means of a capability-enabled uniform resource locator (URI) having a character string that is produce by encoding an identification number and a random number. The character string, identification number and random number are associated with a database record accessed by the reverse proxy server to determine whether access is to be provided to the client, and what conditions to apply to the access when the capability-enabled URI is invoked. Multiple resources may be grouped together in a secure container to which access is provided.Type: ApplicationFiled: September 27, 2001Publication date: March 27, 2003Inventors: Timothy Kindberg, Benjamin Atkin