Patents by Inventor Darryl M. Adderly
Darryl M. Adderly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11836211Abstract: Mechanisms for generating different lines of questioning based on evaluation of a previous line of questioning are provided. A set of evidential data specifying a plurality of concept entities and input specifying a scenario to be evaluated are received. The scenario specifies a hypothetical link between at least two of the concept entities. A first set of questions corresponding to the at least two information concept entities are evaluated based on the set of evidential data. Based on results of evaluating the first set of questions, a second set of questions is automatically generated to further expand upon and investigate the results of evaluating the first set of questions. The second set of questions are processed and an indication of the scenario and a corresponding measure of support for or against the scenario being a valid scenario is output.Type: GrantFiled: November 21, 2014Date of Patent: December 5, 2023Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Patent number: 11244113Abstract: Mechanisms for evaluating an evidential statement in a corpus of evidence are provided. A first evidential statement for which corroboration is sought is received and a corpus of evidence data is processed to determine a measure of corroboration of the first evidential statement by other evidence data in the corpus of evidence data. An indication of trustworthiness of the first evidential statement is generated based on the measure of corroboration of the first evidential statement by the other evidence data in the corpus of evidence data. A representation of the indication of the trustworthiness of the first evidential statement is output in association with the first evidential statement.Type: GrantFiled: November 19, 2014Date of Patent: February 8, 2022Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Patent number: 11238351Abstract: Mechanisms for evaluating an evidential statement in a corpus of evidence are provided. An evidential statement is received for determining a level of confidence in a hypothetical ontological link of an ontology. A source of the evidential statement is identified and a grading of the source of the evidential statement is determined based on a source grading measurement value indicative of a degree of reliability and credibility of the source. An indication of trustworthiness of the evidential statement is generated based on the source grading measurement value. A representation of the indication of trustworthiness of the evidential statement is output in association with the evidential statement.Type: GrantFiled: April 26, 2019Date of Patent: February 1, 2022Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Patent number: 11204929Abstract: Mechanisms, in a Question Answering (QA) system comprising a processor and a memory, for evaluating a hypothetical link in an ontology are provided. An initial analysis of the ontology is performed to identify a set of information concept entities and links between information concept entities in the ontology. The hypothetical link between a first information concept entity and a second information concept entity in the ontology is generated based on the initial analysis of the ontology. Natural language questions corresponding to the hypothetical link are processed to generate answer results directed to a plurality of links between a plurality of information concept entities. The answer results are aggregated across the plurality of links to determine an aggregate answer result for the hypothetical link. An indication of whether or not the hypothetical link is a valid link is output based on the aggregate answer result for the hypothetical link.Type: GrantFiled: November 18, 2014Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Patent number: 11012899Abstract: A method, system and computer program product for controlling the delivery of voice communications. A profile is created for the user of a mobile device that specifies the thresholds for switching between a cellular network and a wireless network to conduct voice communications as well as stores a list of contacts and associated security levels. If the signal strength of the cellular radio signal is below a threshold, then the mobile device detects one or more wireless networks that are in the area of the user of the mobile device. The profile of the user of the mobile device is then checked to determine if the mobile device is authorized to switch to one of the detected wireless networks to deliver voice communications based on a security level associated with the party communicating with the user. In this manner, the user is able to control the delivery of voice communications.Type: GrantFiled: January 21, 2020Date of Patent: May 18, 2021Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10938976Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a user, receives a text message from a user; by use of sensor inputs of the mobile device, the mobile device stores data regarding environment of the mobile device including external audio equipment, speed of the user, and bystanders within a hearing range of the environment; various data describing a sender of the text message and the bystanders are analyzed for respective relationships with the user and with each other to determine a confidentiality group dictating whether or not the text message may be heard by the bystander; the text message may be scanned for content screening, then according to configuration of the voice delivery application, the text message is securely delivered to the user by voice.Type: GrantFiled: September 30, 2019Date of Patent: March 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10891548Abstract: In an approach to predicting user touch events, one or more computer processors receive a detected electromagnetic noise signal of an object. The one or more computer processors compare the detected electromagnetic noise signal of the object to one or more stored electromagnetic noise signals associated with one or more objects. Based, at least in part, on the comparison, the one or more computer processors determine the identity of the object. Responsive to determining the identity of the object, the one or more computer processors store metadata associated with at least one of the objects and an electromagnetic noise signal detection event. The one or more computer processors determine whether an amount of the metadata associated with the object meets a learning threshold. If the amount of metadata meets the learning threshold, the one or more computer processors predict a subsequent electromagnetic noise signal detection event associated with the object.Type: GrantFiled: October 7, 2016Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Publication number: 20200162970Abstract: A method, system and computer program product for controlling the delivery of voice communications. A profile is created for the user of a mobile device that specifies the thresholds for switching between a cellular network and a wireless network to conduct voice communications as well as stores a list of contacts and associated security levels. If the signal strength of the cellular radio signal is below a threshold, then the mobile device detects one or more wireless networks that are in the area of the user of the mobile device. The profile of the user of the mobile device is then checked to determine if the mobile device is authorized to switch to one of the detected wireless networks to deliver voice communications based on a security level associated with the party communicating with the user. In this manner, the user is able to control the delivery of voice communications.Type: ApplicationFiled: January 21, 2020Publication date: May 21, 2020Inventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10652291Abstract: Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest passcodes for a second portion of the participants associated with the list of participants that do not have the personal passcodes, and permitting, based on the personal passcodes or the guest passcodes, each of the participants to participate in the conference call.Type: GrantFiled: January 10, 2019Date of Patent: May 12, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Darryl M. Adderly, Prasad Kashyap, Brian J. Murray, Wenjian Qiao
-
Patent number: 10609203Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a user, receives a text message from a user; by use of sensor inputs of the mobile device, the mobile device stores data regarding environment of the mobile device including external audio equipment, speed of the user, and bystanders within a hearing range of the environment; various data describing a sender of the text message and the bystanders are analyzed for respective relationships with the user and with each other to determine a confidentiality group dictating whether or not the text message may be heard by the bystander; the text message may be scanned for content screening, then according to configuration of the voice delivery application, the text message is securely delivered to the user by voice.Type: GrantFiled: November 21, 2018Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10609606Abstract: A method, system and computer program product for controlling the delivery of voice communications. A profile is created for the user of a mobile device that specifies the thresholds for switching between a cellular network and a wireless network to conduct voice communications as well as stores a list of contacts and associated security levels. If the signal strength of the cellular radio signal is below a threshold, then the mobile device detects one or more wireless networks that are in the area of the user of the mobile device. The profile of the user of the mobile device is then checked to determine if the mobile device is authorized to switch to one of the detected wireless networks to deliver voice communications based on a security level associated with the party communicating with the user. In this manner, the user is able to control the delivery of voice communications.Type: GrantFiled: August 30, 2017Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10552748Abstract: In an approach to predicting user touch events, one or more computer processors receive a detected electromagnetic noise signal of an object. The one or more computer processors compare the detected electromagnetic noise signal of the object to one or more stored electromagnetic noise signals associated with one or more objects. Based, at least in part, on the comparison, the one or more computer processors determine the identity of the object. Responsive to determining the identity of the object, the one or more computer processors store metadata associated with at least one of the objects and an electromagnetic noise signal detection event. The one or more computer processors determine whether an amount of the metadata associated with the object meets a learning threshold. If the amount of metadata meets the learning threshold, the one or more computer processors predict a subsequent electromagnetic noise signal detection event associated with the object.Type: GrantFiled: April 24, 2019Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Publication number: 20200028956Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a user, receives a text message from a user; by use of sensor inputs of the mobile device, the mobile device stores data regarding environment of the mobile device including external audio equipment, speed of the user, and bystanders within a hearing range of the environment; various data describing a sender of the text message and the bystanders are analyzed for respective relationships with the user and with each other to determine a confidentiality group dictating whether or not the text message may be heard by the bystander; the text message may be scanned for content screening, then according to configuration of the voice delivery application, the text message is securely delivered to the user by voice.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
-
Patent number: 10534536Abstract: In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. The computer determines a virtual control button to display based on the detected interaction. The computer displays the determined virtual control button to the user. The computer receives an interaction with the displayed virtual control button. The computer implements an action associated with the determined virtual control button based on the received interaction.Type: GrantFiled: May 24, 2019Date of Patent: January 14, 2020Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Patent number: 10534537Abstract: In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. The computer determines a virtual control button to display based on the detected interaction. The computer displays the determined virtual control button to the user. The computer receives an interaction with the displayed virtual control button. The computer implements an action associated with the determined virtual control button based on the received interaction.Type: GrantFiled: May 24, 2019Date of Patent: January 14, 2020Assignee: International Business Machines CorporationInventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Patent number: 10459982Abstract: A system, method, computer program product and computer program for evaluating links between objects are provided. A receive ontology component receives an ontology and an identify component identifies, from the ontology, semantic feature types within the ontology that can be used to measure the links between the objects. A data receive component receives instance information and maps the instance information into an ontological form of the instance information. An analyze component analyzes the ontological form to generate an ontological mapping of the instance information. A match component analyzes the mapping to identify matches with semantic patterns. A strength component analyzes the associated semantic features associated with the objects of the matches to determine weightings for the links of the matches. An alert component provides the links and associated weightings.Type: GrantFiled: August 18, 2015Date of Patent: October 29, 2019Assignee: International Businesss Machines CorporationInventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Publication number: 20190286319Abstract: In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. The computer determines a virtual control button to display based on the detected interaction. The computer displays the determined virtual control button to the user. The computer receives an interaction with the displayed virtual control button. The computer implements an action associated with the determined virtual control button based on the received interaction.Type: ApplicationFiled: May 24, 2019Publication date: September 19, 2019Inventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Publication number: 20190278475Abstract: In an approach for controlling a computing device without mechanical buttons the computer detects an interaction with a touch capacitive sensing surface on a computing device. The computer determines that the detected interaction includes at least three interactions including at least two different touch capacitive sensing surfaces. The computer determines a virtual control button to display based on the detected interaction. The computer displays the determined virtual control button to the user. The computer receives an interaction with the displayed virtual control button. The computer implements an action associated with the determined virtual control button based on the received interaction.Type: ApplicationFiled: May 24, 2019Publication date: September 12, 2019Inventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz
-
Publication number: 20190251452Abstract: Mechanisms for evaluating an evidential statement in a corpus of evidence are provided. An evidential statement is received for determining a level of confidence in a hypothetical ontological link of an ontology. A source of the evidential statement is identified and a grading of the source of the evidential statement is determined based on a source grading measurement value indicative of a degree of reliability and credibility of the source. An indication of trustworthiness of the evidential statement is generated based on the source grading measurement value. A representation of the indication of trustworthiness of the evidential statement is output in association with the evidential statement.Type: ApplicationFiled: April 26, 2019Publication date: August 15, 2019Inventors: Darryl M. Adderly, Corville O. Allen, Robert K. Tucker
-
Publication number: 20190244120Abstract: In an approach to predicting user touch events, one or more computer processors receive a detected electromagnetic noise signal of an object. The one or more computer processors compare the detected electromagnetic noise signal of the object to one or more stored electromagnetic noise signals associated with one or more objects. Based, at least in part, on the comparison, the one or more computer processors determine the identity of the object. Responsive to determining the identity of the object, the one or more computer processors store metadata associated with at least one of the objects and an electromagnetic noise signal detection event. The one or more computer processors determine whether an amount of the metadata associated with the object meets a learning threshold. If the amount of metadata meets the learning threshold, the one or more computer processors predict a subsequent electromagnetic noise signal detection event associated with the object.Type: ApplicationFiled: April 24, 2019Publication date: August 8, 2019Inventors: Darryl M. Adderly, Rosanna S. Mannan, Kevin L. Schultz