Patents by Inventor Edith H. Stern

Edith H. Stern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090055554
    Abstract: A method for delivering electronic services in a personal area network (PAN) can include providing a kiosk in a publicly traversable area. The kiosk can be configured to deliver electronic services over short-range radio communications links to wireless devices in a personal area network (PAN). The kiosk also can be configured to communicate over an existing physical communications link medium. A PAN can be established in the publicly traversable area. Electronic services can be selectably retrieved through the existing physical communications link medium into the kiosk. Finally, the retrieved selected electronic services can be delivered to wireless devices in the PAN over the short-range radio communications link. Notably, the step of establishing a PAN in the publicly traversable area can include establishing a BLUETOOTH-based PAN with wireless devices in the publicly traversable area.
    Type: Application
    Filed: August 28, 2008
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor S. Moore, Edith H. Stern, Barry E. Willner
  • Publication number: 20090055654
    Abstract: A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display.
    Type: Application
    Filed: August 4, 2008
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James M. Dunn, Edith H. Stern, Barry E. Willner
  • Publication number: 20090049135
    Abstract: A system and method exploits organizational distances associated with an organizational hierarchy in a directed acyclic graph to both affect behavior in instant messaging systems, as well as to modify behavior (presence, IM, availability, who can get to the IM user) based on the reporting relationships that exist in an organization. One part of the invention is in exploiting a directed acyclic graph for the purposes of controlling instant messaging behavior for an individual, a team or a community. This is accommodated by abstracting organizational reporting relationships. The reporting relationships that exist in LDAP are used to enforce top-down rules which determine actions that motivate a change in behavior for instant messaging users across the organization. Such actions are not possible to motivate in conventional art. Conventional art relies on rules that a specific user manually builds, and do not consider capabilities around hierarchical imposition, not a reporting team/group/organizational.
    Type: Application
    Filed: August 16, 2007
    Publication date: February 19, 2009
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090024460
    Abstract: A system and method for detecting click fraud where the movement of a cursor on a web page is tracked prior to an advertisement on the web page being clicked by a controller of the cursor. The tracking is performed by client code on a client device displaying the web page. A path taken by the movement of the cursor is mapped to at least one vector associated with the path by the client code. The at least one vector is useable to detect a click fraud.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20090024461
    Abstract: A system and method for detecting click fraud where data related to at least one vector associated with a path taken by movement of a cursor on a web page prior to an advertisement on the web page being clicked by a controller of the cursor is received. Click fraud is detected based on an analysis of the received data. A pattern in the at least one vector is analyzed to determine if the cursor movement is human-like and a click fraud detected if the cursor movement is not human-like. In another embodiment, the at least one vector associated with the path is stored and compared with previously stored vectors associated with the path and a click fraud detected if the stored at least one vector is analogous to at least one of the previously stored vectors associated with the path.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20090024971
    Abstract: A system and method for detecting click fraud where data is received corresponding to a tracking of movement of a cursor on a web page. The movement of the cursor is associated with at least one vector. The at least one vector represents at least a portion of the cursor movement. A confidence level useable in the determination of click fraud is determined. The confidence level is responsive to analysis of the at least one vector representing at least a portion of the cursor movement.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20080319774
    Abstract: Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080320125
    Abstract: Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080319842
    Abstract: Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080297488
    Abstract: A system and method of providing information (such as directions) to a driver of a vehicle while driving the vehicle without requiring that the driver remove his eyes from looking out the windshield at the road ahead. A positioning device is associated with the vehicle and determines the present location of the vehicle which is compared to a desired location (e.g., the location of a desired turn at an intersection) necessary to reach a preset destination which has been stored. When the vehicle is in a predetermined location (e.g., 500 feet or 10 second before the intersection), an advisory message to the driver is projected onto the windshield using a heads-up display projector so that the driver can prepare for and make the necessary movement (e.g., turning the correct way at the desired intersection).
    Type: Application
    Filed: August 15, 2008
    Publication date: December 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Howard L. Operowsky, Edith H. Stern, Barry E. Willner
  • Patent number: 7434060
    Abstract: A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display.
    Type: Grant
    Filed: October 22, 2005
    Date of Patent: October 7, 2008
    Assignee: International Business Machines Corporation
    Inventors: James M. Dunn, Edith H. Stern, Barry E. Willner
  • Patent number: 7433782
    Abstract: A system and method of providing information (such as directions) to a driver of a vehicle while driving the vehicle without requiring that the driver remove his eyes from looking out the windshield at the road ahead. A positioning device is associated with the vehicle and determines the present location of the vehicle which is compared to a desired location (e.g., the location of a desired turn at an intersection) necessary to reach a preset destination which has been stored. When the vehicle is in a predetermined location (e.g., 500 feet or 10 second before the intersection), an advisory message to the driver is projected onto the windshield using a heads-up display projector so that the driver can prepare for and make the necessary movement (e.g., turning the correct way at the desired intersection).
    Type: Grant
    Filed: September 11, 2006
    Date of Patent: October 7, 2008
    Assignee: International Business Machines Corporation
    Inventors: Howard L. Operowsky, Edith H. Stern, Barry E. Willner
  • Patent number: 7424098
    Abstract: Methods, systems, computer program products, and methods of doing business by selectably mixing one or more sound files with a telephone caller's voice message, either as background for that message or embedded within the message. Or, the mixing may occur within a telephone conversation between parties. The disclosed techniques enable alleviating some of the problems that result from distance communication (as contrasted to face-to-face communication). In particular, context information (such as emotional context) can be provided through appropriate use of background sound and/or embedded audio files. The disclosed techniques may also make communication through voice mail exchange more enjoyable and/or increase its productivity.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: September 9, 2008
    Assignee: International Business Machines Corporation
    Inventors: Renee M. Kovales, Edith H. Stern, Barry E. Willner
  • Publication number: 20080177755
    Abstract: File transitions are identified that are to be tracked and at least one element of metadata is generated that characterizes each identified file transition to be tracked. Upon receiving a request for historical transition information, elements of metadata corresponding to at least two instances of a tracked file are aggregated and information is provided responsive to the request that is derived from the aggregated elements of metadata. The action metadata may follow that history of each tracked file as well as the histories of copies of each tracked file over time. Thus, an operator can manage the infrastructure of a corresponding computing environment with knowledge of the current and historical activities of files.
    Type: Application
    Filed: January 18, 2007
    Publication date: July 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edith H. Stern, John J. Thomas, Robert C. Weir, Barry E. Willner
  • Publication number: 20080165939
    Abstract: Methods, systems, computer program products, and methods of doing business by selectably mixing one or more sound files with a telephone caller's voice message, either as background for that message or embedded within the message. Or, the mixing may occur within a telephone conversation between parties. The disclosed techniques enable alleviating some of the problems that result from distance communication (as contrasted to face-to-face communication). In particular, context information (such as emotional context) can be provided through appropriate use of background sound and/or embedded audio files. The disclosed techniques may also make communication through voice mail exchange more enjoyable and/or increase its productivity.
    Type: Application
    Filed: March 22, 2008
    Publication date: July 10, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renee M. Kovales, Edith H. Stern, Barry E. Willner
  • Publication number: 20080163128
    Abstract: A method, system and computer-readable medium for defeating clickbots are presented.
    Type: Application
    Filed: December 28, 2006
    Publication date: July 3, 2008
    Inventors: Sean Callanan, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080162200
    Abstract: A method, system and computer-readable medium for reducing a financial impact of click fraud are presented. In a preferred embodiment, the method includes, but is not limited to, the steps of: testing a sample of click events for fraudulent clicks of the PPC link, wherein the testing of the sample of click events for fraudulent clicks is directed to detecting fraudulent non-human clicks of the PPC link; and in response to a percentage of clicks failing the testing being greater than a pre-determined tolerance level, reducing a charge for clicks of the PPC link.
    Type: Application
    Filed: December 28, 2006
    Publication date: July 3, 2008
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080140784
    Abstract: A plurality of senders can be specified for a message. A message associated with a first sender can be created. A second sender can be associated with the message. The first sender and the second sender can be included in an originator portion of the message. The message can be send to a recipient.
    Type: Application
    Filed: December 11, 2006
    Publication date: June 12, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080133571
    Abstract: The behavior of a messaging system can be modified. A message from a sender can be received. A determination can be made that the message is associated with a workflow. A position of the sender within an organizational hierarchy can be identified. The workflow associated with the message can be initiated according to the position of the sender.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 5, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080126330
    Abstract: The present invention provides a method, system, and program product for managing data decay. Specifically, under the present invention, usage information describing how data should be accessed is obtained. Thereafter, resource information describing resources available for accessing the data is obtained. Then, a data decay potential of the data is computed based on the usage information and the resource information. When the data decay potential exceeds a predetermined threshold, an indicator such as a report, an alarm, an error message, or an event and be communicated, and a remediation action such as a format transformation, a software archiving, or an environment archiving can be initiated.
    Type: Application
    Filed: August 1, 2006
    Publication date: May 29, 2008
    Inventors: Edith H. Stern, David L. Ehnebuske