Patents by Inventor Jacob D. Eisinger

Jacob D. Eisinger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090280785
    Abstract: A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090279677
    Abstract: A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090242142
    Abstract: A privacy screen for a display device includes a frame having first and second opposing members joined by third and fourth opposing members that collectively define a central opening. The privacy screen further includes a transparent film extending across the central opening. The transparent film includes a plurality of vertical micro-louvers. The plurality of vertical micro-louvers are arranged in at least one of a first configuration wherein the plurality of micro-louvers are positioned at variable angles relative to a vertical fixed reference point, a second configuration wherein the plurality of micro-louvers have varying depths relative to the vertical fixed reference point, and a third configure wherein a spacing between adjacent ones of the plurality of micro-louvers varies relative to the vertical fixed reference point.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 1, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas A. Bellwood, Jacob D. Eisinger, Matthew F. Rutkowski
  • Publication number: 20090022305
    Abstract: A phone call mute notification applies an aural effect to the user's speech, other parties' speech, non-speech, or combinations thereof. The phone call mute notification does not render speech unintelligible and may provide a constant indication that the phone call mute function is active. Furthermore, the phone call mute notification does not serve as a distraction to the user, because the aural effect may be applied to speech itself rather than drawing the attention of the user away from the speech.
    Type: Application
    Filed: July 17, 2007
    Publication date: January 22, 2009
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Jennifer E. King, William A. Reichert, III
  • Publication number: 20080027939
    Abstract: In general, the present invention provides a method, system, and program product for managing personal attributes across enterprise domains. Specifically, under the present invention, personal attributes for an end-user will be located among the enterprise domains. Once located, the personal attributes will be grouped into a set of profiles based on associated services (e.g., medical, insurance, etc.). The end-user can log into the system to see his/her personal attributes and to provide input regarding how access to the personal attributes should be controlled. Specifically, based on the end-user's input (and possibly other factors such as applicable legislation) an access control policy will be generated and used to control access to the personal attributes. In addition, any transactions involving the personal attributes will be recorded so that auditing can take place.
    Type: Application
    Filed: July 31, 2006
    Publication date: January 31, 2008
    Inventors: Nanchariah R. Chalasani, Jiayue Chen, Jacob D. Eisinger, Josephine R. Gordon, David G. Kuehr-McLaren, Nataraj Nagaratnam, Luke T. Rajlich
  • Publication number: 20070271271
    Abstract: The invention provides a method, system, and program product for conducting a cross-organizational transaction audit. In one embodiment, the invention includes a first entity requesting that a second entity perform a task; a third entity creating a log of information related to the second entity's performance of the task and verifying to the first entity that the task was performed; the first entity examining the log to determine at least one of the following: whether the second entity's performance of the task was satisfactory and how the second entity used information provided by the first entity in performing the task; and the first entity verifying that the second entity's performance of the task was satisfactory.
    Type: Application
    Filed: May 18, 2006
    Publication date: November 22, 2007
    Inventors: Nanchariah R. Chalasani, Jiayue Chen, Jacob D. Eisinger, Josephine R. Gordon, David G. Keuhr-McLaren, Eric J. McNeil, Luke T. Rajlich