Patents by Inventor Jeffrey K. Price

Jeffrey K. Price has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150332550
    Abstract: A computer system identifies a ranking, and a fee for a user of a game. A computer system determines an amount to adjust the fee for the user of the game based upon the ranking of the user. Responsive to determining the amount to adjust the fee, a computer system updates the fee for the user of the game.
    Type: Application
    Filed: May 15, 2014
    Publication date: November 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20150276521
    Abstract: Receiving machine-readable information about an anchor point, analyzing that information to determine if connecting a load to the anchor point would be safe, and reporting the results of this analysis to a user.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Applicant: International Business Machines Corporation
    Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20150261508
    Abstract: A computing device determines a first set of functions in a first file having a first bit length. The computing device performs a first test, which includes executing a first test program capable of testing each function in the first set of functions. The computing device determines whether the first test was successful, and based on determining that the first test was successful, creates a shim program based on the first set of functions. The computing device creates a second file based on the first set of functions, the second file having a second bit length. The computing device performs a second test, which includes executing a second test program capable of testing each function in the second file. The computing device determines whether the second test was successful, and based on determining that the second test was successful, publishes one or more of the shim program and second file.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: International Business Machines Corporation
    Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20150257040
    Abstract: A configurable wireless switched network includes a wireless access point. The wireless access point includes an application that is executable thereon. The application is configured to set, by a user via an input component, a first port of a plurality of ports as a command channel. The command channel provides a first point of contact between the wireless access point and client devices. The application is also configured to receive configuration parameters from the user. The configuration parameters include port allocation instructions for the ports and identifiers of the client devices. The application is further configured to monitor bandwidth utilization on a network; receive, at the command channel, a request from one of the client devices to access the network; and assign one of the ports to the client device based on the port allocation instructions, the bandwidth utilization, and an identifier of the client device.
    Type: Application
    Filed: March 4, 2014
    Publication date: September 10, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20150161412
    Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.
    Type: Application
    Filed: February 12, 2015
    Publication date: June 11, 2015
    Inventors: JEFFREY K. PRICE, PRABHAT K. SUR, ROBERT R. WENTWORTH, STANLEY C. WOOD
  • Patent number: 9002890
    Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.
    Type: Grant
    Filed: March 14, 2012
    Date of Patent: April 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey K. Price, Prabhat Sur, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20140372631
    Abstract: A computer implemented method, a computer program product, and a computer negotiate pin assignment for a cabling interface. A cabling interface discovers an attached device through an interrogation from a connected port. The cabling interface performs a handshake with the attached device. The handshake shares information on the protocols, bandwidth needs, streams and pins supported by the attached device. The cabling interface declares a set of supported streams needed for communication by the cabling interface. The cabling interface negotiates pin layout for each streams that will be used for communication between the cabling interface and the attached device. The cabling interface assigns pins based on needs of the attached device and needs of the cabling interface.
    Type: Application
    Filed: June 12, 2013
    Publication date: December 18, 2014
    Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
  • Publication number: 20130246470
    Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.
    Type: Application
    Filed: March 14, 2012
    Publication date: September 19, 2013
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey K. PRICE, Prabhat SUR, Robert R. WENTWORTH, Stanley C. WOOD
  • Patent number: 6748580
    Abstract: A user creates a software tool using a simple Java text markup language (JTML) interface. The user provides the JTML server with JTML pseudo code (code objects) which the JTML server recognizes, and performs routine programming tasks associated with the JTML code objects. The JTML server builds the executable JTML tool by invoking Java classes, associated with the code object, which are necessary to create the tool. The Java classes also create the user interface necessary for the user to enter data and commands for executing the JTML tool once the tool has been created. The JTML server acts as a secure port to the host by insulating the host contact or connection from a client. No code or command passes directly between the host and the client, instead the JTML server mediates all transactions between the two. Additional security is provided by the JTML server logging each user's access and each user's transaction.
    Type: Grant
    Filed: April 22, 1999
    Date of Patent: June 8, 2004
    Assignee: International Business Machines Corporation
    Inventors: Robert K. Sur, Jeffrey K. Price