Patents by Inventor John R. Dingler
John R. Dingler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8332535Abstract: A system and method is provided for providing privacy and limited exposure services for location based services. The system includes at least one module configured to provide fictitious location or route information of a mobile user to selected users or group of users based on a mobile user provided profile.Type: GrantFiled: July 9, 2008Date of Patent: December 11, 2012Assignee: International Business Machines CorporationInventors: John R. Dingler, David C. Olds, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20120311091Abstract: A method for controlling content distribution is implemented in a computer infrastructure and includes receiving a request for content from an end user computing device. The method also includes analyzing metadata embedded in the content to determine whether the content has expired. The method also includes serving the content to the end user computing device when content is not expired.Type: ApplicationFiled: May 31, 2011Publication date: December 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, Blaine H. DOLPH, Frank C. FISK, Matthew A. TERRY, Matthew B. TREVATHAN
-
Publication number: 20120222098Abstract: A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure.Type: ApplicationFiled: May 11, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, Frank C. FISK, Sri RAMANATHAN, Matthew A. TERRY, Matthew B. TREVATHAN
-
Publication number: 20120130902Abstract: A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure.Type: ApplicationFiled: November 24, 2010Publication date: May 24, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, Frank C. FISK, Sri RAMANATHAN, Matthew A. TERRY, Matthew B. TREVATHAN
-
Patent number: 8170580Abstract: A location based system is provided is configured to provide messages to a recipient based on time and location based information. The a method includes detecting when a mobile user has crossed within a predefined geo-boundary. The method further includes sending a message to the mobile user when the mobile user has crossed within the predefined geo-boundary during a predetermined time period set by an originator of the message.Type: GrantFiled: November 4, 2008Date of Patent: May 1, 2012Assignee: International Business Machines CorporationInventors: John R. Dingler, Pramodh D. Narayan, Sri Ramanathan, Michael J. Singer, Matthew A. Terry, Matthew B. Trevathan
-
Patent number: 8051136Abstract: Methods, systems, processes and devices are provided for optimizing throughput and quality of service of a presence enabled managed service. The method includes at least a first entity requesting from an aggregator of presence services presence information of a second entity. The method includes looking up a profile of the aggregator stored in a cache of a presence server hosted by the presence enabled managed service. The method includes determining from the profile an aggregator level of service the aggregator has subscribed to from the presence enabled managed service, wherein the aggregator level of service is one of high level service, medium level service, and low level service. The method includes storing presence information of the second entity on a presence document on the cache and returning the presence information to the first entity based upon the aggregator level of service.Type: GrantFiled: October 13, 2008Date of Patent: November 1, 2011Assignee: International Business Machines CorporationInventors: John R. Dingler, Michael Gilfix, Pramodh D. Narayan, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Patent number: 7978854Abstract: In asymmetric cryptography, initially-set public key and private keys are updated as a function of the chosen prime number pair, a host sending an updated public key exponent and a unique prime-pair key associated with the chosen prime number pair to the client, the client using the unique prime-pair key to look-up and retrieve the chosen prime number pair and determine the updated public key and the updated private key as a function of the retrieved chosen prime number pair, the host and the client encrypting and decrypting exchanged messages with the updated public key and the updated private key without executing another handshake. In one aspect, a large even integer is used by host and client to generate a plurality of prime number pairs, and the unique prime-pair key may be a distance between each prime number of an associated prime number pair.Type: GrantFiled: March 25, 2008Date of Patent: July 12, 2011Assignee: International Business Machines CorporationInventors: Robert W. Bond, John R. Dingler, Matthew B. Trevathan
-
Publication number: 20100228546Abstract: A system and methods is provided for providing SIP based voice transcription services. A computer implemented method includes: transcribing a Session Initiation Protocol (SIP) based conversation between one or more users from voice to text transcription; identifying each of the one or more users that are speaking using a device SIP_ID of the one or more users; marking the identity of the one or more users that are speaking in the text transcription; and providing the text transcription of the speaking user to non-speaking users.Type: ApplicationFiled: March 5, 2009Publication date: September 9, 2010Applicant: International Buisness Machines CorporationInventors: John R. Dingler, Sri Ramanathan, Matthew A. Terry, Matthew B Trevathan
-
Publication number: 20100203903Abstract: A location based service and method configured to provide a mechanism for delivering location to a subscribing user using a location queuing system. The method is implemented on a computing infrastructure and includes receiving one or more SIP (Session Initiation Protocol) messages with location information of a user.Type: ApplicationFiled: February 9, 2009Publication date: August 12, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, Mark D. Nielsen, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100135278Abstract: An architecture and method is provided for call routing using both IMS and non-IMS frameworks. The method includes receiving presence information of a third party from a non-IP Multimedia Subsystem (IMS) network device. The method further includes routing the third party to at least one callee designated device based on configurable preferences provided by the callee and correlated to presence information using an IMS compliant component. The method additionally includes providing a charging record for the routing on an IMS complaint charging platform.Type: ApplicationFiled: December 2, 2008Publication date: June 3, 2010Applicant: INTERNATIONAL BUSINESS MACHINES COPORATIONInventors: John R. DINGLER, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100130232Abstract: A location-based service system for providing messages to a recipient and, in particular, to transmission methods and systems for providing location data of a device to a location-based service system. A method of updating a location of a mobile device includes determining a location of the mobile device and, based on Internet accessibility of the mobile device, transmitting the location via Internet communication when Internet access is available and via SS7 communication when Internet access is unavailable.Type: ApplicationFiled: November 24, 2008Publication date: May 27, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Dingler, David C. Olds, James R. Rudd, Matthew B. Trevathan
-
Publication number: 20100112990Abstract: A location based service configured to route local advertising for streamed media and media blocking based on a location of the recipient. The method include detecting a location of a mobile user and routing streaming media of a local affiliate to a mobile device of the mobile user based on the detected location of the mobile user.Type: ApplicationFiled: November 4, 2008Publication date: May 6, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Dingler, Stephen E. Jaffe, Christopher E. Holladay, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100113066Abstract: A location based system is provided is configured to provide messages to a recipient based on time and location based information. The a method includes detecting when a mobile user has crossed within a predefined geo-boundary. The method further includes sending a message to the mobile user when the mobile user has crossed within the predefined geo-boundary during a predetermined time period set by an originator of the message.Type: ApplicationFiled: November 4, 2008Publication date: May 6, 2010Applicant: International Business Machines CorporationInventors: John R. DINGLER, Pramodh D. Narayan, Sri Ramanathan, Michael J. Singer, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100094984Abstract: Methods, systems, processes and devices are provided for optimizing throughput and quality of service of a presence enabled managed service. The method includes at least a first entity requesting from an aggregator of presence services presence information of a second entity. The method includes looking up a profile of the aggregator stored in a cache of a presence server hosted by the presence enabled managed service. The method includes determining from the profile an aggregator level of service the aggregator has subscribed to from the presence enabled managed service, wherein the aggregator level of service is one of high level service, medium level service, and low level service. The method includes storing presence information of the second entity on a presence document on the cache and returning the presence information to the first entity based upon the aggregator level of service.Type: ApplicationFiled: October 13, 2008Publication date: April 15, 2010Applicant: International Business Machines CorporationInventors: John R. Dingler, Michael Gilfix, Pramodh D. Narayan, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100042519Abstract: A system and method is provided for providing location based services. The system includes at least one module configured to publish location information of a mobile user using a publish subscribe format based on a user preference mode of notification.Type: ApplicationFiled: August 15, 2008Publication date: February 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Dingler, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Publication number: 20100015993Abstract: A system and method for providing reservation services to users of mobile devices. The system is implemented in a reservation computer device having computer executable code tangibly embodied on a computer readable medium. The reservation computer device is operable to prioritize a reservation schedule of a service establishment based on a route and projected arrival time of one or more subscribing users such that earlier arriving users and users that have already arrived at the service establishment are given priority in the reservation schedule regardless of prearranged reservations.Type: ApplicationFiled: July 15, 2008Publication date: January 21, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Dingler, David C. Olds, James R. Rudd, Matthew B. Trevathan
-
Publication number: 20100009657Abstract: A system and method is provided for providing privacy and limited exposure services for location based services. The system includes at least one module configured to provide fictitious location or route information of a mobile user to selected users or group of users based on a mobile user provided profile.Type: ApplicationFiled: July 9, 2008Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, David C. OLDS, Sri RAMANATHAN, Matthew A. TERRY, Matthew B. TREVATHAN
-
Publication number: 20090245515Abstract: In asymmetric cryptography, initially-set public key and private keys are updated as a function of the chosen prime number pair, a host sending an updated public key exponent and a unique prime-pair key associated with the chosen prime number pair to the client, the client using the unique prime-pair key to look-up and retrieve the chosen prime number pair and determine the updated public key and the updated private key as a function of the retrieved chosen prime number pair, the host and the client encrypting and decrypting exchanged messages with the updated public key and the updated private key without executing another handshake. In one aspect, a large even integer is used by host and client to generate a plurality of prime number pairs, and the unique prime-pair key may be a distance between each prime number of an associated prime number pair.Type: ApplicationFiled: March 25, 2008Publication date: October 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert W. Bond, John R. Dingler, Matthew B. Trevathan
-
Patent number: 7529808Abstract: Disclosed are systems and methods of automatic navigation on the world wide web. A server receives an anonymous signal from a browser, and selectively determines a resource identifier corresponding to one of the plurality of Internet domains, by accessing data structures that are stored apart from the browser. The server generates a signal corresponding to the resource identifier, and sends the signal, to allow the browser to access a signal associated with the resource identifier.Type: GrantFiled: March 5, 2008Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Matthew Bunkley Trevathan, John R. Dingler, Clinton James McCallum, Robert Wayne Ross
-
Publication number: 20090061909Abstract: A system and method for sending text messages and, more particularly, a system and method for forcing SMS capable devices to communicate via SMS using, for example, SS7 protocol. A method comprises providing a tag forcing a return text message to be sent via SS7 protocol. In use, the system and method is configured to force the use of SMS messages via the SS7 protocol. The system and method can be implemented over any network, for example, and any existing mobile device and related infrastructure can be modified to take advantage of the benefits and functionality of the system and method of the invention.Type: ApplicationFiled: August 27, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark D. DENNARD, John R. Dingler, Christopher Holladay, Jessica E. Marceau, Matthew B. Trevathan