Patents by Inventor Kelce Wilson

Kelce Wilson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230139312
    Abstract: Systems and methods are disclosed which use a block chain (“blockchain”) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. In an exemplary operation, an internet browser retrieves a website document, hashes at least a portion of the website document to produce a first hash value, retrieves blockchain registration data for the website document; compares the first hash value with a second hash value found in a blockchain; and responsive to the first and second hash values matching, displays a verification indication. Some embodiments may be used as parental controls for internet browsers.
    Type: Application
    Filed: August 7, 2022
    Publication date: May 4, 2023
    Inventor: Kelce Wilson
  • Publication number: 20230006834
    Abstract: Permissioned blockchains with off-chain storage establish integrity and no-later-than date-of-existence for documents, leveraging records containing hash values of documents. When a document's integrity or date is challenged, a new hash value is compared with a record in the blockchain. Proving date-of-existence (via hash value in a publication and/or SMS) for the block containing the record establishes no-later-than date-of-existence for the document. Permissioning monetizes operations, enforcing rules for submission rights and content, thereby precluding problematic material (privacy, obscenity, malicious logic, copyright violations) that threatens long-term viability. Compact records and off-chain storage in a document corral (with quarantine capability) preserve document confidentiality and ease storage burdens for distributed blockchain copies. Using multiple hash values for each document hardens against preimage attacks with quantum computing.
    Type: Application
    Filed: September 11, 2022
    Publication date: January 5, 2023
    Inventor: Kelce Wilson
  • Patent number: 9037123
    Abstract: Mobile devices may be subject to different operational constraints in different geographies or circumstances. For example, power levels may be limited for transmissions in certain countries. The geographic position of a mobile device may be identified and used for determining the applicable local regulations. The local regulations may allow for different operational constraints depending on whether a device is located indoors or outdoors. Accordingly, a determination of indoor/outdoor state may be used to maximize device performance while also complying with appropriate regulations/circumstances.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: May 19, 2015
    Assignee: BlackBerry Limited
    Inventors: Per Malmbak, Kelce Wilson, Young Ae Kim
  • Publication number: 20130237294
    Abstract: A wireless communication device is provided. The device comprises a radio access subsystem disposed at least partially within a housing of the device. The device further comprises at least one internal antenna disposed within the housing of the device. The at least one internal antenna is communicatively coupled to the radio access subsystem. The device further comprises an external communication port disposed on the housing of the device. The external communication port is communicatively coupled to the radio access subsystem. The device further comprises a control component configured to determine whether an external antenna module is connected to the external communication port and to control the radio access subsystem to selectively use the internal antenna and the external antenna module. Selective use comprises using only the internal antenna, or using only the external antenna module, or using both the internal antenna and the external module simultaneously.
    Type: Application
    Filed: March 9, 2012
    Publication date: September 12, 2013
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Shalini Suresh Periyalwar, Mina Ayatollahi, Kelce Wilson
  • Publication number: 20130157638
    Abstract: Mobile devices may be subject to different operational constraints in different geographies or circumstances. For example, power levels may be limited for transmissions in certain countries. The geographic position of a mobile device may be identified and used for determining the applicable local regulations. The local regulations may allow for different operational constraints depending on whether a device is located indoors or outdoors. Accordingly, a determination of indoor/outdoor state may be used to maximize device performance while also complying with appropriate regulations/circumstances.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Inventors: Per Malmbak, Kelce Wilson, Young Ae Kim
  • Publication number: 20130021261
    Abstract: A method includes establishing communication between a first portable electronic device and a second portable electronic device, wherein the first portable electronic device includes a first processor and by the first processor, displaying first information on a first display of the first electronic device and controlling the second portable electronic device to display second information on a second display of the second portable electronic device.
    Type: Application
    Filed: July 18, 2011
    Publication date: January 24, 2013
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Kelce WILSON, Young Ae KIM, Susan LUKASIK
  • Patent number: 8347092
    Abstract: Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security.
    Type: Grant
    Filed: April 5, 2010
    Date of Patent: January 1, 2013
    Inventors: Kelce Wilson, Jeff Hughes
  • Publication number: 20110252358
    Abstract: Methods and devices for using motion to control a portable electronic device are disclosed. In one embodiment, a method of using movement to control a portable electronic device, the portable electronic device having a housing containing a display and a sensor, the method comprising displaying a virtual viewing window on the display, wherein said virtual viewing window contains a portion of an electronic document rendered for display; detecting lateral movement of the portable electronic device using the sensor; and controlling the movement of said virtual viewing window over said electronic document by moving said virtual viewing window in a direction, distance or both consistent with the lateral movement of the portable electronic device.
    Type: Application
    Filed: April 9, 2010
    Publication date: October 13, 2011
    Inventors: Kelce Wilson, Axel Ferrazzini
  • Publication number: 20110246769
    Abstract: Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security.
    Type: Application
    Filed: April 5, 2010
    Publication date: October 6, 2011
    Inventors: Kelce Wilson, Jeff Hughes
  • Publication number: 20110002230
    Abstract: A method for communication in a packet-switched network. The method includes, when a determination is made that a call that has been set up with a quality of service appropriate for a live voice call will carry recorded voice-based data, decreasing the quality of service used on the call.
    Type: Application
    Filed: July 27, 2009
    Publication date: January 6, 2011
    Applicant: Research In Motion Limited
    Inventor: Kelce Wilson
  • Publication number: 20070266835
    Abstract: A saw table is described, which allows for rapid changes between cross-cutting and ripping configurations. Embodiments comprise a two-sided cutting surface, one for cross cutting, the other for ripping. A first fence protrudes from an edge of the surface only on the cross cut side, providing a guide for cross cuts and an obstruction-free surface for ripping. A second fence may be provided in the saw parking area, which is available for ripping. Embodiments may be used with or without an underlying table. If used with an underlying table, embodiments will absorb wear, delaying replacement and realignment of the underlying table. An underlying table may also remain available, if needed for high precision cuts. The cutting surface thickness may approximate the height of the fence on an underlying table, so that the cutting surface, parking area and top of the underlying fence comprise a roughly flush surface for ripping.
    Type: Application
    Filed: May 17, 2006
    Publication date: November 22, 2007
    Inventor: Kelce Wilson
  • Publication number: 20050055312
    Abstract: The present invention is a system and method of software control flow watermarking including the steps of obtaining a program for protection, generating at least one watermark value using a formula or process from an external file, and placing the at least one watermark value in CASE values of the program. The system and method may further include determining the at least one watermark value by a formula with at least one variable. The formula may also contain a variable from outside of the program. The system may also stop the program if the variable from outside of the program is incorrect.
    Type: Application
    Filed: August 18, 2004
    Publication date: March 10, 2005
    Inventors: Kelce Wilson, Jason Sattler