Patents by Inventor Lloyd W. Allen, Jr.
Lloyd W. Allen, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8375459Abstract: Human ability to perceive higher audio frequencies diminishes with age. Functionality can be implemented to use a combination of audio tones with varying frequencies to identify an age range to which a user belongs and accordingly control access to age dependent access controlled information and services. The user's ability to perceive one or more audio tones in the combination of audio tones depends on the user's age. Thus, different users, depending on the users' age, may perceive the same combination of audio tones differently. Such an age verification system based on human perception of audio tones can minimize the need for identification cards and a reliance on the user providing accurate age information. This can prevent the user from misinterpreting his/her age to access the age dependent access controlled information and can ensure that only an authorized user gets access to the age dependent access controlled information.Type: GrantFiled: March 25, 2009Date of Patent: February 12, 2013Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Travis M. Grigsby, Jana H. Jenkins, Steven M. Miller
-
Patent number: 8335691Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: GrantFiled: December 31, 2008Date of Patent: December 18, 2012Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Jana Helton Jenkins, Steven Michael Miller
-
Publication number: 20120311417Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: ApplicationFiled: August 8, 2012Publication date: December 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lloyd W. Allen, JR., Jana Helton Jenkins, Steven Michael Miller
-
Patent number: 8315879Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: GrantFiled: April 6, 2012Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Jana Helton Jenkins, Steven Michael Miller
-
Publication number: 20120194337Abstract: To warn of hazardous conditions in a monitored space, the presence of an object bearing an RFID tag is detected using an RFID tag reader. Objects may be, for example, human beings, vehicles, or stationary materiel. A determination is made as to whether the object poses a hazard by, for example, reading data from the RFID tag or by accessing a database using data read from the RFID tag. If the object is determined to pose a hazard, the nature of the hazard is determined from the RFID tag or the database, and warning about the nature of the hazard is provided proximate to the monitored space. In some embodiments, providing the warning may be conditional upon detecting the concurrent presence of two objects in the monitored space.Type: ApplicationFiled: April 12, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Lloyd W. Allen, JR., Jana Helton Jenkins, Steven Michael Miller
-
Publication number: 20120198327Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: ApplicationFiled: April 6, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lloyd W. Allen, JR., Jana Helton Jenkins, Steven Michael Miller
-
Patent number: 8179257Abstract: To warn of hazardous conditions in a monitored space, the presence of an object bearing an RFID tag is detected using an RFID tag reader. Objects may be, for example, human beings, vehicles, or stationary materiel. A determination is made as to whether the object poses a hazard by, for example, reading data from the RFID tag or by accessing a database using data read from the RFID tag. If the object is determined to pose a hazard, the nature of the hazard is determined from the RFID tag or the database, and warning about the nature of the hazard is provided proximate to the monitored space. In some embodiments, providing the warning may be conditional upon detecting the concurrent presence of two objects in the monitored space.Type: GrantFiled: March 30, 2006Date of Patent: May 15, 2012Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Jana Helton Jenkins, Steven Michael Miller
-
Publication number: 20110138321Abstract: Initiating a predefined function responsive to detecting a selected graphic control moved into a zone within a user interface. One or more zones may be defined, and a corresponding function is defined for each zone. Responsive to movement of the selected graphic control in an orthogonal direction and releasing the control in a particular zone, a particular function is invoked, the particular function corresponding to the zone in which the control is released.Type: ApplicationFiled: December 4, 2009Publication date: June 9, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lloyd W. Allen, JR., Travis M. Grigsby, Jana H. Jenkins, Steven M. Miller
-
Patent number: 7957775Abstract: A low battery notification service is provided to a user of a wireless device capable of monitoring the voltage level of its internal battery and sending a low battery warning message. The messages are received at a service provider that maintains subscriber profiles associated with a subscriber's wireless device. When a low battery warning message is received, a wireless device identifier in the warning message is used to access a notification list included in a stored subscriber profile. Notification list entries are selected based on their assigned priorities and the existence or absence of conditions of use, permitting low battery notifications to be sent to target systems on the notification list until an acceptable response is received or the notification list is exhausted.Type: GrantFiled: November 5, 2007Date of Patent: June 7, 2011Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Jana Helton Jenkins, Steven Michael Miller
-
Publication number: 20110047503Abstract: Scrolling through a large file using a small scroll handle can be challenging for users. Using the small scroll handle to navigate through the large file rarely produces accurate results. Functionality can be implemented to navigate through file content without the user having to locate, click on, and drag the scroll handle. Content navigation can be achieved by employing knowledge of a current focus in the file and performing scroll jumps in accordance with binary search techniques. Navigation scope for the file can be refined at each iteration, based on a user indicating whether to move up or down in the file after each intermediate position. Such a technique for content navigation can help users locate content in a file with greater speed and accuracy.Type: ApplicationFiled: August 18, 2009Publication date: February 24, 2011Applicant: International Business Machines CorporationInventors: Lloyd W. Allen, JR., Travis M. Grigsby, Jana H. Jenkins, Steven M. Miller
-
Publication number: 20100309436Abstract: Slides are selectively presented via a slide presentation system based upon a priority level assigned to a slide presentation. The assigned priority level indicates which of the slides to selectively present and includes a first priority level of at least two priority levels associated with the slide presentation. A request is received during the selective presentation of the slides, via an input device associated with the slide presentation system, to change the priority level assigned to the slide presentation to a second priority level of the at least two priority levels. The remaining slides of the slide presentation are selectively presented via the slide presentation system based upon the second priority level. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.Type: ApplicationFiled: June 8, 2009Publication date: December 9, 2010Applicant: International Business Machines CorporationInventors: Lloyd W. Allen, JR., Travis M. Grigsby, Jana H. Jenkins, Steven M. Miller
-
Publication number: 20100251336Abstract: Human ability to perceive higher audio frequencies diminishes with age. Functionality can be implemented to use a combination of audio tones with varying frequencies to identify an age range to which a user belongs and accordingly control access to age dependent access controlled information and services. The user's ability to perceive one or more audio tones in the combination of audio tones depends on the user's age. Thus, different users, depending on the users' age, may perceive the same combination of audio tones differently. Such an age verification system based on human perception of audio tones can minimize the need for identification cards and a reliance on the user providing accurate age information. This can prevent the user from misinterpreting his/her age to access the age dependent access controlled information and can ensure that only an authorized user gets access to the age dependent access controlled information.Type: ApplicationFiled: March 25, 2009Publication date: September 30, 2010Applicant: International Business Machines CorporationInventors: Lloyd W. Allen, JR., Travis M. Grigsby, Jana H. Jenkins, Steven M. Miller
-
Publication number: 20100235894Abstract: A computer implemented method for accessing materials for a meeting may include receiving a call from a meeting participant by a system, wherein the meeting participant calls a prearranged teleconference number to participate in the meeting. The method may also include validating participation of the meeting participant in the meeting by the system. The method may further include providing access to an appropriate set of materials to the meeting participant based on a predetermined attribute associated with the meeting participant.Type: ApplicationFiled: March 16, 2009Publication date: September 16, 2010Inventors: Lloyd W. Allen, JR., Jana H. Jenkins, Steven M. Miller
-
Publication number: 20100189241Abstract: Providing multilevel teleconference call participants that may include receiving a request from a person to join a teleconference call, identifying a defined level of the person, and providing a notification regarding a status of persons having certain defined levels that one of have joined the teleconference call and have not joined the teleconference call. Further, a processing device may include a network interface, at least one second interface configured to establish a connection between at least two telephones, and a processor configured to receive a request from a person to join a conference call, identify a defined level of the person, and provide a notification regarding a status of persons having certain defined levels that have joined the teleconference call or have not joined the teleconference call.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Inventors: Steven M. Miller, Jana H. Jenkins, Lloyd W. Allen, JR.
-
Publication number: 20100189243Abstract: Enhanced announcement of conference call participants that may include allowing a party to join a teleconference call, identifying a class of the party that has joined the teleconference call, and generating a notification in the teleconference call related to the class of the party that has joined the teleconference call. A processing device may include a network interface, at least one second interface configured to establish a connection between at least three telephones, and a processor configured to allow a party to join a teleconference call, identify a class of the party that has joined the teleconference call, and generate a notification in the teleconference call related to the class of the party that has joined the teleconference call. The notification may be a tone, a signal, a name, or other type notification.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Inventors: Steven M. Miller, Jana H. Jenkins, Lloyd W. Allen, JR.
-
Publication number: 20100189242Abstract: Rules-based teleconferencing that may include receiving criteria regarding invitees to a teleconference call, generating rules based on the criteria, and generating a notification regarding the invitees to the teleconference call based on the rules. The criteria may include a quorum of a minimum number of invitees that must be in attendance at the teleconference call or a list of specific invitees required to be in attendance at the teleconference call. A processing device may include a network interface, one or more second interfaces configured to establish a connection between at least three telephones, and a controller configured to establish a teleconference call between the at least three telephones, receive criteria regarding invitees to the teleconference call, generate rules based on the criteria, and generate a notification regarding the invitees to the teleconference call based on the rules.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Inventors: Jana H. Jenkins, Lloyd W. Allen, JR., Steven M. Miller
-
Publication number: 20100189239Abstract: Accessing information on call invitees that may include initiating a teleconference call, receiving an inquiry during the teleconference call regarding additional information on at least one person invited to join the call, obtaining the additional information on each of the at least one person, and sending the additional information. Also, a processing device may include a network interface, at least one second interface configured to establish a connection between at least three telephones, and a controller configured to initiate a teleconference call between the at least three telephones, receive an inquiry during the teleconference call regarding additional information on at least one person invited to join the call, obtain the additional information on each of the at least one person, and send the additional information.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Inventors: Steven M. Miller, Lloyd W. Allen, JR., Jana H. Jenkins
-
Publication number: 20100189240Abstract: Contacting a person while conducting a call that may include initiating a teleconference call, receiving a message during the teleconference call from a first person who has joined the teleconference call directed to a second person that has not joined the teleconference call, forwarding the message to the second person during the teleconference call, receiving a reply message from the second person during the teleconference call, and forwarding the reply message to the first person during the teleconference call. A processing device that may establish a teleconference call between telephones, receive a message during the conference call from a first telephone that has joined the teleconference call destined for a second telephone that has not joined the teleconference call, deliver the message to the second telephone, receive a reply message from the second telephone, and forward the reply message to the first telephone during the conference call.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Inventors: Steven M. Miller, Jana H. Jenkins, Lloyd W. Allen, JR.
-
Publication number: 20100169754Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: ApplicationFiled: December 31, 2008Publication date: July 1, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lloyd W. Allen, JR., Jana Helton Jenkins, Steven Michael Miller
-
Patent number: 7720829Abstract: An application for middleware sign-on is provided. A secure engine in the middleware generates a soft keyboard and scroll area. The scroll area includes coordinates associated with the soft keyboard. A selector is generated overlaid on the soft keyboard. The selector moves with respect to the soft keyboard in response to cursor movement within the scroll area. As the cursor movement causes the selector, the secure engine generates and stores false data key selections. When a user selects a data key with the selector, the middleware generates and stores the valid data key entry. The middleware stores both the valid data key selections and the false data key selections in the same area. Once the user submits his completed selection, or data, the middleware processes the data.Type: GrantFiled: July 14, 2005Date of Patent: May 18, 2010Assignee: International Business Machines CorporationInventors: Lloyd W. Allen, Jr., Tricia E. Garrett, Jana Helton Jenkins