Patents by Inventor Newton James Smith

Newton James Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040088588
    Abstract: A method of rapid access to resources on a computing system is provided that differentiates between applications, data and devices that require password protection and those that do not, enabling those applications, data and devices that do not require protection to be accessed without entry of a password. In one embodiment, application programs include an option that enables a user to specify whether or not the application, or specific operations within the application, can be initiated without first entering a password. In a second embodiment, the protection is provided at an operating system level by protecting designated resources. Another embodiment employs two passwords—the second of which is required to access rapid access applications or operations and may or may not timeout. In this manner, an authorized user can gain access to particular applications, data or devices in less time than otherwise necessary with a standard password protection scheme.
    Type: Application
    Filed: October 31, 2002
    Publication date: May 6, 2004
    Applicant: International Business Machines Corporation
    Inventors: Faisal M. Awada, Joe Nathan Brown, Herman Rodriguez, Newton James Smith
  • Publication number: 20040064724
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, including asserting security control data as security facts into a security knowledge database and asserting security rules into the security knowledge database, the security object including security control data and at least one security method, receiving a request for access to the resource, and receiving security request data. Embodiments include asserting the security request data as security facts into the security knowledge database, and determining access to the resource in dependence upon the security facts and security rules in the security knowledge database.
    Type: Application
    Filed: September 12, 2002
    Publication date: April 1, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20040054896
    Abstract: Controlling access to a resource including creating a security object in dependence upon user-selected security control data types, the security object implementing a security model, the security object comprising security control data, at least one security method, and a security event manager, including creating security event definitions; detecting a security event through the security event manager in dependence upon the security event definitions; altering the security model in dependence upon the security event. The security model comprises a combination of security control data, and altering the security model comprises altering the combination of security control data. The combination of security control data comprises a list of references to objects containing security control data. Creating a security object includes creating a security event manager associated by reference with the security object and creating security event definitions associated by reference with the security event manager.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040054931
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method, receiving a calendar security control message from a calendar application, receiving a request for access to the resource, and determining access to the resource in dependence upon the calendar security control message.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Banjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040052355
    Abstract: An apparatus, system and method of auto-completing a pre-stored number being manually dialed by a user to make a phone call are provided. When a first digit of the number is entered, the digit is compared with first digits of pre-stored numbers to determine whether there is a match. If there is a match, the number whose digit matched the digit entered is provided to the user. The user may use the provided number to make the phone call or may continue to enter digits of the number. If there is not a match, the user will have to continue enter the number. When the number is used, it is automatically stored for future use. Instead of entering digits of a number, the user may enter letters of a name. As before, if the first letter entered matches a first letter of a pre-stored name, the name will be provided to the user. If the user indicates that the provided name is the desired name, a number associated with the name will be dialed to complete the phone call.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: International Business Machines Corporation
    Inventors: Faisal M. Awada, Herman Rodriguez, Newton James Smith
  • Publication number: 20040054790
    Abstract: Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and security methods, wherein the security control data includes security object management security control data and the security methods include at least one security object management method; receiving a request for management access to the security object; receiving security object management security request data; and determining management access to the security object in dependence upon the security object management security control data and the security object management security request data.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Andrew Himmel, Maria Azua Himmel, Herman Rodriguez, Newton James Smith
  • Publication number: 20040054732
    Abstract: An alternative method, system and apparatus for addressing an e-mail message are provided. The alternative method, system and apparatus include using a physical location to address the e-mail message. The physical location may be a street address; however, whether a physical location or a street address is used, Global Positioning System (GPS) coordinates are used to forward the message to its destination. The message may include a range outside of which it is not retrievable. The message may further include a maximum number of recipients that may retrieve it as well as a time span outside of which it is not retrievable.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: International Business Machines Corporation
    Inventors: William Stephen Carter, Herman Rodriguez, Hypatia Rojas, Newton James Smith
  • Publication number: 20040054731
    Abstract: A system, apparatus and method of delivering an e-mail message to a recipient are provided. Before a message is delivered to a recipient, a determination is made as to whether the recipient is within a particular range from a physical location to which the message was sent. The range may be a default range or one specified by the sender of the message. If the user is within the range, the e-mail message is delivered to the recipient; otherwise, it is not.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: International Business Machines Corporation
    Inventors: William Stephen Carter, Herman Rodriguez, Hypatia Rojas, Newton James Smith
  • Publication number: 20040054730
    Abstract: A method, system and apparatus for receiving e-mail messages sent to physical locations are provided. To receive an e-mail message sent to a physical location, a recipient must be within a range from the physical location. The range may be a default range or may be specifically identified by a sender in the message. Furthermore, although the recipient may be within the range identified in the message, the recipient may still not receive the message if a time-span within which the content of the message is current has elapsed.
    Type: Application
    Filed: September 12, 2002
    Publication date: March 18, 2004
    Applicant: International Business Machines Corporation
    Inventors: William Stephen Carter, Herman Rodriguez, Hypatia Rojas, Newton James Smith
  • Patent number: 6704034
    Abstract: A method and apparatus in a data processing system for presenting a set of objects within the data processing system. Responsive to detecting movement of a pointer over an object within the set of objects, an object type is identified for the object. Presentation of the object is then magnified based on the object type.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: March 9, 2004
    Assignee: International Business Machines Corporation
    Inventors: Herman Rodriguez, Newton James Smith, Jr., Clifford Jay Spinac
  • Patent number: 6697607
    Abstract: A broadcast receiver such as a radio, television, or web browser, which automatically tunes to a preselected signal source upon initialization for a predetermined period of time. During this period of time, the user of the system may receive useful information or directions, such as directions to exit an airport or train station, instructions to orient a new user with a rental car or rental receiver, news, traffic reports, weather reports, instructions regarding hotel facilities or check-in and check-out procedures. In an enhanced form of the invention, the receiver may be automatically tuned to a series of signal sources on a timed basis. Upon conclusion of the predetermined time interval, the radio is optionally re-tuned to a user's preferred radio station or the last signal source which was tuned prior to shut off.
    Type: Grant
    Filed: November 3, 2000
    Date of Patent: February 24, 2004
    Assignee: International Business Machines Corporation
    Inventors: Newton James Smith, Jr., Herman Rodriguez, Clifford Jay Spinac
  • Patent number: 6693545
    Abstract: A method and system that allows individuals to transmit an alarm signal from a personal alarm device having a keypad, programmable register, a transmitter, and electrical power source. The keypad facilitates entry of a call-back telephone number into a programmable memory register and triggering the transmission of an alarm signal. The alarm signal is transmitted to a central alarm monitoring server that processes the alarm signal and initiates the necessary actions, including notifying relevant emergency response authorities and selectively contacting the individual at the call-back telephone number, if provided, or at a telephone number previously stored in a user preferences database in association with the user's account. The personal alarm device may have either normal and duress alarm buttons or have a keypad for entry of either a normal PIN code or a duress PIN code.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: February 17, 2004
    Assignee: International Business Machines Corporation
    Inventors: Michael Wayne Brown, Rabindranath Dutta, Michael A. Paolini, Newton James Smith, Jr.
  • Patent number: 6685087
    Abstract: A method, computer program and system for alerting authorities during a transaction card authorization process, that a crime is in progress without alerting the perpetrator that an alert has been given. During a transaction card authorization process, the vendor attaches a code to the vendor identification sent to the authorization center. The code may be a normal code or a duress code. In either situation, the entered code is compared to the stored duress code. If a duress code has been entered, then the authorities are notified and the account transaction is approved, although at a slower rate than normal to provide authorities time to respond. Any attempt to contact the person under duress is delayed to avoid tipping off the perpetrator that an alarm has been sent.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: February 3, 2004
    Assignee: International Business Machines Corporation
    Inventors: Michael Wayne Brown, Rabindranath Dutta, Michael A. Paolini, Newton James Smith, Jr.
  • Patent number: 6679422
    Abstract: An automatic teller system and a method of operating the system wherein the system can receive a personalized normal PIN or duress PIN from a user. If the user enters the duress PIN, the system determines that it is a duress PIN and actuates a silent alarm to notify authorities of the possible crime. The system will then simulate a normal transaction, perhaps with a reduced maximum withdrawal amount, so as to not alert a thief or potential thief that the alarm has been actuated, while dispensing bills marked with special ink that is visible only when viewed under special light. Also, the serial numbers of the bills dispensed under duress are recorded by the automatic teller system and automatically communicated to authorities. Under duress conditions, it is preferable that the monitoring of the ATM be enhanced.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: January 20, 2004
    Assignee: International Business Machines Corporation
    Inventors: Michael Wayne Brown, Rabindranath Dutta, Michael A. Paolini, Newton James Smith, Jr.
  • Publication number: 20040001090
    Abstract: A method, system, and program for indicating a reaction response associated with the content of a communication to provide a context for the communication are provided. The content of a communication and the reaction responses to a communication provide the context for a communication. Varying portions of the content of a communication are analyzed to identify a particular reaction response associated with each of the varying portions of content. During a display of the content of the communication, a color within any of the varying portions indicates the associated reaction response. A reaction response may indicate a sender's intended response or an anticipated or actual response of a recipient. The colors may be added to a proposed communication and edited by a sender to achieve a particular desired response.
    Type: Application
    Filed: June 27, 2002
    Publication date: January 1, 2004
    Applicant: International Business Machines Corporation
    Inventors: Michael Wayne Brown, Michael A. Paolini, Newton James Smith
  • Publication number: 20040001086
    Abstract: A method, system, and program for sampling responses to communication content for use in analyzing reaction responses to other communications are provided. Responses specified by a user to varying portions of the content of a communication are gathered. These specified responses are then stored in a database according to the types of content responded to, wherein the stored responses are then accessible for use in determining reaction responses by the user in another communication comprising at least one of the types of content. In particular, the communication may include sample content to which a response is requested. Further, the communication may include a proposed communication or a transmitted communication.
    Type: Application
    Filed: June 27, 2002
    Publication date: January 1, 2004
    Applicant: International Business Machines Corporation
    Inventors: Michael Wayne Brown, Michael A. Paolini, Newton James Smith
  • Publication number: 20030236979
    Abstract: Controlling access to a resource for a group of users including creating a group security object in dependence upon one or more user-selected group security control data types, the group security object comprising security control data and at least one security method, the security control data comprising at least one security control user identification; receiving a request for access to the resource; receiving security request data, wherein the security request data includes at least one security request user identification; and determining access to the resource in dependence upon the security control data and the security request data.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20030236996
    Abstract: Temporal control of access to a resource including creating a security object in dependence upon user-selected temporal security control data types, the security object comprising temporal security control data and at least one security method; receiving a request for access to the resource; receiving temporal security request data; and determining access to the resource in dependence upon the temporal security control data and the temporal security request data. Embodiments include storing in the security object a resource identification for the resource; storing in the security object user-selected temporal security control data types; and storing in the security object temporal security control data for each user-selected temporal security control data type. Some embodiments grant access to resources if a maximum allowable number of invocations is greater than a count of invocations. Some embodiments grant access if the time when a security object is invoked is within a validity period.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20030237006
    Abstract: Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
    Type: Application
    Filed: June 24, 2002
    Publication date: December 25, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maria Azua Himmel, Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Patent number: 6651173
    Abstract: For events scheduled within a user's calendar, a security mode is associated with the event. At the start of the scheduled event, the calendar notifies the security module of the security mode and the security mode is initiated. Different security modes may be defined, such as locking the system indefinitely, until the user unlocks the system with the password, locking the system for the duration of the event, or setting a shorter or longer inactivity period for a timer activated lock. Different event types may thus be matched with appropriate security modes, providing better overall security. The security mode, once initiated, may be maintained until the end of the schedule event, at which time the system may revert to a default security mode. Alternatively, the security mode may, by user specification or by default, be maintained until a different security mode is requested by the user, utilizing a password.
    Type: Grant
    Filed: June 30, 1999
    Date of Patent: November 18, 2003
    Assignee: International Business Machines Corporation
    Inventors: Herman Rodriguez, Newton James Smith