Patents by Inventor Randolph Forlenza

Randolph Forlenza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060155782
    Abstract: Systems, methods and media for determining and aggregating electronic document segment usage information from different versions of a document are disclosed. More particularly, hardware and/or software for determining the aggregate segment usage for an electronic document received from one or more users are disclosed. Embodiments include receiving from one or more users an indication of their usage of segments of different versions of the electronic document, aggregating the segment usage indications received, and creating document utilization information for the electronic document. Further embodiments include transmitting the document utilization information to one or more users. Other embodiments include displaying to the user an electronic document and indications of the document utilization information. Electronic documents may be in PDF format, HTML format, etc.
    Type: Application
    Filed: January 11, 2005
    Publication date: July 13, 2006
    Inventors: Viktors Berstis, Randolph Forlenza
  • Publication number: 20060150712
    Abstract: The invention concerns a method and apparatus for indicating a parameter of a transmitted fluid. One embodiment of the invention comprises a fluid source operatively coupled to a conduit for transmitting a fluid from the fluid source. In addition, a sensor detects a parameter of the fluid, such as the percent oxygen content of the fluid. In response to the sensor detecting the parameter of the fluid, an indicator illuminates a portion of the conduit if a predetermined condition, such as a minimum percent oxygen content of the fluid, is satisfied.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Inventors: Viktors Berstis, Michael Carlson, Yen-Fu Chen, John Dunsmoir, Randolph Forlenza, John Kaemmerer, Francis Kinstler, Sheryl Kinstler
  • Publication number: 20060155670
    Abstract: A method and a computer program product that enable files in a file directory to be queued or marked prior to “sending” the files to a common application. A background operating system (OS) is enhanced by including a set of queue functions/options for selection when a file is selected within a file directory. Among these additional functions/options are “Queue It”, “Queue Edit”, and “Queue Send To.” These queue functions each represent an action item that may be selected to carry out a specific function/operation on/with one or more pre-selected (or queued) files. The “Queue It” function allows the user to mark one or more file(s) or add the file's location and other parameters to a queue. When there is at least one file in the queue, the “Queue Edit” function allows the user to view, sort, and delete files in the queue. Finally, the “Queue Send To” function triggers the import of the queued and/or selected files into the selected application.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Inventors: Randolph Forlenza, John Kaemmerer
  • Publication number: 20060152908
    Abstract: A brick apparatus for use with a mobile computer includes a chassis having a connection panel and means for attaching the connection panel to a connection panel of the mobile computer. A power transformer is located within the chassis to produce a DC signal from an AC input. A retractable power cord of the brick is connected at one end to the transformer and connectable at a second end to an AC outlet. A DC power pin connected to the DC signal of the power transformer is positioned to engage a DC power jack of the mobile computer when the apparatus is attached to the mobile computer panel. The apparatus may further include a retractable locking cable and retractable network connections. The apparatus may include pass through connectors to provide external access to connectors of the mobile computer rear panel and a battery to provide power to the mobile computer.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Inventors: Viktors Berstis, Randolph Forlenza, John Kaemmerer
  • Publication number: 20060152759
    Abstract: A user connected to a remote printer can choose to activate a print-monitoring feature of the printer as part of the submitted print job. As the job begins to print, the output of the printer is monitored for print quality. If an event occurs during the print job that affects the print job, the user receives real-time notification of the status of the print job. The events can be printer related such as paper jam or print job related such as poor print quality. The user can have an option of reviewing various parts of the print job during the printing process. There can also be an automatic print job out evaluation. If the user accepts the print quality, the printer will continue printing the job. If the user is not satisfied with the print quality, the job is halted and sent to a temporary print buffer. While the job is halted, adjustments are made to either the printer to improve print quality or to the print parameters of the print job to improve print quality.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Inventors: Yen-Fu Chen, Randolph Forlenza, John Kaemmerer
  • Publication number: 20060152757
    Abstract: An arrangement is provided wherein a printer used with a host device is operated to generate print batch separator pages using the same blank sheets as are used to print respective pages of successive print jobs. The printer is directed to print a visually distinctive graphic indicator, such as a separator border, trim, header, visible banner or other visual indicator or markings. This eliminates the need for an additional printer separator page tray. Usefully, a host device is operated to generate a separator command in a specified PDL language. A printer control device receives the page separator PDL command, and software contained in the printer control converts the PDL command into a printer readable format (PRF). A printer component responsive to the PRF command then operates the printer to print the specified separator page.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Inventors: Randolph Forlenza, John Kaemmerer
  • Publication number: 20060048061
    Abstract: Systems, methods and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based on receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc.
    Type: Application
    Filed: August 26, 2004
    Publication date: March 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, John Kaemmerer
  • Publication number: 20050278277
    Abstract: The invention disclosed is a method and apparatus for propagating database tables while preserving foreign key integrity. The invention comprises an improved method of storing subscription sets that enables a user to assign a rank to a subscription set and to each member of the set, and an improved database propagation program that uses the ranks to determine the order in which to propagate database tables. In the preferred embodiment, subscription sets are stored in a subscription table and subscription members are stored in a member table. The preferred embodiment database propagation program further comprises a CAPTURE program and an APPLY program, wherein CAPTURE monitors a database for changes and APPLY propagates data from member tables in the subscription sets.
    Type: Application
    Filed: May 27, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, Raghuraman Kalyanaraman
  • Publication number: 20050273596
    Abstract: A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.
    Type: Application
    Filed: May 20, 2004
    Publication date: December 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Messaoud Benantar, Yen-Fu Chen, John Dunsmoir, Randolph Forlenza, Wei Liu, Sandra Schlosser
  • Publication number: 20050254639
    Abstract: The present invention creates a method, apparatus and system by which a telephone unit volume control provides instantaneous coupling to and controlling of a connected telephone unit's microphone gain and noise cancellation circuitry. With this invention, an increase in the volume control on the first unit, will result in an automatic adjustment of the second unit's microphone gain control. This microphone gain adjustment is an amount corresponding to the adjustment of the volume of the first unit. The noise cancellation circuitry on the second unit is adjusted to filter more of the background noise before transmission instead of after the receipt of the signal at the destination telephone.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Herman Rodriguez, Randolph Forlenza
  • Publication number: 20050246526
    Abstract: The present invention allows the viewer of a document to select certain portions of an encrypted document for decryption and optionally re-encryption while other portions of the document remain encrypted or as originally created. In this decryption process, the user would use a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to decrypt. The highlighted area would then be ‘tagged’ with a surrounding attribute indicating that the highlighted area is to be decrypted. This process is similar to the existing word processor capability to highlight areas on a document and then assign rich text attributes, such as BOLD, ITALICS, etc., to those areas.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, Viktors Berstis
  • Publication number: 20050235163
    Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document.
    Type: Application
    Filed: April 15, 2004
    Publication date: October 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, Viktors Berstis
  • Publication number: 20050188420
    Abstract: A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.
    Type: Application
    Filed: February 19, 2004
    Publication date: August 25, 2005
    Applicant: International Business Machines Corporation
    Inventors: Messaoud Benantar, Yen-Fu Chen, John Dunsmoir, Randolph Forlenza, Wei Liu, Sandra Schlosser
  • Publication number: 20050185046
    Abstract: The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
    Type: Application
    Filed: February 19, 2004
    Publication date: August 25, 2005
    Applicant: International Business Machines Corporation
    Inventors: Yen-Fu Chen, Randolph Forlenza, John Kaemmerer, Raghuraman Kalyanaraman
  • Publication number: 20050136987
    Abstract: A method and implementing system are provided in which a telephone unit or other telecommunications unit is programmed to transmit codes to a receiving telecommunications unit which has a vibration capability. Individuals are enabled to transmit response signals which are effective to cause predetermined vibration patterns in the receiving unit of a hearing-impaired individual. Such vibration patterns are predefined to represent predetermined answers. The vibration patterns are readily felt and interpreted by hearing-impaired and other individuals.
    Type: Application
    Filed: December 18, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, Herman Rodriguez
  • Publication number: 20050091499
    Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. This process is similar to the existing word processor capability to highlight areas on a document and then assign rich text attributes, such as BOLD, ITALICS, etc., to those areas. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
    Type: Application
    Filed: October 23, 2003
    Publication date: April 28, 2005
    Applicant: International Business Machines Corporation
    Inventors: Randolph Forlenza, Viktors Berstis
  • Publication number: 20050044380
    Abstract: An example of a solution provided here comprises registering a first restricted application with at least one additional restricted application, and in response to a user performing only a single sign-on for the first restricted application, providing access to the first restricted application for the user, presenting to the user information identifying the at least one additional restricted application, and in response to the user's selection, providing access to the at least one additional restricted application.
    Type: Application
    Filed: August 21, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: James Bostick, Randolph Forlenza, Pradeep Nambiar