Patents by Inventor Randolph Michael Forlenza
Randolph Michael Forlenza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7855800Abstract: An arrangement is provided wherein a printer used with a host device is operated to generate print batch separator pages using the same blank sheets as are used to print respective pages of successive print jobs. The printer is directed to print a visually distinctive graphic indicator, such as a separator border, trim, header, visible banner or other visual indicator or markings. This eliminates the need for an additional printer separator page tray. Usefully, a host device is operated to generate a separator command in a specified PDL language. A printer control device receives the page separator PDL command, and software contained in the printer control converts the PDL command into a printer readable format (PRF). A printer component responsive to the PRF command then operates the printer to print the specified separator page.Type: GrantFiled: June 6, 2008Date of Patent: December 21, 2010Assignee: International Business Machines CorporationInventors: Randolph Michael Forlenza, John Paul Kaemmerer
-
Patent number: 7821424Abstract: An asset is located in a facility via triangulation. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the base is monitored for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset determined by triangulation using the locators.Type: GrantFiled: November 10, 2008Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Yen-Fu Chen, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Patent number: 7791502Abstract: The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.Type: GrantFiled: July 17, 2008Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventors: Yen-Fu Chen, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Patent number: 7788710Abstract: A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.Type: GrantFiled: June 27, 2008Date of Patent: August 31, 2010Assignee: International Business Machines CorporationInventors: Messaoud Benantar, Yen-Fu Chen, John W. Dunsmoir, Randolph Michael Forlenza, Wei Liu, Sandra Juni Schlosser
-
Publication number: 20090249083Abstract: In the method of the present invention, a customer of a service provider would be placed in hold while waiting to speak to a customer service representative. The method and system of the invention would recognize the telephone number of the caller using a “caller ID” system. If this call is the first time the caller has ever called, the caller would be presented with an audible listing of listening choices that would include but not be limited to the latest news, the weather (of the caller's location), financial headlines, or a selection of music stations (via cable radio, for example). The caller would then speak or type his/her preference into the keypad and the selection would be played. If the caller does not like the selection, the caller can then speak another selection or type the new selection as many times as the caller prefers. The caller selection is recorded in a caller preference database.Type: ApplicationFiled: June 9, 2008Publication date: October 1, 2009Inventors: Randolph Michael Forlenza, Viktors Berstis
-
Publication number: 20090217308Abstract: Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for system startup with applications using configurable options. In one illustrative embodiment, the computer implemented method comprises obtaining a set of application entries and determining whether a set of property entries exist for the set of application entries. Having identified entries of the set of application entries to form a set of identified applications and responsive to determining the set of property entries exist, applying respective entries of the set of property entries to the set of identified applications, and conditionally starting the set of identified applications.Type: ApplicationFiled: February 22, 2008Publication date: August 27, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Edward Bostick, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Publication number: 20090204810Abstract: A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.Type: ApplicationFiled: March 25, 2009Publication date: August 13, 2009Applicant: International Business Machines CorporationInventors: Messaoud Benantar, Yen-Fu Chen, John W. Dunsmoir, Randolph Michael Forlenza, Wei Liu, Sandra Juni Schlosser
-
Patent number: 7551563Abstract: A system for routing different data types along different client-to-network connection paths. A connection utility, at the client, monitors a data type being transmitted. When a first data type is being transmitted, the connection utility selects a most optimal (or efficient) connection route for that data type. The connection utility then assigns a next connection route for a second data type with different characteristics and/or routing requirements than the first data type. Differences in routing path that are factored into the criteria for selection include: wired versus wireless, level of security, transfer protocol, connection cost, speed, etc.Type: GrantFiled: May 5, 2004Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: Bruce A. Beadle, Michael Wayne Brown, Randolph Michael Forlenza, Douglas Scott Rothert, Miguel Sang
-
Patent number: 7525074Abstract: A method, apparatus, and computer usable program code for detecting a presence of metal objects placed in a microwave cooking unit. A metal detection unit is activated to scan for the presence of a metal object placed into a cooking area of the microwave cooking unit. In response to receiving an indicator of the presence of a metal object from the metal detection unit, the process generates an alert indicating the presence of the metal object.Type: GrantFiled: May 31, 2006Date of Patent: April 28, 2009Assignee: International Business Machines CorporationInventors: James Edward Bostick, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman, Courtney Joseph Spooner
-
Publication number: 20090102721Abstract: The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.Type: ApplicationFiled: November 10, 2008Publication date: April 23, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yen-Fu Chen, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Patent number: 7519812Abstract: A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.Type: GrantFiled: February 19, 2004Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Messaoud Benantar, Yen-Fu Chen, John W. Dunsmoir, Randolph Michael Forlenza, Wei Liu, Sandra Juni Schlosser
-
Publication number: 20090063677Abstract: Systems and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based oh receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments, include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc.Type: ApplicationFiled: May 28, 2008Publication date: March 5, 2009Inventors: Randolph Michael Forlenza, John Paul Kaemmerer
-
Publication number: 20090037731Abstract: A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.Type: ApplicationFiled: June 27, 2008Publication date: February 5, 2009Inventors: Messaoud Benantar, Yen-Fu Chen, John W. Dunsmoir, Randolph Michael Forlenza, Wei Liu, Sandra Juni Schlosser
-
Patent number: 7484107Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document.Type: GrantFiled: April 15, 2004Date of Patent: January 27, 2009Assignee: International Business Machines CorporationInventors: Randolph Michael Forlenza, Viktors Berstis
-
Patent number: 7477163Abstract: The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.Type: GrantFiled: February 19, 2004Date of Patent: January 13, 2009Assignee: International Business Machines CorporationInventors: Yen-Fu Chen, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Publication number: 20080278348Abstract: The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.Type: ApplicationFiled: July 17, 2008Publication date: November 13, 2008Inventors: Yen-Fu Chen, Randolph Michael Forlenza, John Paul Kaemmerer, Raghuraman Kalyanaraman
-
Publication number: 20080275871Abstract: Systems and media for utilizing electronic document usage information are disclosed. More particularly, hardware and/or software utilizing electronic document usage information to respond to user search requests with search engines are disclosed. Embodiments include receiving a search request from a requesting user and receiving document utilization information associated with one or more electronic documents, where the document utilization information provides an indication of the usage of the electronic documents by one or more users. Further embodiments include generating search results based at least partially on the search request and the document utilization information and transmitting an indication of the search results to the requesting user. Further embodiments include generating statistical information regarding the search results for electronic documents and transmitting the generated statistical information.Type: ApplicationFiled: July 1, 2008Publication date: November 6, 2008Applicant: International Business Machines CorporationInventors: Viktors Berstis, Randolph Michael Forlenza
-
Publication number: 20080270807Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be tagged with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document.Type: ApplicationFiled: June 9, 2008Publication date: October 30, 2008Inventors: Randolph Michael Forlenza, Viktors Berstis
-
Patent number: 7437381Abstract: Methods, systems, and media are disclosed for accessing one or more parts of an electronic document. In one embodiment, the method includes choosing, with a selecting device, the electronic document, and for receiving document utilization information for the electronic document. Further, the method includes displaying, on the computer, the electronic document and the document utilization information as an interactive graphical representation comprising a set of points, wherein each point in the set corresponds to both a different part of the electronic document and any of the document utilization information associated with the different part. Further still, the method includes selecting, with the selecting device, at least one point in the set, and opening, on the computer, to the part of the electronic document associated with the point selected by the selecting device.Type: GrantFiled: January 11, 2005Date of Patent: October 14, 2008Assignee: International Business Machines CorporationInventors: Viktors Berstis, Randolph Michael Forlenza
-
Patent number: 7433866Abstract: Systems, methods and media for awarding credits based on provided usage information are disclosed. More particularly, hardware and/or software for collecting and disseminating usage information related to electronic documents and for awarding usage credits to users in exchange for providing usage information are disclosed. Embodiments include receiving an indication of the usage of an electronic document by a user and aggregating the received usage indication for the document with usage indications relating to other users. Embodiments may also include creating document utilization information for the electronic document based on the aggregated usage indications and awarding usage credit to the user based on the user's providing statistics on the usage of the electronic document. Further embodiments may include transmitting an indication of the awarded usage credit to the user and receiving a request to use the usage credits.Type: GrantFiled: January 11, 2005Date of Patent: October 7, 2008Assignee: International Business Machines CorporationInventors: Viktors Berstis, Randolph Michael Forlenza