Patents by Inventor Sastry S. Duri
Sastry S. Duri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7369051Abstract: A method for using a radio frequency identification (RFID) system including a transponder, an antenna, and a reader, the antenna coupled to the reader, the antenna and the reader for transmitting a radio signal to the transponder and for receiving a response radio signal from the transponder, the response radio signal including data from the transponder, the method including: selecting a curtain that limits propagation of the radio signal; and placing the curtain in an area through which the radio signal would otherwise propagate; wherein the curtain includes a plurality of flexible strips transparent to visible light, the long edge of each of the strips is oriented in substantially the vertical direction, more than one strip overlaps a portion of the width of an adjacent strip along the length of the adjacent strip, and the length of each of the strips is substantially greater than the width of each of the strips.Type: GrantFiled: November 9, 2007Date of Patent: May 6, 2008Assignee: International Business Machines CorporationInventors: Steven V. De Gennaro, Sastry S. Duri, Paul A. Moskowitz
-
Patent number: 7353532Abstract: The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.Type: GrantFiled: August 30, 2002Date of Patent: April 1, 2008Assignee: International Business Machines CorporationInventors: Sastry S. Duri, Xuan Liu, Paul A. Moskowitz, Ronald Perez, Edith G. Schonberg, Moninder Singh, Charles P. Tresser
-
Patent number: 7308275Abstract: Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.Type: GrantFiled: September 25, 2006Date of Patent: December 11, 2007Assignee: International Business Machines CorporationInventors: Alan George Cole, Sastry S. Duri, Vineet Kumar Gupta, Jonathan Paul Munson, David Alvra Wood, III
-
Patent number: 7274941Abstract: It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service are redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service. The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service are redirected to another information service when properties of the new information service are determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.Type: GrantFiled: January 27, 2006Date of Patent: September 25, 2007Assignee: International Business Machines CorporationInventors: Alan George Cole, Sastry S. Duri, Jonathan Paul Munson, John S. Murdock, Jr.
-
Patent number: 7136658Abstract: Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.Type: GrantFiled: December 10, 2002Date of Patent: November 14, 2006Assignee: International Business Machines CorporationInventors: Alan George Cole, Sastry S. Duri, Vineet Kumar Gupta, Jonathan Paul Munson, David Alvra Wood, III
-
Patent number: 6970826Abstract: A system and method for handling the return of items supplied by a store. The method entails building a list of items to be returned on a local computing device. The list is sent to a remote server that handles returns for the store. The remote server returns a confirmation of the items that are returnable and/or of items that are not returnable. As the list is built, each item is compared to a return policy of the store and added to the list only if the item qualifies as returnable. The method also allows for requesting the store to honor the return of items that do not qualify for return. Provision is also made for scheduling pickup of items to be returned.Type: GrantFiled: June 5, 2001Date of Patent: November 29, 2005Assignee: International Business Machines CorporationInventors: James E. Christensen, Sastry S. Duri, Paul A. Moskowitz, John S. Murdock, Jr.
-
Publication number: 20040267410Abstract: A method of sharing telematics data for a vehicle with service providers can include receiving the telematics data for the vehicle, where the telematics data dynamically changes over time, and comparing the telematics data with a privacy policy associated with the vehicle. The privacy policy can specify rules for selectively releasing items of the telematics data to one or more service providers. Data items of the telematics data can be selectively provided to the service providers according to the comparing step.Type: ApplicationFiled: June 24, 2003Publication date: December 30, 2004Applicant: International Business Machines CorporationInventors: Sastry S. Duri, Jeffrey G. Elliott, Xuan Liu, Paul A. Moskowitz, George V. Salmi, Moninder Singh, Jung-Mu Tang
-
Publication number: 20040203892Abstract: Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.Type: ApplicationFiled: December 10, 2002Publication date: October 14, 2004Applicant: International Business Machines CorporationInventors: Alan George Cole, Sastry S. Duri, Vineet Kumar Gupta, Jonathan Paul Munson, David Alvra Wood
-
Publication number: 20040203891Abstract: It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service are redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service. The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service are redirected to another information service when properties of the new information service are determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.Type: ApplicationFiled: December 10, 2002Publication date: October 14, 2004Applicant: International Business Machines CorporationInventors: Alan George Cole, Sastry S. Duri, Jonathan Paul Munson, John S. Murdock
-
Publication number: 20040117220Abstract: A customer relationship management (CRM) system in which customer data can be dynamically controlled by the customer. The CRM system may reside on a server that is accessible by a plurality of customers of a business and a customer service representative (CSR) of the business, and comprise: a database for storing data for each of the plurality of customers related to interactions with the business; a customer interface that allows each customer to access customer specific data; a data subset identification system that allows the customer to identify a subset of the customer specific data; and a CSR interface that allows the CSR to view only the subset of customer specific data.Type: ApplicationFiled: December 12, 2002Publication date: June 17, 2004Applicant: International Business Machines CorporationInventors: Catherine A. Chess, Sastry S. Duri, Paul A. Moskowitz, Ronald Perez, Charles P. Tresser
-
Publication number: 20040054918Abstract: The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.Type: ApplicationFiled: August 30, 2002Publication date: March 18, 2004Applicant: International Business Machines CorporationInventors: Sastry S. Duri, Marco O. Gruteser, Xuan Liu, Paul A. Moskowitz, Ronald Perez, Edith G. Schonberg, Moninder Singh, Jung-Mu Tang, Charles P. Tresser
-
Publication number: 20040054919Abstract: The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.Type: ApplicationFiled: August 30, 2002Publication date: March 18, 2004Applicant: International Business Machines CorporationInventors: Sastry S. Duri, Xuan Liu, Paul A. Moskowitz, Ronald Perez, Edith G. Schonberg, Moninder Singh, Charles P. Tresser
-
Publication number: 20020184106Abstract: A system and method for handling the return of items supplied by a store. The method entails building a list of items to be returned on a local computing device. The list is sent to a remote server that handles returns for the store. The remote server returns a confirmation of the items that are returnable and/or of items that are not returnable. As the list is built, each item is compared to a return policy of the store and added to the list only if the item qualifies as returnable. The method also allows for requesting the store to honor the return of items that do not qualify for return. Provision is also made for scheduling pickup of items to be returned.Type: ApplicationFiled: June 5, 2001Publication date: December 5, 2002Applicant: International Business Machines CorporationInventors: James E. Christensen, Sastry S. Duri, Paul A. Moskowitz, John S. Murdock
-
Publication number: 20020156832Abstract: A method, apparatus, and computer implemented instructions for managing bookmarks. In response to detecting a service domain with a dynamic bookmark service, a client device sends a request containing criteria identifying a dynamic bookmark to the service domain. In these examples, the dynamic bookmark contains attributes or criteria that may be used to bind or locate regular bookmarks having similar attributes or criteria. The request is received by a server, which queries a data structure using the criteria for a bookmark, corresponding to or matching the criteria, to generate a result. This result is returned in a response to the client. The client processes any bookmarks received in the response, wherein any bookmarks returned in the request are bookmarks matching the dynamic bookmark.Type: ApplicationFiled: April 18, 2001Publication date: October 24, 2002Applicant: International Business Machines CorporationInventors: Sastry S. Duri, James Edward Christensen, Alan George Cole, Paul Andrew Moskowitz