Patents by Inventor Scott Abedi

Scott Abedi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060135121
    Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. The data processing system includes a boundary controller for determining whether the wireless device has entered the secured zone. If the wireless device has entered the secured zone, a security controller queries the wireless device to determine whether the software stored on the wireless device has been subjected to unauthorized alteration. If the software has not been subjected to unauthorized alteration, the security controller enables the wireless device for operation within the secured zone.
    Type: Application
    Filed: December 21, 2004
    Publication date: June 22, 2006
    Inventors: Scott Abedi, Roger Abrams, Ryan Catherman, James Hoff, James Rutledge
  • Publication number: 20060133612
    Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.
    Type: Application
    Filed: December 21, 2004
    Publication date: June 22, 2006
    Inventors: Scott Abedi, Roger Abrams, Ryan Catherman, James Hoff, James Rutledge
  • Publication number: 20060129832
    Abstract: A logon process to a computer is amended by providing an apparatus and routine which allow a user to verify that a request for the user to insert a password in a dialog box is issued by a legitimate program. As a consequence the invention improves computer system security and makes it much more difficult for rouge programs to gain access to critical and confidential user's information, such as password or the like.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Scott Abedi, James Hoff, Matthew Lietzke, Charles Oxrieder, Peter Wetsel
  • Publication number: 20060100926
    Abstract: A method and system for transmitting marketing messages, such as advertisements and/or coupons, to shoppers in a store. The marketing messages are transmitted by a low-power line-of-sight transmitter which is positioned in a specific predetermined product area. After determining the identity of a passing shopper, a tailored marketing message is sent to a wireless device being used by the passing shopper. A determination is made as to how long the marketing message was displayed on the wireless device and whether the shopper responded to the marketing message by purchasing a product that is targeted by the marketing message. Since the line-of-sight transmitter is low-power, there is no reflective bleed-over of a carrier signal for the marketing message. Since the marketing message is specifically limited to passing shoppers within a tightly defined area, the assessment of a fee charged to an advertiser for transmitting the marketing message is more exact.
    Type: Application
    Filed: November 11, 2004
    Publication date: May 11, 2006
    Applicant: International Business Machines Corp.
    Inventors: Scott Abedi, Thomas Prorock, James Rutledge
  • Publication number: 20050283683
    Abstract: Operating parameters and potentially related malfunctions are gathered from end users of computer systems and used to develop a best practices profile. The profile can be used to automatically alter the operating parameters of a user computer.
    Type: Application
    Filed: June 8, 2004
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventors: Scott Abedi, Daryl Cromer, Brian Killebrew, Joseph Laltrello, Alan Painter, James Rutledge, Tin-Lup Wong
  • Publication number: 20050273349
    Abstract: Operating parameters and potentially related malfunctions are gathered from end users of computer systems and used to develop models which can be used to subsequently establish warranty costs for customer computers based on their actual usage.
    Type: Application
    Filed: June 8, 2004
    Publication date: December 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Scott Abedi, Brian Killebrew, Joseph Laltrello, Alan Painter, Stephen Rutledge, Tin-Lup Wong