Patents by Inventor Shivnath Dutta
Shivnath Dutta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9830465Abstract: An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to determining that the mobile device has left the secure area and in response to having completed copying the file from the mobile device to the secure server.Type: GrantFiled: April 6, 2016Date of Patent: November 28, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert T Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V Mendoza
-
Publication number: 20160232367Abstract: An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to determining that the mobile device has left the secure area and in response to having completed copying the file from the mobile device to the secure server.Type: ApplicationFiled: April 6, 2016Publication date: August 11, 2016Inventors: Robert T. Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V. Mendoza
-
Patent number: 9378378Abstract: An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.Type: GrantFiled: July 28, 2014Date of Patent: June 28, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert T Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V Mendoza
-
Publication number: 20160182599Abstract: In a VOIP teleconference, the conference is monitored for speech distortion in either received or transmitted audio speech. Responsive to such distortion, a voice to text conversion is displayed on appropriate receiving terminals only for the time period of the audio speech distortion.Type: ApplicationFiled: March 1, 2016Publication date: June 23, 2016Inventors: Robert Thomas Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V. Mendoza
-
Publication number: 20160026800Abstract: An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.Type: ApplicationFiled: July 28, 2014Publication date: January 28, 2016Inventors: Robert T Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V Mendoza
-
Publication number: 20130179064Abstract: A portable electronic device receives wireless signals from an external signal-generating source. The wireless signals include offering identifiers that are associated with an offering at a location of the external signal-generating source. The portable electronic device may determine the offering identifier from the wireless signal, and match the offering identifier with one or more offerings of interest that are selected by the user. The portable electronic device may determine the direction from which the wireless signal is received based on the strength of the wireless signal received by the antenna, and presenting an indicator to the user that indicates the direction to the location of the external signal-generating source if the offering identifier matches one or more of the offerings of interest as selected by the user.Type: ApplicationFiled: January 6, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert T. Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V. Mendoza
-
Publication number: 20110314421Abstract: A method for activating objects displayed on a touch screen by using a finger of a user. The method includes the steps of displaying one or more objects on the touch screen, detecting an activation event of a specific one of the one or more objects caused by the user touching the specific object, and displaying a first peripheral zone around the specific object. The peripheral zone contains a plurality of regions each for allowing the selection or activation of a function underlying the specific object by finger touch of the user.Type: ApplicationFiled: June 18, 2010Publication date: December 22, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert T. Arenburg, Franck Barillaud, Bradford L. Cobb, Shivnath Dutta
-
Patent number: 7978097Abstract: A method, medium and implementing processing system are provided in which the presence of workers in a long highway construction zone is monitored and the electronically-controlled posted speed limit is adjusted in accordance with the detected presence of workers in the immediate area. In an example, Radio Frequency Identification (RFID) scanners or readers are strategically placed in a construction or working area. Such RFID reading devices may be embedded, for example, in construction speed limit signs. The displayed speed limit is controlled by the detected proximity of construction workers wearing RFID-embedded clothing, for example, such as safety vests or helmets. The speed limit sign includes logic to display one of many possible speed limit displays based on the nearest, and/or the number of RFID signals detected in a given area.Type: GrantFiled: December 3, 2007Date of Patent: July 12, 2011Assignee: International Business Machines CorporationInventors: Robert Thomas Arenburg, Franck Barillaud, Bradford Lee Cobb, Shivnath Dutta
-
Publication number: 20090140882Abstract: A method, medium and implementing processing system are provided in which the presence of workers in a long highway construction zone is monitored and the electronically-controlled posted speed limit is adjusted in accordance with the detected presence of workers in the immediate area. In an example, Radio Frequency Identification (RFID) scanners or readers are strategically placed in a construction or working area. Such RFID reading devices may be embedded, for example, in construction speed limit signs. The displayed speed limit is controlled by the detected proximity of construction workers wearing RFID-embedded clothing, for example, such as safety vests or helmets. The speed limit sign includes logic to display one of many possible speed limit displays based on the nearest, and/or the number of RFID signals detected in a given area.Type: ApplicationFiled: December 3, 2007Publication date: June 4, 2009Inventors: Robert Thomas Arenburg, Franck Barillaud, Bradford Lee Cobb, Shivnath Dutta
-
Patent number: 7480901Abstract: A method, computer program product, and a data processing system for generating a single object file from which a plurality of per-processor architecture executables may be produced. Source code includes instructions that are associated with a plurality of processor architectures and a plurality of instruction sets each associated with one of the plurality of processor architectures. The source code is compiled into an object file that includes common text and data associated with the plurality of processor architectures and a plurality of processor-specific data and text sets. The object file may then be linked by a processor of one of the plurality of processor architectures to produce an executable that is optimized for a plurality of processor architectures.Type: GrantFiled: February 3, 2005Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Robert Thomas Arenburg, Franck Barillaud, Bradford Lee Cobb, Shivnath Dutta
-
Publication number: 20080091719Abstract: A computer implemented method and computer program product for managing audio information. The process retrieves an audio stream comprising audio information. The process generates a pair of audio tags in an audio tag frequency band. The audio tag frequency band is a frequency band different than the frequency band of the audio information. The audio tags correspond to a given function. The process superimposes the audio tags on the audio information to form a tagged audio information segment. The process retrieves the tagged audio information segment from the audio stream corresponding to the given function in response to receiving a selection of the given function. The tagged audio information segment can be managed according to the function to which the audio tags have been associated.Type: ApplicationFiled: October 13, 2006Publication date: April 17, 2008Inventors: Robert Thomas Arenburg, Franck Barillaud, Bradford Lee Cobb, Shivnath Dutta
-
Publication number: 20080071865Abstract: A method of data processing includes selecting an email message, which includes message text, for processing. A determination is then made if the selected email message has a reply email and if the message text of the selected email message is contained in the reply email. In response to determining that the selected email message has a reply email that contains the message text of the reply email, the selected email message is deleted from data storage.Type: ApplicationFiled: September 15, 2006Publication date: March 20, 2008Inventor: Shivnath Dutta
-
Publication number: 20070185970Abstract: A method, system, and computer program product for implementing messaging services is provided. The method includes receiving a request to delete a message that includes an attachment from a computer system. In response to the request, a user of the computer system is provided with options to save the attachment and to delete the attachment along with the message. If the user selects the delete option, the message is sent to a messaging system trash folder and the attachment is sent to an operating system trash folder. If the user selects the option to save the attachment, the message is separated from the attachment and the user is prompted to select an operating system storage location for saving the attachment. In response to receiving the selected operating system storage location, a copy of the attachment is stored in the selected location and the message is sent to the messaging system trash folder.Type: ApplicationFiled: February 8, 2006Publication date: August 9, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert Arenburg, Franck Barillaud, Bradford Cobb, Shivnath Dutta
-
Publication number: 20060174234Abstract: The present invention is a method and apparatus for the detection of portable electronic device functionality. In a preferred embodiment, the present invention includes a chemically coated antenna to serve as a trigger for device functionality detection. The chemically coated antenna may be passively or actively detected. In active detection, a detection apparatus releases a chemical which reacts or otherwise respods with the chemical trigger in a detectable manner. The detection apparatus detects the reaction, which is specific to the functionality of the portable electronic device. In passive detection, a detection device simply detects the chemical trigger, which is specific to the portable electronic device functionality. Other trigger embodiments utilizing optics, radio frequency (RF) signals, sound waves, and magnetic identification are also disclosed.Type: ApplicationFiled: February 3, 2005Publication date: August 3, 2006Applicant: International Business Machines CorporationInventors: Robert Arenburg, Franck Barillaud, Bradford Cobb, Shivnath Dutta