Patents by Inventor Telemaque Ndizihiwe
Telemaque Ndizihiwe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9449103Abstract: Described are a conference management system and method for displaying a contact list of an application on a computing system. A contact list of an application is provided. Context information related to a user of the contact list is detected. At least one rule is applied to the context information. User contacts in the contact list arranged in a display order in response to the at least one rule.Type: GrantFiled: March 2, 2011Date of Patent: September 20, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kieran Gerard Anthony Boland, Telemaque Ndizihiwe, Mark Ernest Wallace, Michael Cronin
-
Patent number: 9077637Abstract: Determining the physical location of a mobile wireless device. A computer receives 1-hop and 2-hop neighbor information from a mobile wireless device for neighbor devices of the mobile wireless device responding to a discovery request transmitted by the mobile wireless device in an ad hoc wireless communications protocol. The computer determines a physical location of the mobile wireless device based in part on stored fixed physical locations of responding devices; an area in which the mobile wireless device is in range of responding 1-hop neighbors associated with a fixed physical location; and an area in which the mobile wireless device is in range of responding 1-hop neighbors not associated with a fixed physical location, which are in the range of 2-hop neighbors associated with fixed physical locations.Type: GrantFiled: January 14, 2014Date of Patent: July 7, 2015Assignee: International Business Machines CorporationInventors: Kieran G. A. Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Patent number: 8984062Abstract: A computing device defines one or more hunt groups on a client, wherein the one or more hunt groups are defined based, at least in part, upon information specific to the client. The computing device receives a request for a communication session at the client. The request for the communication session is directed, by the computing device, to one or more members of the one or more hunt groups based, at least in part, upon the one or more defined hunt groups.Type: GrantFiled: June 29, 2010Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: Mark E. Wallace, Telemaque Ndizihiwe, Kieran Gerard Anthony Boland, Michael Cronin
-
Patent number: 8953471Abstract: An approach is provided to detect a spam message transmitted over a packetized, network-based telephony system. A request to initiate a first voice communication session is received from a requestor. A voice communications session is established with the requestor over the computer network. An audible ringing tone is sent to the requestor over the established voice communications session. While the audible ringing tone is being sent, audio data that is received from the requestor is analyzed. If the analysis detects an audible message in the audio data, then the requestor is identified as a possible spam source. On the other hand, if the analysis fails to detect the audible message in the audio data then the established voice communications session is handled as a non-spam event.Type: GrantFiled: January 5, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Kieran Gerard Anthony Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Patent number: 8755331Abstract: Determining the physical location of a mobile wireless device. A computer receives 1-hop and 2-hop neighbor information from a mobile wireless device for neighbor devices of the mobile wireless device responding to a discovery request transmitted by the mobile wireless device in an ad hoc wireless communications protocol. The computer determines a physical location of the mobile wireless device based in part on stored fixed physical locations of responding devices; an area in which the mobile wireless device is in range of responding 1-hop neighbors associated with a fixed physical location; and an area in which the mobile wireless device is in range of responding 1-hop neighbors not associated with a fixed physical location, which are in the range of 2-hop neighbors associated with fixed physical locations.Type: GrantFiled: December 13, 2011Date of Patent: June 17, 2014Assignee: International Business Machines CorporationInventors: Kieran G. A. Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Publication number: 20140126419Abstract: Determining the physical location of a mobile wireless device. A computer receives 1-hop and 2-hop neighbor information from a mobile wireless device for neighbor devices of the mobile wireless device responding to a discovery request transmitted by the mobile wireless device in an ad hoc wireless communications protocol. The computer determines a physical location of the mobile wireless device based in part on stored fixed physical locations of responding devices; an area in which the mobile wireless device is in range of responding 1-hop neighbors associated with a fixed physical location; and an area in which the mobile wireless device is in range of responding 1-hop neighbors not associated with a fixed physical location, which are in the range of 2-hop neighbors associated with fixed physical locations.Type: ApplicationFiled: January 14, 2014Publication date: May 8, 2014Applicant: International Business Machines CorporationInventors: Kieran G. A. Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Publication number: 20130176865Abstract: An approach is provided to detect a spam message transmitted over a packetized, network-based telephony system. A request to initiate a first voice communication session is received from a requestor. A voice communications session is established with the requestor over the computer network. An audible ringing tone is sent to the requestor over the established voice communications session. While the audible ringing tone is being sent, audio data that is received from the requestor is analyzed. If the analysis detects an audible message in the audio data, then the requestor is identified as a possible spam source. On the other hand, if the analysis fails to detect the audible message in the audio data then the established voice communications session is handled as a non-spam event.Type: ApplicationFiled: January 5, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kieran Gerard Anthony Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Publication number: 20130148573Abstract: A computer to identify wireless enabled neighbors while connected to a network via an Ethernet or wireless infrastructure mode communications protocol. The computer switches to a first ad hoc wireless protocol and performs a discovery operation, then switches to a second ad hoc wireless protocol and performs a discovery operation. The computer switches back to the Ethernet or wireless infrastructure mode communications protocol and transmits the neighbor information to a storage device.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kieran G. A. Boland, Telemaque Ndizihiwe, Stephen Renwick, Mark E. Wallace
-
Publication number: 20120226704Abstract: Described are a conference management system and method for displaying a contact list of an application on a computing system. A contact list of an application is provided. Context information related to a user of the contact list is detected. At least one rule is applied to the context information. User contacts in the contact list arranged in a display order in response to the at least one rule.Type: ApplicationFiled: March 2, 2011Publication date: September 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kieran Gerard Anthony Boland, Telemaque Ndizihiwe, Mark E. Wallace, Michael Cronin
-
Publication number: 20110320534Abstract: A computing device defines one or more hunt groups on a client, wherein the one or more hunt groups are defined based, at least in part, upon information specific to the client. The computing device receives a request for a communication session at the client. The request for the communication session is directed, by the computing device, to one or more members of the one or more hunt groups based, at least in part, upon the one or more defined hunt groups.Type: ApplicationFiled: June 29, 2010Publication date: December 29, 2011Applicant: International Business Machines CorporationInventors: Mark E. Wallace, Telemaque Ndizihiwe, Kieran Gerard Anthony Boland, Michael Cronin