Patents by Inventor Timothy R. Chavez
Timothy R. Chavez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090280818Abstract: A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Publication number: 20090279680Abstract: A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Publication number: 20090280785Abstract: A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Publication number: 20090280817Abstract: A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Publication number: 20090279677Abstract: A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Publication number: 20090280787Abstract: A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier.Type: ApplicationFiled: May 6, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATIONInventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
-
Patent number: 7617178Abstract: In accordance with one illustrative embodiment, when a file is moved from the background to the foreground in a peer-to-peer client, the client makes a local request for file pieces. The client sends a handshake message to itself to check for available pieces. The client then exchanges messages locally the same way it would with external peers. As an alternative approach to local message passing, the client may keep a local record of file fragments in a data structure, such as a markup language document or other data repository. The client may then query the data structure for needed file fragments before submitting a request to the peer-to-peer network. Every time a new file segment is downloaded and validated in the background, or the foreground, the peer-to-peer client may update the data structure. Then, the client may simply query the data structure for the specific segment it wishes to download.Type: GrantFiled: June 12, 2007Date of Patent: November 10, 2009Assignee: International Business Machines CorporationInventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
-
Publication number: 20090129596Abstract: A system, method, and program product is provided that operates when opening a word processing document that includes document content inserted at various insertion points within the document. The document is opened by a user that corresponds to a particular user identifier. The comments included in the document include recipient identifiers. A first set of comments are selected where the user's identifier is included in the recipient identifiers of the corresponding comments, and a second set of comments are selected where the user's identifier is not included in the recipient identifiers of the corresponding comments. The word processor displays the first set of comments at their respective insertion points within the document content and does not present the second set of comments.Type: ApplicationFiled: November 16, 2007Publication date: May 21, 2009Inventors: Timothy R. Chavez, Jacob Daniel Eisinger, Jennifer Elizabeth King, William Alexander Reichert, III, Patrick Ryan Wardrop
-
Publication number: 20090031336Abstract: A method, medium and implementing computer system are provided in which the aggregate preferences of a gathered group of individuals in a certain proximity and with respect to a predetermined perceivable and controllable function are ascertained. Individual preferences are processed to obtain a group preference and if the group preference meets predetermined criteria, the group preference is implemented with respect to the controllable function. In a specific example, movie preview playlists are modified by a control server according to the ascertained preferences of the particular group to whom the movie previews are being presented. In another example, the ambient temperature of a room in which a group of individuals is gathered is adjusted by a temperature-control server in response to the polled and ascertained preferences of each of the individuals.Type: ApplicationFiled: July 24, 2007Publication date: January 29, 2009Inventors: Timothy R. Chavez, Jacob Daniel Eisinger, Michael Charles Hollinger, Jennifer Elizabeth King, Christina Karen Lauridsen, Fabian F. Morgan
-
Publication number: 20090022305Abstract: A phone call mute notification applies an aural effect to the user's speech, other parties' speech, non-speech, or combinations thereof. The phone call mute notification does not render speech unintelligible and may provide a constant indication that the phone call mute function is active. Furthermore, the phone call mute notification does not serve as a distraction to the user, because the aural effect may be applied to speech itself rather than drawing the attention of the user away from the speech.Type: ApplicationFiled: July 17, 2007Publication date: January 22, 2009Inventors: Timothy R. Chavez, Jacob D. Eisinger, Jennifer E. King, William A. Reichert, III
-
Publication number: 20080284642Abstract: A method and system for optimizing a global positioning system. In one embodiment, the method includes receiving an indication of at least one change in coordinate attributes, determining a plurality of cost and transaction rules based on at least one user preference, and processing a plurality coordinate transactions based on the least one cost and transaction rule.Type: ApplicationFiled: May 17, 2007Publication date: November 20, 2008Applicant: International Business Machines CorporationInventors: Lisa Anne Seacat, Timothy R. Chavez
-
Publication number: 20080133666Abstract: In accordance with one illustrative embodiment, when a file is moved from the background to the foreground in a peer-to-peer client, the client makes a local request for file pieces. The client sends a handshake message to itself to check for available pieces. The client then exchanges messages locally the same way it would with external peers. As an alternative approach to local message passing, the client may keep a local record of file fragments in a data structure, such as a markup language document or other data repository. The client may then query the data structure for needed file fragments before submitting a request to the peer-to-peer network. Every time a new file segment is downloaded and validated in the background, or the foreground, the peer-to-peer client may update the data structure. Then, the client may simply query the data structure for the specific segment it wishes to download.Type: ApplicationFiled: June 12, 2007Publication date: June 5, 2008Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
-
Publication number: 20080133706Abstract: A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. A user may elect to “tag” a torrent when a new file is submitted to the peer-to-peer system. A user may view the various tags with one or more file fragments that the user is hosting in the background. The user may view the tags for all fragments being shared in the background and search the tags. The peer-to-peer system may store metadata tags for the torrents in a central repository, such as a relational database, or in a distributed hash table.Type: ApplicationFiled: June 12, 2007Publication date: June 5, 2008Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
-
Publication number: 20080133698Abstract: Peer-to-peer file sharing clients share file fragments in the background based on rarity values. When a first peer offers a fragment to a second peer to be shared in the background, the second peer checks the rarity of the fragment and identifies one or more fragments from its swarm that is approximately as rare as the fragment being offered. The second peer then offers the one or more fragments in exchange for the originally offered fragment. The first peer may then offer the one or more fragments to other peers in its swarm to be shared in the background.Type: ApplicationFiled: August 31, 2007Publication date: June 5, 2008Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
-
Publication number: 20080133538Abstract: A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. Each file sharing participant may designate an amount of bandwidth and/or storage space for background file sharing. Peer-to-peer file sharing clients then share file data and content in the background automatically. The client may participate in additional swarms, in the background, to generally increase the number of peers in file sharing networks, thus increasing the speed of downloading desired files for other users.Type: ApplicationFiled: December 5, 2006Publication date: June 5, 2008Inventors: Timothy R Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
-
Publication number: 20070269020Abstract: A system, method, and computer-usable medium for mitigating audible acknowledgement volume in a vehicle security system. A preferred embodiment of the present invention includes measuring an amplitude of a valid signal, in response to receiving the valid signal; in response to determining the amplitude of the valid signal, comparing the amplitude to a first predetermined threshold; in response to the comparison, adjusting a volume setting of an audible acknowledgement; further adjusting the volume setting in response to measuring ambient noise of a surrounding location; and emitting the audible acknowledgement.Type: ApplicationFiled: May 19, 2006Publication date: November 22, 2007Inventors: Timothy R. Chavez, Dustin Kirkland