Patents by Inventor Timothy R. Chavez

Timothy R. Chavez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090280818
    Abstract: A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090279680
    Abstract: A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090280785
    Abstract: A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090280817
    Abstract: A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090279677
    Abstract: A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Publication number: 20090280787
    Abstract: A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Applicant: INTERNATIONAL BUISNESS MACHINES CORPORATION
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Michael C. Hollinger, Jennifer E. King, Christina K. Lauridsen, Fabian F. Morgan
  • Patent number: 7617178
    Abstract: In accordance with one illustrative embodiment, when a file is moved from the background to the foreground in a peer-to-peer client, the client makes a local request for file pieces. The client sends a handshake message to itself to check for available pieces. The client then exchanges messages locally the same way it would with external peers. As an alternative approach to local message passing, the client may keep a local record of file fragments in a data structure, such as a markup language document or other data repository. The client may then query the data structure for needed file fragments before submitting a request to the peer-to-peer network. Every time a new file segment is downloaded and validated in the background, or the foreground, the peer-to-peer client may update the data structure. Then, the client may simply query the data structure for the specific segment it wishes to download.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: November 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
  • Publication number: 20090129596
    Abstract: A system, method, and program product is provided that operates when opening a word processing document that includes document content inserted at various insertion points within the document. The document is opened by a user that corresponds to a particular user identifier. The comments included in the document include recipient identifiers. A first set of comments are selected where the user's identifier is included in the recipient identifiers of the corresponding comments, and a second set of comments are selected where the user's identifier is not included in the recipient identifiers of the corresponding comments. The word processor displays the first set of comments at their respective insertion points within the document content and does not present the second set of comments.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Inventors: Timothy R. Chavez, Jacob Daniel Eisinger, Jennifer Elizabeth King, William Alexander Reichert, III, Patrick Ryan Wardrop
  • Publication number: 20090031336
    Abstract: A method, medium and implementing computer system are provided in which the aggregate preferences of a gathered group of individuals in a certain proximity and with respect to a predetermined perceivable and controllable function are ascertained. Individual preferences are processed to obtain a group preference and if the group preference meets predetermined criteria, the group preference is implemented with respect to the controllable function. In a specific example, movie preview playlists are modified by a control server according to the ascertained preferences of the particular group to whom the movie previews are being presented. In another example, the ambient temperature of a room in which a group of individuals is gathered is adjusted by a temperature-control server in response to the polled and ascertained preferences of each of the individuals.
    Type: Application
    Filed: July 24, 2007
    Publication date: January 29, 2009
    Inventors: Timothy R. Chavez, Jacob Daniel Eisinger, Michael Charles Hollinger, Jennifer Elizabeth King, Christina Karen Lauridsen, Fabian F. Morgan
  • Publication number: 20090022305
    Abstract: A phone call mute notification applies an aural effect to the user's speech, other parties' speech, non-speech, or combinations thereof. The phone call mute notification does not render speech unintelligible and may provide a constant indication that the phone call mute function is active. Furthermore, the phone call mute notification does not serve as a distraction to the user, because the aural effect may be applied to speech itself rather than drawing the attention of the user away from the speech.
    Type: Application
    Filed: July 17, 2007
    Publication date: January 22, 2009
    Inventors: Timothy R. Chavez, Jacob D. Eisinger, Jennifer E. King, William A. Reichert, III
  • Publication number: 20080284642
    Abstract: A method and system for optimizing a global positioning system. In one embodiment, the method includes receiving an indication of at least one change in coordinate attributes, determining a plurality of cost and transaction rules based on at least one user preference, and processing a plurality coordinate transactions based on the least one cost and transaction rule.
    Type: Application
    Filed: May 17, 2007
    Publication date: November 20, 2008
    Applicant: International Business Machines Corporation
    Inventors: Lisa Anne Seacat, Timothy R. Chavez
  • Publication number: 20080133666
    Abstract: In accordance with one illustrative embodiment, when a file is moved from the background to the foreground in a peer-to-peer client, the client makes a local request for file pieces. The client sends a handshake message to itself to check for available pieces. The client then exchanges messages locally the same way it would with external peers. As an alternative approach to local message passing, the client may keep a local record of file fragments in a data structure, such as a markup language document or other data repository. The client may then query the data structure for needed file fragments before submitting a request to the peer-to-peer network. Every time a new file segment is downloaded and validated in the background, or the foreground, the peer-to-peer client may update the data structure. Then, the client may simply query the data structure for the specific segment it wishes to download.
    Type: Application
    Filed: June 12, 2007
    Publication date: June 5, 2008
    Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
  • Publication number: 20080133706
    Abstract: A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. A user may elect to “tag” a torrent when a new file is submitted to the peer-to-peer system. A user may view the various tags with one or more file fragments that the user is hosting in the background. The user may view the tags for all fragments being shared in the background and search the tags. The peer-to-peer system may store metadata tags for the torrents in a central repository, such as a relational database, or in a distributed hash table.
    Type: Application
    Filed: June 12, 2007
    Publication date: June 5, 2008
    Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
  • Publication number: 20080133698
    Abstract: Peer-to-peer file sharing clients share file fragments in the background based on rarity values. When a first peer offers a fragment to a second peer to be shared in the background, the second peer checks the rarity of the fragment and identifies one or more fragments from its swarm that is approximately as rare as the fragment being offered. The second peer then offers the one or more fragments in exchange for the originally offered fragment. The first peer may then offer the one or more fragments to other peers in its swarm to be shared in the background.
    Type: Application
    Filed: August 31, 2007
    Publication date: June 5, 2008
    Inventors: Timothy R. Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
  • Publication number: 20080133538
    Abstract: A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. Each file sharing participant may designate an amount of bandwidth and/or storage space for background file sharing. Peer-to-peer file sharing clients then share file data and content in the background automatically. The client may participate in additional swarms, in the background, to generally increase the number of peers in file sharing networks, thus increasing the speed of downloading desired files for other users.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 5, 2008
    Inventors: Timothy R Chavez, Christina K. Lauridsen, Sushma B. Patel, Robert R. Peterson, Loulwa F. Salem, Lisa A. Seacat
  • Publication number: 20070269020
    Abstract: A system, method, and computer-usable medium for mitigating audible acknowledgement volume in a vehicle security system. A preferred embodiment of the present invention includes measuring an amplitude of a valid signal, in response to receiving the valid signal; in response to determining the amplitude of the valid signal, comparing the amplitude to a first predetermined threshold; in response to the comparison, adjusting a volume setting of an audible acknowledgement; further adjusting the volume setting in response to measuring ambient noise of a surrounding location; and emitting the audible acknowledgement.
    Type: Application
    Filed: May 19, 2006
    Publication date: November 22, 2007
    Inventors: Timothy R. Chavez, Dustin Kirkland