1
Jose F Bravo, Thomas A Covalla: Methods and apparatus for restricting access of a user using a cellular telephone. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, May 11, 2010: US07715823 (26 worldwide citation)

A method and apparatus are disclosed for preventing unauthorized access to a restricted item using a cellular telephone that has been previously associated with a user, for example, during a registration process. The user is initially identified, for example, by entering a password, and a one-time p ...


2
Colin Leonard Bird, Timothy David Catt, Thomas Alan Clabon, David John Gordon Robert Rankine, James Edwin Jerome Thompson, Cerys Willoughby: Generating a taxonomy for documents from tag data. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, December 31, 2013: US08620922 (14 worldwide citation)

A method and system for generating a taxonomy for documents from tag data are provided. The method includes obtaining tag data in the form of tags on documents with tag weightings for a document and clustering the tags using the tag weightings for documents, wherein each cluster is an identified sub ...


3
Attila Barta, Kwasi A Asare, Richard D Huddleston, Daniel E Jemiolo: Automatic parallel non-dependent component deployment. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, April 12, 2011: US07926051 (13 worldwide citation)

The methods, systems, data structures and computer program products for deploying software components are provided, including deploying components in an enterprise environment. Dependency relationships among components to be deployed arc determined. Those components which are not dependent upon any ...


4
William E Hutson, Samuel R McHan, John A Medicke, Christopher H L Wicher: Adaptive information technology solution design and deployment. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, March 20, 2012: US08140455 (12 worldwide citation)

Information technology solution alternatives for an enterprise organization are evaluated within an automated architectural framework based upon one or more information technology evaluation metrics. An automated incremental solution deployment strategy is created based upon the evaluated plurality ...


5
Cayce B Marston: Composite copy and paste for composite user interfaces. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, November 5, 2013: US08577904 (11 worldwide citation)

A selection of a composite copy command is detected via a computing device executing an application framework. The composite copy command is propagated to each active application associated with the application framework. A composite data element is received from each active application. The composi ...


6
Jane Chi Yan Fung, Grace Hai Yan Lo, William Gerald O Farrell, Shu Xia Tan: Common debug adaptor in a multiple computer programming language environment. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, June 5, 2012: US08196109 (11 worldwide citation)

Software developers working on multi-language systems with various debug tools (BPEL, AE, Java, etc.) can use a common debug adaptor (CDA). The CDA implements a method of debugging in a multi-computer program language environment. The method includes registering various debug tools associated with d ...


7
Amit Golander, Mark E Peters: Using an RFID device to enhance security by determining whether a person in a secure area is accompanied by an authorized person. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, January 24, 2012: US08102238 (11 worldwide citation)

Embodiments of the invention are generally directed to controlling access to an area or enclosed location, wherein any person in possession of a specified RFID badge or other RFID device is defined to be a person who is authorized to be in the area or location. One embodiment, directed to a method, ...


8
Scott J Clee, Jonathan S Tilt, Daniel E Would, Shanna Xu: Test case pattern matching. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, January 7, 2014: US08627290 (9 worldwide citation)

A method of providing feedback on source code being created includes receiving source code and processing the received source code according to a predefined rule set to create a representation of the received source code. A source code repository is accessed that includes source code fragments. Each ...


9
Sandeep Chowdhury: Structure based storage, query, update and transfer of tree-based documents. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, May 8, 2012: US08176084 (8 worldwide citation)

A method for storing data, comprises representing the data as a tree structure, calculating a structure ID for the tree structure, the structure ID being a representation of the tree structure and independent of node names and node values of the tree structure, and storing a mapping of the structure ...


10
Travis M Grigsby, Frank L Jania, Steven M Miller, Lisa A Seacat: Voice response unit shortcutting. International Business Machines Corporation, Lee Law PLLC, Christopher B Lee, October 16, 2012: US08290125 (7 worldwide citation)

A system, method and program product for providing voice response unit (VRU) shortcuts. A system is provided that includes: a user interface for allowing a user to input a targeted VRU, a goal, and call-specific information; a data mapping system for mapping the call specific information and user in ...



Click the thumbnails below to visualize the patent trend.