1
James E Rohen: Virtual graphics display capable of presenting icons and windows to the blind computer user and method. International Business Machines Corporation, Karl O Hesse, February 16, 1993: US05186629 (283 worldwide citation)

The disclosure teaches a computer mouse having tactile feedback to be used with audio computer output to provide a virtual graphic display to blind computer users. The mouse and audio feedback allow blind computer users to visualize computer graphic images and multiple screen windows in much the sam ...


2
Dennis G Abraham, Steven G Aden, Todd W Arnold, Steven W Neckyfarow, William S Rohland: Transaction system security method and apparatus. International Business Machines Corporation, Karl O Hesse Sr, September 15, 1992: US05148481 (271 worldwide citation)

An improved security system is disclosed which uses an IC card to enhance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditability. Both the sec ...


3
Paul H Benson, Michael L Kingdom Hockings, Brian H Middleton, Martin C Pinnell, Thomas E Robinson, Richard E Sheeler, John Simmons: Interactive enquiry system. International Business Machines Corporation, Karl O Hesse, January 29, 1980: US04186438 (261 worldwide citation)

Described is an interactive enquiry system in which a complete data base is contained at a host computer. Local terminal sub-systems are remotely connected to the host with each local sub-system containing a local data base. Each local data base is dynamically maintained so that the most frequently ...


4
Dennis G Abraham, Steven G Aden, Todd W Arnold, Steven W Neckyfarow, William S Rohland: Transaction system security method and apparatus. International Business Machines Corporation, Karl O Hesse, September 10, 1991: US05048085 (235 worldwide citation)

An improved security system is disclosed which uses an IC card to enchance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditablity. Both the sec ...


5
Todd Weston Arnold: Method and apparatus for protecting application data in secure storage areas. International Business Machines, Karl O Hesse, January 16, 2001: US06175924 (152 worldwide citation)

A method, apparatus and computer program product are disclosed for certifying the authenticity of an application program and for securely associating certified application programs whose certification has been verified, with persistent application data that they own. The invention prevents other app ...


6
Dennis G Abraham, Steven G Aden: Secure computer system having privileged and unprivileged memories. International Business Machines Corporation, Karl O Hesse, August 17, 1993: US05237616 (125 worldwide citation)

The microprocessor resides along with its protected real address space in a secure module surrounded by tamper resistant circuitry pad. Encryption programs and encryption keys are stored in the protected memory. A second real address space is also connected to the address and data bus of the micropr ...


7
Donald C Lancto, Robert E Shuck: Identity verification method and apparatus. International Business Machines Corporation, Karl O Hesse, October 31, 1978: US04123747 (115 worldwide citation)

An improved method for verifying the identity of a prospective terminal user presenting an identification card or a credit card and a memorized personal identification number. Only part of the information necessary to correlate an account number to a personal identification number is available at an ...


8
William Van Durrett, Gerald W Hieronymus, Marguerite A Pond, Todd D Price, Margaret L S Scurry, William C Steene: Automated palletizing system. International Business Machines Corporation, Homer L Knearl, Karl O Hesse, Kenneth A Seaman, March 26, 1996: US05501571 (95 worldwide citation)

An automatic palletizer system loads a random set of different size and weight boxes onto a pallet without a prior knowledge of the boxes to be loaded. As the boxes pass along a conveyor belt on the way to the pallet, a weighing, dimensioning, and scanning station determines the weight, dimensions a ...


9
Brian N Marquette, Mark B Stevens, Michael Lindsey Williams, John D Wilson: Master/slave architecture for a distributed chat application in a bandwidth constrained network. International Business Machines Corporation, Karl O Hesse, December 24, 2002: US06499053 (95 worldwide citation)

A chat system includes a chat server and a plurality of chat clients in a network that may be bandwidth constrained. Each chat client is configurable, in response to instructions from the chat server, to operate in either a master mode or a slave mode. In the master mode, a chat client is capable of ...


10
Marion E Getz, Christopher J Harris, Philip J McConnell, Mark L Norton, John P Garrett, Angela I Harding: Homogeneous hierarchial computer business system. International Business Machines Corporation, Karl O Hesse, November 18, 1986: US04623964 (88 worldwide citation)

A modified hierarchical homogeneous real time transaction, consolidated auditing and side processing business system, operating under a system wide parameter control, processes and encapsulates each transaction as a plurality of parameter dominated records in an input terminal, transmitting the reco ...