1
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Scott A Elrod, Daniel C Swinehart, William N Schilit, Robert T Krivacic, Roy Want: Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, September 10, 1996: US05555376 (632 worldwide citation)

The present invention describes a method for superimposing prespecified locational, environmental, and contextual controls on user interactions, including interactions of mobile users, with computational resources. A system is described for electronically monitoring contextual information concerning ...


2
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Daniel C Swinehart, William N Schilit, Roy Want: Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or users. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, September 22, 1998: US05812865 (592 worldwide citation)

The present invention describes a system of multiple devices and multiple users, wherein the identity and location of each device and user may be known to the system. A method is described for establishing media connections between at least a first user and a second user based on the context of the ...


3
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Scott A Elrod, Daniel C Swinehart, William N Schilit, Robert T Krivacic, Roy Want: Method for triggering selected machine event when the triggering properties of the system are met and the triggering conditions of an identified user are perceived. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, February 11, 1997: US05603054 (582 worldwide citation)

The present invention describes a method for superimposing prespecified locational, environmental, and contextual controls on user interactions, including interactions of mobile users, with computational resources. A system is described for electronically monitoring contextual information concerning ...


4
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Scott A Elrod, Daniel C Swinehart, William N Schilit, Robert T Krivacic, Roy Want: Method for selectively performing event on computer controlled device whose location and allowable operation is consistent with the contextual and locational attributes of the event. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, March 11, 1997: US05611050 (496 worldwide citation)

The present invention describes a method for superimposing prespecified locational, environmental, and contextual controls on user interactions, including interactions of mobile users, with computational resources. A system is described for electronically monitoring contextual information concerning ...


5
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Scott A Elrod, Daniel C Swinehart, William N Schilit, Robert T Krivacic, Roy Want: System for granting ownership of device by user based on requested level of ownership, present state of the device, and the context of the device. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, August 6, 1996: US05544321 (477 worldwide citation)

The present invention describes a method for superimposing prespecified locational, environmental, and contextual controls on user interactions, including interactions of mobile users, with computational resources. A system is described for electronically monitoring contextual information concerning ...


6
Daniel C Swinehart, Douglas B Terry: Garbage collector for hypermedia systems. Xerox Corporation, April 3, 1990: US04914586 (324 worldwide citation)

A database of interests is maintained in a distributed computing system to register the individual interests of users in centrally stored non-textual media files, such as digital voice, music, scanned-in image, and video files. Uniquely named piece table style persistent data structures are employed ...


7
Lester D Nelson, Daniel C Swinehart, Tomas Sokoler: Telecommunications infrastructure for generating conversation utterances to a remote listener in response to a quiet selection. Fuji Xerox, Xerox Corporation, Fliesler Meyer, October 23, 2007: US07286649 (27 worldwide citation)

A user to conducts a telephone conversation without speaking. It does this by moving the participant in the public situation to a quiet mode of communication (e.g., keyboard, buttons, touchscreen). All the other participants are allowed to continue using their usual audible technology (e.g., telepho ...


8
Dirk Balfanz, Diana K Smetters, Paul S Stewart, Daniel C Swinehart: Apparatus and methods for providing secured communication. Xerox Corporation, Oliff & Berridge, February 27, 2007: US07185199 (24 worldwide citation)

Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.


9
Daniel C Swinehart: System for changing device from specialized interface that enables control of subsystem to general interface that performs general purpose computing functions unrelated to the subsystem. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, February 10, 1998: US05717955 (19 worldwide citation)

The present invention describes a method for superimposing general usage interface characteristics upon a computing device configured with specialized interface characteristics to enable the particular computing device to control general purpose computing functions. The user may also establish contr ...


10
Dirk Balfanz, Diana Smetters, Paul Stewart, Daniel C Swinehart: Apparatus and methods for providing secured communication. Xerox Corporation, Park Vaughan & Fleming, June 24, 2008: US07392387 (15 worldwide citation)

Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.