1
David Kammer, Ray Combs: Location based security modification system and method. Palm, Foley & Lardner, September 15, 2009: US07591020 (159 worldwide citation)

A method or system for providing a level of data security dependent on the location of the user of a wireless device is disclosed. One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The metho ...


2
Michael Lunsford, Steve Parker, David Kammer, Nicholas A Thomas, David Moore: Method and system for effecting a security system upon multiple portable information devices. 3Com Corporation, Wagner Murabito & Hao, September 2, 2003: US06614350 (91 worldwide citation)

A method and system for effecting a security web upon multiple devices. In one embodiment of the invention, multiple devices are enabled to respond as authorized members of a security web such that each device acts as a co-monitoring device within the web. Further, each device transmits an identifia ...


3
Eric Michael Lunsford, Steve Parker, David Kammer, David Moore: System and method for selecting a network access provider using a portable information device. 3Com Corporation, McDonnell Boehnen Hulbert & Berghoff, January 3, 2006: US06982962 (43 worldwide citation)

A system and method for selecting a network access provider using a portable information device (PID) includes considering the user's pre-stated preferences. The pre-stated preferences may include, but are not limited to, reliability, security, signal strength, cost or appropriateness of service pro ...


4
David Kammer: Efficient service registration for legacy applications in a bluetooth environment. PalmSource, Wagner Murabito & Hao, November 30, 2004: US06826387 (43 worldwide citation)

A method and device for providing a service record for an application (e.g., a legacy application) running on a virtual serial port of a wireless transceiver device, such as a Bluetooth-enabled device. The virtual serial port emulates a serial connection (e.g., a serial cable) for the application. T ...


5
Rich Karstens, Ryan Robertson, David Kammer: System and method for using a wireless enabled portable computer system as a wireless modem. palmOne, Wagner Murabito & Hao, June 1, 2004: US06745047 (36 worldwide citation)

A method and system for using a wireless enabled portable computer system as a wireless modem. The portable computer system may be a personal digital assistant (PDA) having an internal wireless modem. The internal wireless modem, e.g., GSM radio, contains a communication port (port


6
David Kammer, Mark T Davis: Method for waking a device in response to a wireless network activity. Palm, Wagner Murabito & Hao, September 13, 2005: US06943667 (34 worldwide citation)

A method and a system for data transmission between a first electronic device and a second electronic device, wherein the second electronic device is in a sleep mode. Transmission of data between the first electronic device and the second electronic device occurs while a microprocessor in the second ...


7
Wen Zhao, David Kammer, Mark T Davis, Arun G Mathias, Isabel Ge Mahe, Bennett Chan, Alex Yee Kit Ho: Power saving in multi-processor device. Hewlett Packard Development Company, Foley & Lardner, March 1, 2011: US07898994 (30 worldwide citation)

A mobile computing device comprises a first microprocessor having a sleep mode and a wake mode and a second microprocessor configured for wireless communication. A communication port is configured to communicate data from the second processor to the first processor, wherein the second processor is c ...


8
David Kammer, E Michael Lunsford: Power-conserving intuitive device discovery technique in a bluetooth environment. PalmSource, Berry & Associates P C, September 27, 2005: US06950645 (29 worldwide citation)

A method and system for managing when a responder device (a device having a transceiver for wireless communication) is operating in a discoverable mode in a wireless network of devices, such as a Bluetooth network. In the discoverable mode, the responder device is set to scan for and respond to gene ...


9
David Kammer, Steve Elliot, Rich Karstens: Technique for handling undesired data over a limited bandwidth channel. Palm, Wagner Murabito & Hao, April 24, 2001: US06222857 (29 worldwide citation)

A technique for handling undesired data over a limited bandwidth channel. Specifically, one embodiment in accordance with the present invention operates within an electronic system or device (e.g., personal digital assistant) which can be coupled to a networking environment. An embodiment of the pre ...


10
David Kammer, Jesse Donaldson, Neal Osborn: Handheld computer system and method to detect and identify a peripheral device. Palm Computing, Wagner Muribito & Hao, February 18, 2003: US06523073 (29 worldwide citation)

The present invention is a system and method that facilitates extendible identification of various peripheral devices coupled to a hand held computer. In one embodiment of a present invention peripheral device identification system and method, an initial pulse of an interrupt signal received by the ...