Patents by Inventor Chad ALBERTSON

Chad ALBERTSON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240163266
    Abstract: A system and method for pairing two devices for secure communications. A user selects a first device to pair with a second device. The first and second devices have the ability to securely communicate with each other through the use of encrypted communications. An encryption key is written to the first device and then burned into the encryption module on the first device. A third device is selected to pair with the first device. A second encryption key is written to the first device and then burned into the encryption module.
    Type: Application
    Filed: December 14, 2023
    Publication date: May 16, 2024
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Publication number: 20240064926
    Abstract: Provided is a damper system for an electronic equipment rack. The damper system may include an electronic equipment rack, a battery back-up unit, and a plurality of rails disposed within the electronic equipment rack. The battery back-up unit is slidably secured to the plurality of rails and tuned to dampen seismic oscillations of the electronic equipment rack during an earthquake. The battery back-up unit is also able to provide power to the electronic equipment disposed in the rack during a power outage.
    Type: Application
    Filed: August 22, 2022
    Publication date: February 22, 2024
    Inventors: CHAD ALBERTSON, Eric J. Campbell, NICHOLAS OLLERICH, Kevin O'Connell
  • Patent number: 11902263
    Abstract: A system and method for pairing two devices for secure communications. A user selects a first device to pair with a second device. The first and second devices have the ability to securely communicate with each other through the use of encrypted communications. An encryption key is written to the first device and then burned into the encryption module on the first device. A corresponding decryption key is written to the second device and then is burned into the decryption module of the second device.
    Type: Grant
    Filed: January 3, 2023
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Patent number: 11880469
    Abstract: A system and method for providing a secure image load. The system includes a microcontroller. The microcontroller has a plurality of physically modifiable internal components (PMIC). Each of the plurality of PMICs can only be modified one time. The system further includes an image loader configured to load a boot image from the memory of the microcontroller, and a checksum calculator configured to calculate a checksum value for the boot image. The system further includes a checksum burner configured to modify the plurality of PMICs to create a binary representation of the checksum value for the image. A checksum value is calculated for the image. This checksum value is written to the microcontroller. The value is burned into the microcontroller using the PMICs. Further, responses to the checksum mismatch are burned into the microcontroller using the PMICs that are present in the microcontroller.
    Type: Grant
    Filed: July 1, 2022
    Date of Patent: January 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Publication number: 20230419099
    Abstract: A method, computer program, and computer system are provided for resource allocation for sensor-based neural networks. One or more nodes associated with an edge computing environment are identified. Data corresponding to a classification dataset is received from the identified nodes. The dataset includes a reference classification and confidence value data. A node is selected from among the identified nodes based on the selected node having a greatest confidence interval associated with the reference classification within the confidence value data. The selected node is assigned to process the classification dataset.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Paul Schardt, Rachel Mertz, LAURA J MOKRZYCKI, CHAD ALBERTSON
  • Publication number: 20230318806
    Abstract: A system and method of securely controlling a device from another device. The user of the device attempts to modify the device in some way. In response to the attempted modification a request is generated and sent to a controlling device. The request includes information related to the desired modification. The controlling device analyzes the request and a determination on how to respond to the request is made. This response is encrypted at the controlling device and transmitted to the device. The device then decrypts the response and implements the indicated response to the request. The encryption and decryption keys are burned into the corresponding devices such that information needed to decrypt the response is not transmitted to the device.
    Type: Application
    Filed: March 28, 2022
    Publication date: October 5, 2023
    Inventors: Eric J. Campbell, Christopher Steffen, Chad Albertson, Nicholas Ollerich
  • Publication number: 20230308261
    Abstract: A system and method to tie a removable component to a host device. A first pairing key is stored into a security module on a host device such as a server rack. A removable component is inserted into the server rack for the first time. In response to this first insertion the first pairing key is burned into the removable component using a plurality of physically modifiable internal components. The server rack/security module receives a request form the removable component to operate on the server rack, the request includes a burned in pairing key. The security module compares the received pairing key with the first pairing key and permits operation of the removable component in response to a match between the received pairing key and the first pairing key.
    Type: Application
    Filed: March 28, 2022
    Publication date: September 28, 2023
    Inventors: Eric J. Campbell, Christopher Steffen, Chad Albertson, Nicholas Ollerich
  • Publication number: 20230308457
    Abstract: Described are techniques for presentation attack detection including a computer-implemented method of emitting a predetermined frequency pattern using at least one speaker communicatively coupled to a computer implementing a video-conference. The computer-implemented method further comprises collecting, by a camera communicatively coupled to the computer and overlapping with the emitting the predetermined frequency pattern, video data of a user engaged in the video-conference. The computer-implemented method further comprises determining that the video data is inconsistent with an expected response to the predetermined frequency pattern. The computer-implemented method further comprises generating an indication that the user engaged in the video-conference is performing a presentation attack.
    Type: Application
    Filed: March 28, 2022
    Publication date: September 28, 2023
    Inventors: Mark S. Fredrickson, CHAD ALBERTSON, David Grant Wheeler, Scott D. Frei
  • Patent number: 11729472
    Abstract: A system and method for providing content to a user outside of a home region. A portable device displays content to a user through a network connection. A home content provider provides content to the portable device from the home region. Some of the content provided is region restricted content. A location verifier determines that the portable device and the user are both physically located within the home region. The location verifier issues to the user a location token when the user and the portable device are in the home region. A token verifier verifies the location token when the user requests the region restricted content outside of the home region. The token verifier further instructs the home content provider to provide region restricted content to the user when the user has the location token.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: August 15, 2023
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Campbell, Chad Albertson, Christopher Steffen, Nicholas Ollerich
  • Publication number: 20230155986
    Abstract: A system and method for pairing two devices for secure communications. A user selects a first device to pair with a second device. The first and second devices have the ability to securely communicate with each other through the use of encrypted communications. An encryption key is written to the first device and then burned into the encryption module on the first device. A corresponding decryption key is written to the second device and then is burned into the decryption module of the second device.
    Type: Application
    Filed: January 3, 2023
    Publication date: May 18, 2023
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Publication number: 20230061268
    Abstract: An embodiment includes generating, by a first edge computing device having a sensor, a dataset based on sensor data from the sensor. The embodiment generates, by an analytics engine hosted by the first edge computing device, a classification dataset comprising a classification for the dataset and a confidence value associated with the classification. The embodiment calculates a confidence difference between the confidence value and a reference confidence value received with a reference classification from a second edge computing device. The embodiment compares the confidence difference to a difference threshold value and generates, in a case in which the confidence difference is greater than the difference threshold value, a replacement dataset as an output replacement for the classification dataset, where the replacement dataset comprises the reference classification and an indication that the confidence value is less than the reference confidence value.
    Type: Application
    Filed: August 17, 2021
    Publication date: March 2, 2023
    Applicant: International Business Machines Corporation
    Inventors: Paul Schardt, Chad Albertson, Rachel Mertz, Laura J. Mokrzycki
  • Patent number: 11575665
    Abstract: Aspects described herein include a computer-implemented method (and related system and computer program product) comprising receiving, from a bonding service, an authorization request for a predefined authorized use of a good or service by a user. The authorization request indicates that the user meets one or more predefined criteria for the predefined authorized use. The method further comprises determining one or more penalty conditions of a bonding agreement for the predefined authorized use by the user, and receiving, from the bonding service, a confirmation that the user agrees to meet the one or more penalty conditions of the bonding agreement. The method further comprises receiving, from an owner of the good or service, an authorization of the authorization request, and transmitting, responsive to authorization of the authorization request, a token to the bonding service that enables the user to access the predefined authorized use of the good or service.
    Type: Grant
    Filed: December 7, 2020
    Date of Patent: February 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Mark S. Fredrickson, Scott D. Frei, Chad Albertson, Jeb R. Linton
  • Patent number: 11570156
    Abstract: A system and method for pairing two devices for secure communications. A user selects a first device to pair with a second device. The first and second devices have the ability to securely communicate with each other through the use of encrypted communications. An encryption key is written to the first device and then burned into the encryption module on the first device. A corresponding decryption key is written to the second device and then is burned into the decryption module of the second device.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: January 31, 2023
    Assignee: International Business Machines Corporation
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Publication number: 20220335133
    Abstract: A system and method for providing a secure image load. The system includes a microcontroller. The microcontroller has a plurality of physically modifiable internal components (PMIC). Each of the plurality of PMICs can only be modified one time. The system further includes an image loader configured to load a boot image from the memory of the microcontroller, and a checksum calculator configured to calculate a checksum value for the boot image. The system further includes a checksum burner configured to modify the plurality of PMICs to create a binary representation of the checksum value for the image. A checksum value is calculated for the image. This checksum value is written to the microcontroller. The value is burned into the microcontroller using the PMICs. Further, responses to the checksum mismatch are burned into the microcontroller using the PMICs that are present in the microcontroller.
    Type: Application
    Filed: July 1, 2022
    Publication date: October 20, 2022
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Publication number: 20220326287
    Abstract: Provided is a method for collecting sensor data using time-domain reflectometry (TDR). A primary device transmits a TDR signal to a first sensor. A reflected signal is received in response to the transmitted TDR signal. The reflected signal is analyzed to determine an impedance of the first sensor. Based on the impedance of the first sensor, a sensor value for the first sensor is determined.
    Type: Application
    Filed: June 22, 2022
    Publication date: October 13, 2022
    Inventors: Eric J. Campbell, Christopher Steffen, Chad Albertson, Nicholas Ollerich
  • Patent number: 11409882
    Abstract: A system and method for providing a secure image load. The system includes a microcontroller. The microcontroller has a plurality of physically modifiable internal components (PMIC). Each of the plurality of PMICs can only be modified one time. The system further includes an image loader configured to load a boot image from the memory of the microcontroller, and a checksum calculator configured to calculate a checksum value for the boot image. The system further includes a checksum burner configured to modify the plurality of PMICs to create a binary representation of the checksum value for the image. A checksum value is calculated for the image. This checksum value is written to the microcontroller. The value is burned into the microcontroller using the PMICs. Further, responses to the checksum mismatch are burned into the microcontroller using the PMICs that are present in the microcontroller.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: August 9, 2022
    Assignee: International Business Machines Corporation
    Inventors: Christopher Steffen, Chad Albertson, Nicholas Ollerich, Eric J. Campbell
  • Patent number: 11402418
    Abstract: Provided is a method for collecting sensor data using time-domain reflectometry (TDR). A primary device transmits a TDR signal to a first sensor. A reflected signal is received in response to the transmitted TDR signal. The reflected signal is analyzed to determine an impedance of the first sensor. Based on the impedance of the first sensor, a sensor value for the first sensor is determined.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: August 2, 2022
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Campbell, Christopher Steffen, Chad Albertson, Nicholas Ollerich
  • Publication number: 20220182371
    Abstract: Aspects described herein include a computer-implemented method (and related system and computer program product) comprising receiving, from a bonding service, an authorization request for a predefined authorized use of a good or service by a user. The authorization request indicates that the user meets one or more predefined criteria for the predefined authorized use. The method further comprises determining one or more penalty conditions of a bonding agreement for the predefined authorized use by the user, and receiving, from the bonding service, a confirmation that the user agrees to meet the one or more penalty conditions of the bonding agreement. The method further comprises receiving, from an owner of the good or service, an authorization of the authorization request, and transmitting, responsive to authorization of the authorization request, a token to the bonding service that enables the user to access the predefined authorized use of the good or service.
    Type: Application
    Filed: December 7, 2020
    Publication date: June 9, 2022
    Inventors: Mark S. FREDRICKSON, Scott D. FREI, Chad ALBERTSON, Jeb R. LINTON
  • Patent number: 11341034
    Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: May 24, 2022
    Assignee: International Business Machines Corporation
    Inventors: Chad Albertson, John Borkenhagen, Scott D. Frei, David G. Wheeler, Mark S. Fredrickson
  • Patent number: 11263332
    Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler