Patents by Inventor Christopher V. DeRobertis

Christopher V. DeRobertis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11669602
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked and a controller. The controller is receptive of an instruction to authorize users to unlock the securable resource and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: June 6, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11531787
    Abstract: A system is provided. The system includes a computing resource, a cable insertable into the computing resource, a locking element and a controller. The locking element is configured to assume a locked condition in which the cable is locked to the computing resource or prevented from insertion into the computing resource and an unlocked condition in which the cable is removable from the computing resource and permitted to be inserted into the computing resource. The controller is configured to define rules for users. The rules are associated with respective identifiers (IDs) of each of the users and establish criteria associated with each user for causing the locking element to assume one of the locked and unlocked conditions.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: December 20, 2022
    Assignee: International Business Machines Corporation
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20220282980
    Abstract: Aspects include detecting, at a first point in time, that a first person at a first location is within a vicinity of one or more other people and predicting, for each of the one or more people, a future location of the other person at a future point. The future point in time is subsequent to the first point in time and a confidence level is assigned to the prediction. A travel route from the first location to a destination location is generated based at least in part on the one or more predicted future locations and their assigned confidence levels. The generated travel route includes travel route locations that are more than a specified distance from at least one of the predicted future locations having an assigned confidence level greater than a confidence level threshold. Travel route guidance along the generated travel route is provided to the first person.
    Type: Application
    Filed: March 3, 2021
    Publication date: September 8, 2022
    Inventors: Daniel James Winarski, Itzhack Goldberg, Michael D. Hocker, Christopher V. DeRobertis, David Wayne Glass, Clifford A. Pickover
  • Patent number: 11368287
    Abstract: Embodiments include encrypting an object such that the creator of the encrypted object can be identified. Aspects include receiving, by a processor, an unencrypted object that includes plaintext and metadata that describes the plaintext and obtaining, by the processor in response to a request from a user, a data encryption key (DEK) and a nonce key for the unencrypted object, the nonce key being unique to the user. Aspects also include encrypting, by the processor, the unencrypted object. The encrypting includes generating a nonce based at least in part of the plaintext and the nonce key and generating ciphertext and a metadata authentication tag comprising a signature of the metadata, the generating based at least in part on the plaintext, the metadata, the DEK, and the nonce. Aspects further include creating an encrypted object that includes the ciphertext, the metadata, and the metadata authentication tag.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: June 21, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anthony Thomas Sofia, Christopher V. Derobertis, Jason G. Katonica
  • Publication number: 20220191693
    Abstract: A computer-implemented method for remote management of hardware security modules (HSMs) includes receiving a command request from a mobile device. The command request includes an encrypted key part and an encrypted signing key. The HSM decrypts the command request using a key associated with a security zone of the mobile device. The HSM decrypts the encrypted key part and the encrypted signing key. Decrypting the encrypted key part and the encrypted signing key includes using the key associated with the security zone of the mobile device and a key associated with a remote administrator associated with the mobile device. A command is generated for a domain with a target HSM. The command is generated using the decrypted key part and the decrypted signing key. The command is transmitted to the domain for execution by the target HSM. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: December 11, 2020
    Publication date: June 16, 2022
    Inventors: Garry Joseph Sullivan, James Richard Coon, Michael Joseph Jordan, Michael J. Young, Jessica Doherty, Christopher V. DeRobertis
  • Patent number: 11341279
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a first controller, which is receptive of an instruction to authorize users to unlock the securable resource, and a common interface to which the first controller and additional controllers, which are independent from the first controller and one another, are tied. The first controller is configured to authenticate the users and to perform operating system (OS) level control of the locking element in accordance with the instruction to authorize users and an authentication of the users by the common interface.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: May 24, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11341278
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a controller and a physical authentication interface. The controller is receptive of an instruction to authorize users to unlock the securable resource and configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication. The physical authentication interface is configured to enable or disable a capability of the controller to perform the OS level authentication.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: May 24, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11289852
    Abstract: A cable assembly is provided. The cable assembly includes a cable element, a plug element to which a terminal end of the cable element is connected and which is configured to be plugged into a plug receptor, a sensor and an analysis engine. The sensor is disposed along the cable element or in the plug element and is configured to sense a manipulation of at least one of the cable element and the plug element relative to the plug receptor and to issue signals indicative of sensing results. The analysis engine is receptive of the signals and is configured to analyze the signals to determine a type of the manipulation and to determine whether to take an action responsive to the manipulation.
    Type: Grant
    Filed: February 7, 2020
    Date of Patent: March 29, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11210427
    Abstract: A system is provided and includes a resource, locking elements and a controller. The resource includes multiple independently securable resources. The locking elements are respectively configured to assume a locked condition in which corresponding ones of the multiple independently securable resources are locked and an unlocked condition in which the corresponding ones of the multiple securable resources are unlocked. The controller is receptive of an instruction to authorize users to unlock the one or more of the multiple independently securable resources and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking elements in accordance with the instruction to authorize users and the OS level authentication.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: December 28, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20210367761
    Abstract: Embodiments include encrypting an object such that the creator of the encrypted object can be identified. Aspects include receiving, by a processor, an unencrypted object that includes plaintext and metadata that describes the plaintext and obtaining, by the processor in response to a request from a user, a data encryption key (DEK) and a nonce key for the unencrypted object, the nonce key being unique to the user. Aspects also include encrypting, by the processor, the unencrypted object. The encrypting includes generating a nonce based at least in part of the plaintext and the nonce key and generating ciphertext and a metadata authentication tag comprising a signature of the metadata, the generating based at least in part on the plaintext, the metadata, the DEK, and the nonce. Aspects further include creating an encrypted object that includes the ciphertext, the metadata, and the metadata authentication tag.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventors: ANTHONY THOMAS SOFIA, CHRISTOPHER V. DEROBERTIS, JASON G. KATONICA
  • Patent number: 11116398
    Abstract: Methods, systems and computer program products for detecting contagious diseases in a wildlife population using a drone are provided. Aspects include monitoring, by a drone, a geographic area and capture images of the geographic area and analyzing the captured images to identify a deceased wildlife in a region of the geographic area. Aspects also include performing increased monitoring of the region and capture supplemental images of the region using the drone and analyzing the supplemental images to identify a number of deceased wildlife in the region. Based on a determination that number of deceased wildlife in the region, greater than a threshold number, a corrective action is taken.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Christopher V. Derobertis, Louie A. Dickens, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Publication number: 20210249818
    Abstract: A cable assembly is provided. The cable assembly includes a cable element, a plug element to which a terminal end of the cable element is connected and which is configured to be plugged into a plug receptor, a sensor and an analysis engine. The sensor is disposed along the cable element or in the plug element and is configured to sense a manipulation of at least one of the cable element and the plug element relative to the plug receptor and to issue signals indicative of sensing results. The analysis engine is receptive of the signals and is configured to analyze the signals to determine a type of the manipulation and to determine whether to take an action responsive to the manipulation.
    Type: Application
    Filed: February 7, 2020
    Publication date: August 12, 2021
    Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 11080970
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: August 3, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10999305
    Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: May 4, 2021
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10970976
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: April 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10916889
    Abstract: A locking element for use with a cable having a plug insertable into a plug receiver of a housing is provided. The locking element includes a connector body connected to the plug and including a receiving feature insertable through an aperture of the housing. The locking element further includes a locking feature configured to assume one of a locked condition in which the locking feature locks onto the receiving feature or prevents insertion of the receiving feature through the aperture and an unlocked condition in which the locking feature unlocks the receiving feature or permits insertion of the receiving feature through the aperture and an actuator coupled to the locking feature and configured to control the locking feature to assume the one of the locked and unlocked conditions.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: February 9, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew C. M. Hicks, Khaalid Persaud Juggan McMillan, Christopher V. DeRobertis, Ryan Thomas Rawlins
  • Publication number: 20210034787
    Abstract: A system is provided and includes a resource, locking elements and a controller. The resource includes multiple independently securable resources. The locking elements are respectively configured to assume a locked condition in which corresponding ones of the multiple independently securable resources are locked and an unlocked condition in which the corresponding ones of the multiple securable resources are unlocked. The controller is receptive of an instruction to authorize users to unlock the one or more of the multiple independently securable resources and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking elements in accordance with the instruction to authorize users and the OS level authentication.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20210034786
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a first controller, which is receptive of an instruction to authorize users to unlock the securable resource, and a common interface to which the first controller and additional controllers, which are independent from the first controller and one another, are tied. The first controller is configured to authenticate the users and to perform operating system (OS) level control of the locking element in accordance with the instruction to authorize users and an authentication of the users by the common interface.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20210036463
    Abstract: A locking element for use with a cable having a plug insertable into a plug receiver of a housing is provided. The locking element includes a connector body connected to the plug and including a receiving feature insertable through an aperture of the housing. The locking element further includes a locking feature configured to assume one of a locked condition in which the locking feature locks onto the receiving feature or prevents insertion of the receiving feature through the aperture and an unlocked condition in which the locking feature unlocks the receiving feature or permits insertion of the receiving feature through the aperture and an actuator coupled to the locking feature and configured to control the locking feature to assume the one of the locked and unlocked conditions.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, Khaalid Persaud Juggan McMillan, Christopher V. DeRobertis, RYAN THOMAS RAWLINS
  • Publication number: 20210034722
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked and a controller. The controller is receptive of an instruction to authorize users to unlock the securable resource and is configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, Ryan Thomas Rawlins, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan