Patents by Inventor James R. Kraemer

James R. Kraemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9886674
    Abstract: A processor marks non-linear attributes of each member of a known cohort by marking fields associated with the non-linear attributes in a database used to store information about members of the known cohort, where the known cohort is a task directed community that has a known agenda, where each of the non-linear attributes is individually unrelated to the known agenda, and where there is no logical nexus between any of the non-linear attributes and a particular person's membership in the known cohort. The processor utilizes marked fields in the database to identify common non-linear attributes that are shared by multiple members of the known cohort, and defines a paradigmatic member of the known cohort. The processor maps and tags the paradigmatic member in the database for future retrieval.
    Type: Grant
    Filed: July 25, 2016
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer
  • Patent number: 9881253
    Abstract: A sensor system comprises: an energy storage device; an intermittent energy release device electrically coupled to the energy storage device, wherein the intermittent energy release device causes the energy storage device to release stored energy intermittently; a sensor electrically coupled to the energy storage device; a register electrically coupled to the sensor, wherein the register stores readings from the sensor; a synaptic neural network core electrically coupled to the sensor, wherein the synaptic neural network core converts the readings from the sensor into a synthetic context-based object that is derived from the readings and a context object; a transponder electrically coupled to the synaptic neural network core; and a storage buffer within the transponder, wherein the storage buffer stores the synthetic context-based object for transmission by the transponder to a monitoring system.
    Type: Grant
    Filed: November 7, 2014
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Wendy A. Belluomini, Robert R. Friedlander, James R. Kraemer
  • Publication number: 20180019873
    Abstract: A social networking system, computer program product, and methods with a Personal Avatar executing on a first server node and a zero knowledge Arbiter executing on a second server node in a network of the social networking system. The Personal Avatar communicates social networking system messages in a communication session using a zero knowledge protocol with the zero knowledge Arbiter executing on the second server node operating in zero knowledge and using zero knowledge verifiable computing to enforce usage conditions on social networking system messages communicated in a communication session with the zero knowledge Arbiter. The zero knowledge Personal Avatar communicates social networking system messages in a communication session using a zero knowledge protocol with the zero knowledge Arbiter. The methods ensure privacy of an end user of the social networking system.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: James R. KRAEMER, Jeb R. LINTON
  • Patent number: 9846883
    Abstract: A computer implemented method, apparatus, and computer usable program code for generating customized marketing messages using automatically generated customer identification data. In one embodiment, real-time data for a customer is received from a set of cameras associated with a retail facility to form detection data. The customer is automatically identified using the detection data to form customer identification data. Automatically identifying the customer occurs without human input. A customized marketing message is generated for the customer using the customer identification data.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: December 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert Lee Angell, James R. Kraemer
  • Patent number: 9832199
    Abstract: A computer-implemented method, system, and/or computer program product protects access to hardware devices through use of a secure processor. A security computer receives a request from a requesting computer for access to a hardware device on a network. A secure processor within the security computer encrypts the request to generate an encrypted request, which is generated within a core of the secure processor. The secure processor protects a secure application that is used to process the request from other software on the secure processor. The security computer transmits the encrypted request to the hardware device, and then receives an encrypted acknowledgement of the encrypted request from a processor associated with the hardware device. The security computer then creates a communication session between the requesting computer and the hardware device.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Richard H. Boivie, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9819653
    Abstract: A computer-implemented method, system, and/or computer program product protects access to resources through use of a secure processor. A resource server receives an encrypted request from a requesting computer for access to a requested resource within the resource server. The requested resource is physically within an isolation area in the resource server that is initially communicatively protected from a network that connects the requesting computer to the resource server. The resource server establishes a communication session between a first secure processor in the resource server and a second processor in the requesting computer to provide secure communication between the requesting computer and the requested resource.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: November 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Richard H. Boivie, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9811683
    Abstract: A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by the computer system for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester by the computer system.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9785373
    Abstract: A method, system, and/or computer program product stores and retrieves payload data using a ternary content addressed memory (TCAM) hybrid memory. TCAM data is transmitted to a context masking device. The TCAM data identifies a type of payload data, and the context masking device masks the TCAM data with a context mask to create a masked TCAM data. One or more processors append the masked TCAM to payload data to create multiple stored units of TCAM-identified payload data in a location addressable store (LAS). The processor(s) receive a request for data. The request includes a masked request TCAM data that identifies a content and context of requested data. An exclusive OR (XOR) chip identifies relevant payload data within the LAS that are within a predefined Hamming distance of the masked request TCAM data. The processor(s) return the relevant payload data within the LAS to the requester.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
  • Publication number: 20170278100
    Abstract: A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a transaction. Based upon the request, selecting one or more computational resources from a set of a plurality of computational resources using zero-knowledge verifiable computing. In response to receiving authorization from each of the computational resources that they are capable of performing the zero-knowledge verifiable computing transactions to carry out at least a portion of the request, executing the program using zero-knowledge verifiable computing to carry out the request using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. Sending to the first user device and the second user device an output of the request.
    Type: Application
    Filed: March 25, 2016
    Publication date: September 28, 2017
    Inventors: James R. KRAEMER, Jeb R. LINTON
  • Publication number: 20170277909
    Abstract: A system, a computer readable storage medium, and methods for delivering content from a zero-knowledge edge server node in a content delivery network to an end user device, ensuring content control by a content provider (i.e. reduce piracy) while ensuring privacy of an end user device. One method includes publicizing that a particular content is available for download from the server node; initiating with the server node a communication session using a zero-knowledge protocol between the end user device and the server node operating in zero knowledge; downloading, while in the communication session, the particular content from the server node to the end user device; and receiving a response message from the end user device, including an indication of a content media player application, using the particular content, successfully executed at the end user device. The indication can be accompanied by a cryptographically verifiable proof of integrity.
    Type: Application
    Filed: March 28, 2016
    Publication date: September 28, 2017
    Inventors: James R. KRAEMER, Jeb R. LINTON
  • Publication number: 20170277904
    Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include a content request receiving circuit configured to receive a service request from a user, to communicate the service request to a provider, and to receive pre-approved versions of content from the provider, a content matching circuit configured to match a pre-approved version of content of the pre-approved versions of content to the user based on a condition of the user, a user data receiving circuit configured to receive user data to complete the pre-approved version of the content, and a zero-knowledge verifiable computing circuit configured to execute a program using zero-knowledge verifiable computing to remove private content from the pre-approved version of the content to ensure privacy of the condition of the user from the provider.
    Type: Application
    Filed: March 24, 2016
    Publication date: September 28, 2017
    Inventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
  • Publication number: 20170279611
    Abstract: A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a stateless transaction based on combinational logic. An output of the combinational logic is a function of only the one or more inputs. Based upon the request, a program is selected from a set of a plurality of programs using zero-knowledge verifiable computing to carry out the transaction. The program is executed using zero-knowledge verifiable computing. The execution of the program out the transaction based on combinational logic with the one or more inputs using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. The output of the combinational logic along with proof from the zero-knowledge protocol that the combinational logic was executed without alteration.
    Type: Application
    Filed: March 24, 2016
    Publication date: September 28, 2017
    Inventors: James R. KRAEMER, Jeb R. LINTON
  • Publication number: 20170270220
    Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.
    Type: Application
    Filed: June 2, 2017
    Publication date: September 21, 2017
    Applicant: International Business Machines Corporation
    Inventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
  • Patent number: 9741138
    Abstract: A processor-implemented method, system, and/or computer program product manages nodes in a graph database. Graph nodes in a graph database are organized into graph node clusters. A cluster edge, which describes a relationship between two of the graph node clusters, is generated to logically associate those two graph node clusters with one another.
    Type: Grant
    Filed: October 10, 2012
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9734464
    Abstract: A computer implemented method, apparatus, and computer usable program product for creating a labor standard for a task. The process automatically detects event data derived from a continuous video stream, wherein the event data comprises metadata describing a sequence of motions for performing the task, and parses the event data to identify appropriate event data describing a discrete set of motions from the sequence of motions. The process then analyzes, using an analysis server, the discrete set of motions to form a labor standard, wherein the labor standard specifies an optimal manner of performing the discrete set of motions. Thereafter, the process generates a set of recommendations for performing the task efficiently according to the labor standard.
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: August 15, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert Lee Angell, James R. Kraemer
  • Patent number: 9703894
    Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: July 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel Scott Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
  • Patent number: 9697898
    Abstract: A content addressable memory system, method and computer program product is described. The memory system comprises a location addressable store having data identified by location and multiple levels of content addressable stores each holding ternary content words. The content words are associated with references to data in the location addressable store and the content words containing at least one next entry bit for sorting content words in a physical ordered sequence to create content ordered memory. The content store levels might be implemented using different technologies that have different performance, capacity, and cost attributes. The memory system includes a content based cache for improved performance and a content addressable memory management unit for managing memory access operations and virtual memory addressing.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel Scott Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
  • Patent number: 9697240
    Abstract: A method, system, and/or computer program product associates new contextual state information about a changed data structure with a beneficial target data. Event data, which describes an event that modifies a data structure, is incorporated into the data structure to create a changed data structure state. New contextual state information, which describes the changed data structure state, is generated and transmitted to multiple beneficial target data stores, wherein applying the new contextual state information to a particular beneficial target data affects an activity that utilizes the particular beneficial target data.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Harold L. Ossher, David M. Ungar
  • Publication number: 20170180298
    Abstract: Technical solutions are described for action recommendation in a multimodal messaging system. An example method includes accessing a prior message received by a user. The method also includes identifying a first set of attributes associated with the prior message. The method also includes identifying a prior action selected by the user in response to the prior message. The method also includes receiving a new message directed for the user. The method also includes identifying a second set of attributes associated with the new message. The method also includes generating a list of recommended actions in response to the new message based on a comparison of the first set of attributes and the second set of attributes. The method also includes presenting the list of recommended actions to the user.
    Type: Application
    Filed: December 21, 2015
    Publication date: June 22, 2017
    Inventors: Pierre E. Arbajian, James R. Kraemer, Jeb R. Linton
  • Publication number: 20170178263
    Abstract: A system, method, and computer readable storage medium configured for delivering services from a server to ensure multimedia content control by content providers (i.e. reduce piracy) and to ensure privacy by content users is described. The method begins with executing at least a portion of a content media player application to the device using a zero-knowledge protocol to ensure privacy of the user. Examples of zero-knowledge verifiable computing are succinct computational integrity and privacy (SCIP) protocol, zero-knowledge succinct non-interactive argument of knowledge (zk-snark) protocol, and probabilistically checkable proof (PCP) protocol. The content media player application includes digital right management technology using zero-knowledge verifiable computing to enforce usage conditions on the multimedia content. A response is received from the user device that the content media player application has executed on the user device.
    Type: Application
    Filed: December 16, 2015
    Publication date: June 22, 2017
    Inventors: James R. KRAEMER, Jeb R. LINTON