Patents by Inventor Anthony E. Martinez
Anthony E. Martinez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10742618Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: GrantFiled: July 30, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10712721Abstract: A network driven actuator mapping agent is provided. A system includes a sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction in the second environment.Type: GrantFiled: April 3, 2019Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony E. Martinez, Bradley S. Tagg
-
Patent number: 10623184Abstract: In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource. A processor associates the parameter with decryption information for the encrypted resource. A processor sends the encrypted resource to a computing device. A processor determines that the condition of the parameter has been met based on external information regarding the parameter. A processor sends the decryption information to the computing device.Type: GrantFiled: September 29, 2015Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Daniel F. D'Elena, Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20190227506Abstract: A network driven actuator mapping agent is provided. A system includes a sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction in the second environment.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventors: Anthony E. Martinez, Bradley S. Tagg
-
Patent number: 10295968Abstract: A network driven actuator mapping agent is provided. A system includes a sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction in the second environment.Type: GrantFiled: July 29, 2015Date of Patent: May 21, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony E. Martinez, Bradley S. Tagg
-
Publication number: 20180359226Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: ApplicationFiled: July 30, 2018Publication date: December 13, 2018Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10121513Abstract: Systems and methods for dynamic image content overlaying are disclosed. In embodiments, a computer-implemented method comprises analyzing one or more digital image frames for the presence of a placeholder, wherein the placeholder overlays a dynamic image space on a display object and includes a content identifier and a contour mesh; determining the content identifier; retrieving select image content based on the content identifier; determining an orientation of the dynamic image space; transforming the select image content to produce transformed image content that matches the contour mesh and the orientation of the dynamic image space; and replacing the placeholder with the transformed image content to produce a set of one or more embedded image frames.Type: GrantFiled: August 30, 2016Date of Patent: November 6, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10057220Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: GrantFiled: July 24, 2015Date of Patent: August 21, 2018Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20180211344Abstract: A method, executed by a computer, includes determining, via machine learning, skills associated with various positions in an organization, receiving a profile for a user including a current position for the user, and receiving a target position for the user. The method further includes determining from the profile for the user and the skills associated with various positions in an organization, one or more acquirable skills that would enable the user to achieve the target position from the current position, determining one or more professional development activities that correspond to the acquirable skills, and presenting the acquirable skills and the professional development activities to the user. A computer system and computer product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: September 29, 2017Publication date: July 26, 2018Inventors: Deirdre J. Angus, Alison E. Dalby, Kelli L. Jordan, Anthony E. Martinez, Ronald J. Salpietra
-
Publication number: 20180211343Abstract: A method, executed by a computer, includes determining, via machine learning, skills associated with various positions in an organization, receiving a profile for a user including a current position for the user, and receiving a target position for the user. The method further includes determining from the profile for the user and the skills associated with various positions in an organization, one or more acquirable skills that would enable the user to achieve the target position from the current position, determining one or more professional development activities that correspond to the acquirable skills, and presenting the acquirable skills and the professional development activities to the user. A computer system and computer product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: January 23, 2017Publication date: July 26, 2018Inventors: Deirdre J. Angus, Alison E. Dalby, Kelli L. Jordan, Anthony E. Martinez, Ronald J. Salpietra
-
Publication number: 20180061456Abstract: Systems and methods for dynamic image content overlaying are disclosed. In embodiments, a computer-implemented method comprises analyzing one or more digital image frames for the presence of a placeholder, wherein the placeholder overlays a dynamic image space on a display object and includes a content identifier and a contour mesh; determining the content identifier; retrieving select image content based on the content identifier; determining an orientation of the dynamic image space; transforming the select image content to produce transformed image content that matches the contour mesh and the orientation of the dynamic image space; and replacing the placeholder with the transformed image content to produce a set of one or more embedded image frames.Type: ApplicationFiled: August 30, 2016Publication date: March 1, 2018Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 9721366Abstract: In an approach to displaying data, one or more computer processors receive a plurality of coordinates of an overlay on a graphical data display, such that the plurality of coordinates indicate a position and a size of the overlay. The one or more computer processors retrieve one or more data points from the graphical data display. The one or more computer processors de-emphasize at least a portion of the one or more retrieved data points. The one or more computer processors display, in the overlay, one or more retrieved data points of the graphical data display that reside within the plurality of coordinates of the overlay.Type: GrantFiled: March 17, 2015Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Deanne S. Goard, Anthony E. Martinez, Hersh Sahai
-
Patent number: 9690469Abstract: Embodiments include a program for transferring of data from a source computer to a location on a target computer utilizing a drag-and-drop operation and a spring-loaded portal. I/O devices are monitored for mouse input that includes coordinates of a mouse pointer. Whether an end-user is utilizing the mouse pointer to perform the drag-and-drop operation is determined. The spring-loaded portal is expanded from a closed position to an open position. A screen snapshot image of the location on the target computer is retrieved and overlaid on the spring-loaded portal. The transferring of data from the source computer to the location on the target computer is executed, wherein the location on the target computer is previewable at the source computer through the spring-loaded portal. Whether to abort the transferring of data is determined. The spring-loaded portal is minimized from the open position to the closed position.Type: GrantFiled: May 28, 2014Date of Patent: June 27, 2017Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini
-
Publication number: 20170093574Abstract: In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource. A processor associates the parameter with decryption information for the encrypted resource. A processor sends the encrypted resource to a computing device. A processor determines that the condition of the parameter has been met based on external information regarding the parameter. A processor sends the decryption information to the computing device.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Inventors: Daniel F. D'Elena, Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20170026348Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: ApplicationFiled: July 24, 2015Publication date: January 26, 2017Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20160292621Abstract: A method and associated systems for automatically identifying a risk that a staffing resource identified by a proposed project-staffing plan will be unavailable. A computerized project-management tool, in response to receiving a proposed project plan, requests, receives, and aggregates information about other past, present, and expected projects and about expected supplies of, and competing demands for, staffing resources required by the proposed plan. The tool infers patterns, business rules, and trends from the received information, with which it adjusts the proposed project's planned start date, expected availabilities of required staffing resources, and expected competition for staffing resources. The tool then determines a likelihood that a sufficient supply of each of the plan's required staffing resources, as adjusted, will be available at the required times, as adjusted. If the risk is too high, the user may fine-tune the proposed plan by repeating the preceding steps with varying project parameters.Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Inventors: Lisa Ciccone, Daniel P. Connors, George A. Fioto, Jr., Munish Goyal, Pranav Gupta, Steven E. Heise, Jose Magno A. Junior, Anthony E. Martinez, Gyana R. Parija, Tracy C, Yasz
-
Publication number: 20160275661Abstract: In an approach to displaying data, one or more computer processors receive a plurality of coordinates of an overlay on a graphical data display, such that the plurality of coordinates indicate a position and a size of the overlay. The one or more computer processors retrieve one or more data points from the graphical data display. The one or more computer processors de-emphasize at least a portion of the one or more retrieved data points. The one or more computer processors display, in the overlay, one or more retrieved data points of the graphical data display that reside within the plurality of coordinates of the overlay.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Inventors: Deanne S. Goard, Anthony E. Martinez, Hersh Sahai
-
Publication number: 20150331403Abstract: A network driven actuator mapping agent is provided. A system includes a sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction in the second environment.Type: ApplicationFiled: July 29, 2015Publication date: November 19, 2015Inventors: Anthony E. Martinez, Bradley S. Tagg
-
Patent number: 9141907Abstract: A network driven actuator mapping agent is provided. A system includes a sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction in the second environment.Type: GrantFiled: August 20, 2013Date of Patent: September 22, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony E. Martinez, Bradley S. Tagg
-
Patent number: 8965541Abstract: A method, a computer program product, and a computer system initiate an exercise sequence on an exercise-integrated workstation. A set of active monitored activities is identified. A set of preferences and goals for the exercise sequence is identified. A set of accumulated details regarding any user modifications to previous exercise sequences is identified. A set of scheduled events is identified. Responsive to identifying the set of active monitored activities, the set of preferences and goals, the set of accumulated details, and the set of scheduled events, the method determines whether to initiate an exercise sequence. Responsive to determining to initiate the exercise sequence, the method initiates the exercise sequence.Type: GrantFiled: November 3, 2011Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini