Patents by Inventor Arnaud A. Mathieu
Arnaud A. Mathieu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10949939Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: GrantFiled: November 16, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Patent number: 10949938Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: GrantFiled: April 18, 2017Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Patent number: 10686765Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: GrantFiled: April 19, 2017Date of Patent: June 16, 2020Assignee: International Business Machines CorporationInventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Patent number: 10375457Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.Type: GrantFiled: February 2, 2017Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20190102855Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: ApplicationFiled: November 16, 2018Publication date: April 4, 2019Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Publication number: 20180309739Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: ApplicationFiled: February 9, 2018Publication date: October 25, 2018Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20180309738Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: ApplicationFiled: April 19, 2017Publication date: October 25, 2018Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20180300831Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: ApplicationFiled: April 18, 2017Publication date: October 18, 2018Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Publication number: 20180220206Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.Type: ApplicationFiled: February 2, 2017Publication date: August 2, 2018Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Patent number: 8635618Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.Type: GrantFiled: November 20, 2007Date of Patent: January 21, 2014Assignee: International Business Machines CorporationInventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead
-
Publication number: 20090133026Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.Type: ApplicationFiled: November 20, 2007Publication date: May 21, 2009Inventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead