Patents by Inventor Arnaud A. Mathieu

Arnaud A. Mathieu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10949939
    Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
  • Patent number: 10949938
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
  • Patent number: 10686765
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Patent number: 10375457
    Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20190102855
    Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.
    Type: Application
    Filed: November 16, 2018
    Publication date: April 4, 2019
    Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
  • Publication number: 20180309739
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: February 9, 2018
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180309738
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: April 19, 2017
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180300831
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.
    Type: Application
    Filed: April 18, 2017
    Publication date: October 18, 2018
    Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
  • Publication number: 20180220206
    Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 2, 2018
    Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Patent number: 8635618
    Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.
    Type: Grant
    Filed: November 20, 2007
    Date of Patent: January 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead
  • Publication number: 20090133026
    Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Inventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead