Patents by Inventor Arnaud A. Mathieu
Arnaud A. Mathieu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10949938Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: GrantFiled: April 18, 2017Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Patent number: 10949939Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: GrantFiled: November 16, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Patent number: 10686765Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: GrantFiled: April 19, 2017Date of Patent: June 16, 2020Assignee: International Business Machines CorporationInventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Patent number: 10375457Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.Type: GrantFiled: February 2, 2017Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20190102855Abstract: Methods for chain of custody tracking for an object are described. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: ApplicationFiled: November 16, 2018Publication date: April 4, 2019Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Publication number: 20180309739Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: ApplicationFiled: February 9, 2018Publication date: October 25, 2018Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20180309738Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.Type: ApplicationFiled: April 19, 2017Publication date: October 25, 2018Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Publication number: 20180300831Abstract: Methods and apparatus, including computer program products, implementing and using techniques for chain of custody tracking for an object. Several sets of Internet of Things (IoT) sensors are organized in a network. Each set of sensors is configured to record one or more events relating to the object. Each event includes an event time, an event location, and an entity that is a custodian for the object at the time of the event. When the object changes custodians, proper custodianship is verified based on input from at least one set of IoT sensors.Type: ApplicationFiled: April 18, 2017Publication date: October 18, 2018Inventors: Jeffrey M. Achtermann, Rahul Gupta, Arnaud A. Mathieu, Maharaj Mukherjee
-
Publication number: 20180220206Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.Type: ApplicationFiled: February 2, 2017Publication date: August 2, 2018Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
-
Patent number: 8635618Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.Type: GrantFiled: November 20, 2007Date of Patent: January 21, 2014Assignee: International Business Machines CorporationInventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead
-
Publication number: 20090133026Abstract: An information technology services management product is provided with a change management component that identifies conflicts based on a wide range of information. When a change on a configuration item is scheduled, the change management component identifies, for example, affected business applications, affected service level agreements, resource availability, change schedule, workflow, resource dependencies, and the like. The change management component warns the user if a conflict is found. The user does not have to consult multiple sources of information and make a manual determination concerning conflicts. The change management component may also suggest a best time to schedule a change request based on the information available. The change management component provides a constrained interface such that the user cannot schedule a change request that violates any of the above requirements. The change management component also applies these requirements when changing an already scheduled change request.Type: ApplicationFiled: November 20, 2007Publication date: May 21, 2009Inventors: Vijay K. Aggarwal, Adam R. Holley, Arnaud A. Mathieu, Chakkalamattam J. Paul, Puthukode G. Ramachandran, Edward Whitehead
-
Publication number: 20070220510Abstract: The present invention provides a computer implemented method, apparatus, and computer usable program code for managing a software installation. A graphical user interface is displayed for receiving user input to manage a software installation having multiple software installation tasks. A particular software installation task is initiated in response to the particular software installation task being selected from the multiple software installation tasks. The performance of the particular task is customized based on the selection of the option in response to a selection of an option during execution of the particular software installation task is received. At least one of the multiple software installation tasks may be scheduled and initiated independently from others of the multiple software installation tasks.Type: ApplicationFiled: March 14, 2006Publication date: September 20, 2007Inventors: Denise Bell, Arnaud Mathieu, Andrei Oprea, Cristina Tecsa
-
Publication number: 20070168861Abstract: In a computing environment, a display shows the progress of the execution of a user or system initiated task. The display includes the current completion status of the task, and the completion results of the task. The completion results indicate the amount of the task that has been completed and indicates the results of the completion. This displays differs from conventional task status displays in that this display gives information about the progress of the task execution and the activities that occurred during the task execution.Type: ApplicationFiled: January 17, 2006Publication date: July 19, 2007Inventors: Denise Bell, Peter Kissa, Arnaud Mathieu
-
Publication number: 20060253658Abstract: There is provided a method, apparatus and program product for managing shared or reusable storage volumes in a data processing system. A storage allocation pool having a plurality of storage volumes to be shared or reused by a plurality of authorized machines is created. Access to the plurality of storage volumes in the storage allocation pool by a machine of the plurality of authorized machines is enabled during a storage provisioning period and is disabled following storage de-provisioning. By providing the storage volumes in a storage allocation pool, all storage volumes in the pool can be used by a plurality of machines, and data on the storage volumes will persist even if no machine is accessing the storage volumes.Type: ApplicationFiled: May 4, 2005Publication date: November 9, 2006Applicant: International Business Machines CorporationInventors: Arnaud Mathieu, Joseph Wigglesworth, Zhe Xu, Alice Yeung
-
Publication number: 20060253848Abstract: A method, apparatus, and computer usable code for deploying software in a data center and desktop computers. A set of software distribution applications within the data center or IT infrastructure are identified. In response to receiving a request to install software, installation parameters associated with the software to be installed are compared to characteristics for the set of software distribution applications. A software distribution application is selected from the set of software distribution applications based on comparing the installation parameters associated with the software to the characteristics for the set of software distribution applications. The selected software distribution application is used to install the software.Type: ApplicationFiled: May 5, 2005Publication date: November 9, 2006Applicant: International Business Machines CorporationInventors: Arnaud Mathieu, Puthukode Ramachandran