Patents by Inventor CHAD M. ALBERTSON

CHAD M. ALBERTSON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11776574
    Abstract: Techniques for authentication of digital recordings are provided. An element of encrypted data is output in a recording environment. The element of encrypted data, embedded in a digital recording comprising at least one of audio data and image data captured in the recording environment, is extracted. A decrypted value is generated based on a private key and the first element of encrypted data, and the first decrypted value and a stored value associated with a first element of the digital recording are compared. The digital recording is authenticated based on the first decrypted value substantially matching the stored value.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
  • Patent number: 10957355
    Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
  • Patent number: 10927567
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Grant
    Filed: January 1, 2019
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Patent number: 10796030
    Abstract: Detecting an attempted theft of information stored in an RFID-enabled card, including: receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: October 6, 2020
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Patent number: 10791628
    Abstract: A method of forming an multi-chip carrier that includes providing a trace structure using an additive forming method. The method includes forming a metal layer on a trace structure to provide electrically conductive lines. A dielectric material may then be formed on the electrically conductive lines to encapsulate a majority of the electrically conductive lines. The ends of the electrically conductive lines that are exposed through the upper surface of the dielectric material provide a top processor mount location and the ends of the electrically conductive lines that are exposed through the sidewalls of the dielectric material provide a sidewall processor mount location.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: September 29, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Patent number: 10554347
    Abstract: Low latency corrupt data tagging on a cross-chip link including receiving, from the cross-chip link, a control flit comprising a virtual channel identifier for an incoming data flit; storing the virtual channel identifier in a data pipeline and a bad data indicator (BDI) pipeline; receiving, from the cross-chip link, the incoming data flit into the data pipeline; moving, based on the virtual channel identifier in the data pipeline, the data flit from the data pipeline into an entry in a virtual channel queue corresponding to the virtual channel identifier; receiving, from the cross-chip link, a BDI for the data flit into the BDI pipeline; and moving, based on the virtual channel identifier in the BDI pipeline, the BDI for the data flit from the BDI pipeline into an entry in a BDI array corresponding to the entry in the virtual channel queue storing the data flit.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen, Curtis C. Wollbrink
  • Publication number: 20190327833
    Abstract: A method of forming an multi-chip carrier that includes providing a trace structure using an additive forming method. The method includes forming a metal layer on a trace structure to provide electrically conductive lines. A dielectric material may then be formed on the electrically conductive lines to encapsulate a majority of the electrically conductive lines. The ends of the electrically conductive lines that are exposed through the upper surface of the dielectric material provide a top processor mount location and the ends of the electrically conductive lines that are exposed through the sidewalls of the dielectric material provide a sidewall processor mount location.
    Type: Application
    Filed: July 3, 2019
    Publication date: October 24, 2019
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Patent number: 10426030
    Abstract: A method of forming an multi-chip carrier that includes providing a trace structure using an additive forming method. The method includes forming a metal layer on a trace structure to provide electrically conductive lines. A dielectric material may then be formed on the electrically conductive lines to encapsulate a majority of the electrically conductive lines. The ends of the electrically conductive lines that are exposed through the upper surface of the dielectric material provide a top processor mount location and the ends of the electrically conductive lines that are exposed through the sidewalls of the dielectric material provide a sidewall processor mount location.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: September 24, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20190267036
    Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Inventors: Chad M. ALBERTSON, Mark S. FREDRICKSON, David G. WHEELER, Scott D. FREI
  • Patent number: 10396944
    Abstract: Low latency corrupt data tagging on a cross-chip link including receiving, from the cross-chip link, a control flit comprising a virtual channel identifier for an incoming data flit; storing the virtual channel identifier in a data pipeline and a bad data indicator (BDI) pipeline; receiving, from the cross-chip link, the incoming data flit into the data pipeline; moving, based on the virtual channel identifier in the data pipeline, the data flit from the data pipeline into an entry in a virtual channel queue corresponding to the virtual channel identifier; receiving, from the cross-chip link, a BDI for the data flit into the BDI pipeline; and moving, based on the virtual channel identifier in the BDI pipeline, the BDI for the data flit from the BDI pipeline into an entry in a BDI array corresponding to the entry in the virtual channel queue storing the data flit.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen, Curtis C. Wollbrink
  • Publication number: 20190136579
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Application
    Filed: January 1, 2019
    Publication date: May 9, 2019
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20190089496
    Abstract: Low latency corrupt data tagging on a cross-chip link including receiving, from the cross-chip link, a control flit comprising a virtual channel identifier for an incoming data flit; storing the virtual channel identifier in a data pipeline and a bad data indicator (BDI) pipeline; receiving, from the cross-chip link, the incoming data flit into the data pipeline; moving, based on the virtual channel identifier in the data pipeline, the data flit from the data pipeline into an entry in a virtual channel queue corresponding to the virtual channel identifier; receiving, from the cross-chip link, a BDI for the data flit into the BDI pipeline; and moving, based on the virtual channel identifier in the BDI pipeline, the BDI for the data flit from the BDI pipeline into an entry in a BDI array corresponding to the entry in the virtual channel queue storing the data flit.
    Type: Application
    Filed: November 27, 2017
    Publication date: March 21, 2019
    Inventors: CHAD M. ALBERTSON, ERIC J. CAMPBELL, NICHOLAS J. OLLERICH, CHRISTOPHER W. STEFFEN, CURTIS C. WOLLBRINK
  • Publication number: 20190089495
    Abstract: Low latency corrupt data tagging on a cross-chip link including receiving, from the cross-chip link, a control flit comprising a virtual channel identifier for an incoming data flit; storing the virtual channel identifier in a data pipeline and a bad data indicator (BDI) pipeline; receiving, from the cross-chip link, the incoming data flit into the data pipeline; moving, based on the virtual channel identifier in the data pipeline, the data flit from the data pipeline into an entry in a virtual channel queue corresponding to the virtual channel identifier; receiving, from the cross-chip link, a BDI for the data flit into the BDI pipeline; and moving, based on the virtual channel identifier in the BDI pipeline, the BDI for the data flit from the BDI pipeline into an entry in a BDI array corresponding to the entry in the virtual channel queue storing the data flit.
    Type: Application
    Filed: September 19, 2017
    Publication date: March 21, 2019
    Inventors: CHAD M. ALBERTSON, ERIC J. CAMPBELL, NICHOLAS J. OLLERICH, CHRISTOPHER W. STEFFEN, CURTIS C. WOLLBRINK
  • Publication number: 20190009831
    Abstract: A vehicle with deployable pliable fairing skirts and a controller for controlling deployment of the skirts are provided. The pliable fairing skirts are deployable over openings of wheel wells for the vehicle to provide additional streamlining for the vehicle. The pliable fairing skirts are stowable when the brakes of the vehicle may benefit from additional cooling airflow. The skirts are also stowable when environmental conditions may result in damage to the skirts or when steerable wheels of the vehicle would protrude from the opening.
    Type: Application
    Filed: July 7, 2017
    Publication date: January 10, 2019
    Inventors: Chad M. ALBERTSON, Eric J. CAMPBELL, Nicholas J. OLLERICH, Christopher W. STEFFEN
  • Patent number: 10167655
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20180310403
    Abstract: A method of forming an multi-chip carrier that includes providing a trace structure using an additive forming method. The method includes forming a metal layer on a trace structure to provide electrically conductive lines. A dielectric material may then be formed on the electrically conductive lines to encapsulate a majority of the electrically conductive lines. The ends of the electrically conductive lines that are exposed through the upper surface of the dielectric material provide a top processor mount location and the ends of the electrically conductive lines that are exposed through the sidewalls of the dielectric material provide a sidewall processor mount location.
    Type: Application
    Filed: April 21, 2017
    Publication date: October 25, 2018
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20180209172
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Application
    Filed: January 25, 2017
    Publication date: July 26, 2018
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20180209173
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Application
    Filed: August 24, 2017
    Publication date: July 26, 2018
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Patent number: 10030416
    Abstract: A lock system and method for alerting a user or other entity that a lock has been or is being tampered with is disclosed. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Eric J. Campbell, Nicholas J. Ollerich, Christopher W. Steffen
  • Publication number: 20180121686
    Abstract: Detecting an attempted theft of information stored in an RFID-enabled card, including: receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventors: CHAD M. ALBERTSON, ERIC J. CAMPBELL, NICHOLAS J. OLLERICH, CHRISTOPHER W. STEFFEN