Patents by Inventor Charles Osborn
Charles Osborn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190190052Abstract: Various embodiments of the present disclosure provide a fuel cell tube including one or more laterally segmented fuel cells each including multiple fuel cell portions that are electrically isolated from one another. When assembled into a fuel cell stack, tube interconnects electrically connect adjacent fuel cell tubes via their respective laterally segmented fuel cells. The use of laterally segmented fuel cells to effect the fuel cell tube-to-fuel cell tube electrical connection enables more accurate testing of the electrical connection between adjacent fuel cell tubes.Type: ApplicationFiled: May 4, 2018Publication date: June 20, 2019Applicant: LG Fuel Cell Systems, Inc.Inventors: Ed Daum, Richard Goettler, Zhien Liu, Charles Osborne
-
Publication number: 20190157704Abstract: A fuel cell system is provided. The fuel cell system may be a segmented-in-series, solid-oxide fuel cell system. The fuel cell system may comprise a first and second fuel cell tube and a secondary interconnect.Type: ApplicationFiled: November 17, 2017Publication date: May 23, 2019Applicant: LG Fuel Cell Systems, Inc.Inventors: Zhien Liu, Ed Daum, Rich Goettler, Charles Osborne
-
Publication number: 20180363921Abstract: A home cooking appliance includes a housing having a cooktop surface on a top of the housing, a burner on the cooktop surface, a cooking grate disposed above the burner, a cooking compartment in the housing, an oven flue that exhausts air from the cooking compartment, and a flue gas air diverter configured to divert the air exiting from the oven flue under a portion of the cooking grate.Type: ApplicationFiled: July 29, 2015Publication date: December 20, 2018Inventors: Ben Braden, Robert Ladner, Richard Moyers, Charles Osborne, Timothy Russell
-
Patent number: 10110611Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.Type: GrantFiled: June 28, 2016Date of Patent: October 23, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
-
Patent number: 9973480Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.Type: GrantFiled: September 30, 2015Date of Patent: May 15, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
-
Patent number: 9747129Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.Type: GrantFiled: October 22, 2015Date of Patent: August 29, 2017Assignee: International Business Machines CorporationInventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
-
Publication number: 20170132330Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.Type: ApplicationFiled: January 23, 2017Publication date: May 11, 2017Inventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
-
Publication number: 20170093818Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.Type: ApplicationFiled: June 28, 2016Publication date: March 30, 2017Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
-
Publication number: 20170093879Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.Type: ApplicationFiled: September 30, 2015Publication date: March 30, 2017Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
-
Publication number: 20170030589Abstract: A home cooking appliance includes a housing having a cooktop surface on a top of the housing, a burner on the cooktop surface, a cooking grate disposed above the burner, a cooking compartment in the housing, an oven flue that exhausts air from the cooking compartment, and a flue gas air diverter configured to divert the air exiting from the oven flue under a portion of the cooking grate.Type: ApplicationFiled: July 29, 2015Publication date: February 2, 2017Inventors: Ben Braden, Robert Ladner, Richard Moyers, Charles Osborne, Timothy Russell
-
Publication number: 20160117189Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.Type: ApplicationFiled: October 22, 2015Publication date: April 28, 2016Inventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
-
Patent number: 8990912Abstract: Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer.Type: GrantFiled: April 17, 2009Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
-
Patent number: 8914637Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.Type: GrantFiled: August 23, 2012Date of Patent: December 16, 2014Assignee: International Business Machines CorporationInventors: Michael Charles Osborne, Tamas Visegrady
-
Patent number: 8892892Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.Type: GrantFiled: March 15, 2012Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Michael Charles Osborne, Tamas Visegrady
-
Patent number: 8763906Abstract: A method of decoding a two-dimensional enhanced-density barcode. A first and a second barcode are encoded in the enhanced-density barcode. The enhanced-density barcode includes a set of blocks. Each block includes a predefined number of sub-pixels. The blocks of the enhanced-density barcode being arranged relatively to each other in a geometrical lattice having a first and a second lattice direction. The method includes the steps of distorting of the enhanced-density barcode in the first lattice direction, resulting in a first distorted barcode, distorting of the enhanced-density barcode in the second lattice direction, resulting in a second distorted barcode, reconstructing the first barcode by low-pass filtering the first distorted barcode, reconstructing the second barcode by low-pass filtering the second distorted barcode.Type: GrantFiled: August 9, 2012Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
-
Patent number: 8636218Abstract: An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor.Type: GrantFiled: February 12, 2013Date of Patent: January 28, 2014Assignee: International Business Machines CorporationInventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
-
Patent number: 8448864Abstract: An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor. Also provided is a multi-modal barcode including a single-dimensional grayscale structure, wherein the structure is stretched in a perpendicular direction to its single-directional axis.Type: GrantFiled: June 11, 2012Date of Patent: May 28, 2013Assignee: International Business Machines CorporationInventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
-
Publication number: 20120324230Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.Type: ApplicationFiled: August 23, 2012Publication date: December 20, 2012Applicant: International Business Machines CorporationInventors: Michael Charles Osborne, Tamas Visegrady
-
Publication number: 20120307254Abstract: A modal-domain optical fiber sensor device having the sensing fiber constructed of multimode optical fiber, reflectively terminated on one end, the non-terminated end receiving coherent light and outputting speckle pattern light that is geometrically filtered by at least one detection fibers' diameter, angular position, or physical location in relation to the sensing fiber's non-terminated end. The coherent light is directed from a coherent source to the sensing fiber's non-terminated end by at least one injection optical fiber that is oriented side by side with the detection fibers, and secured within a launch optical coupler (LOC). The LOC secures the non-terminated end of the sensing in light communication with the detection optical fibers and injection optical fibers.Type: ApplicationFiled: June 6, 2011Publication date: December 6, 2012Applicant: PICOKINETIX LLCInventors: Robert Globus, Charles Osborne, Peter Lovely
-
Publication number: 20120298745Abstract: A method of decoding a two-dimensional enhanced-density barcode. A first and a second barcode are encoded in the enhanced-density barcode. The enhanced-density barcode includes a set of blocks. Each block includes a predefined number of sub-pixels. The blocks of the enhanced-density barcode being arranged relatively to each other in a geometrical lattice having a first and a second lattice direction. The method includes the steps of distorting of the enhanced-density barcode in the first lattice direction, resulting in a first distorted barcode, distorting of the enhanced-density barcode in the second lattice direction, resulting in a second distorted barcode, reconstructing the first barcode by low-pass filtering the first distorted barcode, reconstructing the second barcode by low-pass filtering the second distorted barcode.Type: ApplicationFiled: August 9, 2012Publication date: November 29, 2012Applicant: International Business Machines CorporationInventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady