Patents by Inventor Charles Osborn

Charles Osborn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190190052
    Abstract: Various embodiments of the present disclosure provide a fuel cell tube including one or more laterally segmented fuel cells each including multiple fuel cell portions that are electrically isolated from one another. When assembled into a fuel cell stack, tube interconnects electrically connect adjacent fuel cell tubes via their respective laterally segmented fuel cells. The use of laterally segmented fuel cells to effect the fuel cell tube-to-fuel cell tube electrical connection enables more accurate testing of the electrical connection between adjacent fuel cell tubes.
    Type: Application
    Filed: May 4, 2018
    Publication date: June 20, 2019
    Applicant: LG Fuel Cell Systems, Inc.
    Inventors: Ed Daum, Richard Goettler, Zhien Liu, Charles Osborne
  • Publication number: 20190157704
    Abstract: A fuel cell system is provided. The fuel cell system may be a segmented-in-series, solid-oxide fuel cell system. The fuel cell system may comprise a first and second fuel cell tube and a secondary interconnect.
    Type: Application
    Filed: November 17, 2017
    Publication date: May 23, 2019
    Applicant: LG Fuel Cell Systems, Inc.
    Inventors: Zhien Liu, Ed Daum, Rich Goettler, Charles Osborne
  • Publication number: 20180363921
    Abstract: A home cooking appliance includes a housing having a cooktop surface on a top of the housing, a burner on the cooktop surface, a cooking grate disposed above the burner, a cooking compartment in the housing, an oven flue that exhausts air from the cooking compartment, and a flue gas air diverter configured to divert the air exiting from the oven flue under a portion of the cooking grate.
    Type: Application
    Filed: July 29, 2015
    Publication date: December 20, 2018
    Inventors: Ben Braden, Robert Ladner, Richard Moyers, Charles Osborne, Timothy Russell
  • Patent number: 10110611
    Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: October 23, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 9973480
    Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: May 15, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 9747129
    Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.
    Type: Grant
    Filed: October 22, 2015
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
  • Publication number: 20170132330
    Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.
    Type: Application
    Filed: January 23, 2017
    Publication date: May 11, 2017
    Inventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
  • Publication number: 20170093818
    Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.
    Type: Application
    Filed: June 28, 2016
    Publication date: March 30, 2017
    Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
  • Publication number: 20170093879
    Abstract: A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted over a network that may be insecure. The method includes the processor obtaining a request from a source to send a message to a target, where the request includes the message and a context indicating a requested security level for the message. The processor encrypts the message based on ascertaining the message received in the request is a plaintext. The processor authenticates the encrypted message based on ascertaining the encrypted message is a ciphertext, where the target is enabled to trace the authenticated ciphertext back to the source. The processor transmits the authenticated encrypted message to the target across the network.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: John C. Dayka, Michael Charles Osborne, Tamas Visegrady
  • Publication number: 20170030589
    Abstract: A home cooking appliance includes a housing having a cooktop surface on a top of the housing, a burner on the cooktop surface, a cooking grate disposed above the burner, a cooking compartment in the housing, an oven flue that exhausts air from the cooking compartment, and a flue gas air diverter configured to divert the air exiting from the oven flue under a portion of the cooking grate.
    Type: Application
    Filed: July 29, 2015
    Publication date: February 2, 2017
    Inventors: Ben Braden, Robert Ladner, Richard Moyers, Charles Osborne, Timothy Russell
  • Publication number: 20160117189
    Abstract: Graph data of a DAG is received. The data describes a module to be started by way of nodes connected by edges, wherein some nodes are submodule nodes that correspond to submodules of said module. Submodule nodes are connected via edge(s) that reflect a data dependency between the corresponding submodules. Each of said submodules is a hardware module or a software submodule, capable of producing and/or consuming data that can be consumed and/or produced, by other submodule(s) of said module, based on the DAG. Asynchronous execution is started of two of said submodules, respectively corresponding to two submodule nodes located in independent branches of the DAG. A third submodule node(s) is determined that is a descendant of each of said two submodule nodes, according to an outcome of the execution of the corresponding two submodules. Execution is started of a third submodule that corresponds to the determined third submodule node.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 28, 2016
    Inventors: Michael Charles Osborne, Elaine Rivette Palmer, Tamas Visegrady
  • Patent number: 8990912
    Abstract: Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8914637
    Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: December 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8892892
    Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: November 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8763906
    Abstract: A method of decoding a two-dimensional enhanced-density barcode. A first and a second barcode are encoded in the enhanced-density barcode. The enhanced-density barcode includes a set of blocks. Each block includes a predefined number of sub-pixels. The blocks of the enhanced-density barcode being arranged relatively to each other in a geometrical lattice having a first and a second lattice direction. The method includes the steps of distorting of the enhanced-density barcode in the first lattice direction, resulting in a first distorted barcode, distorting of the enhanced-density barcode in the second lattice direction, resulting in a second distorted barcode, reconstructing the first barcode by low-pass filtering the first distorted barcode, reconstructing the second barcode by low-pass filtering the second distorted barcode.
    Type: Grant
    Filed: August 9, 2012
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8636218
    Abstract: An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: January 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8448864
    Abstract: An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor. Also provided is a multi-modal barcode including a single-dimensional grayscale structure, wherein the structure is stretched in a perpendicular direction to its single-directional axis.
    Type: Grant
    Filed: June 11, 2012
    Date of Patent: May 28, 2013
    Assignee: International Business Machines Corporation
    Inventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
  • Publication number: 20120324230
    Abstract: A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.
    Type: Application
    Filed: August 23, 2012
    Publication date: December 20, 2012
    Applicant: International Business Machines Corporation
    Inventors: Michael Charles Osborne, Tamas Visegrady
  • Publication number: 20120307254
    Abstract: A modal-domain optical fiber sensor device having the sensing fiber constructed of multimode optical fiber, reflectively terminated on one end, the non-terminated end receiving coherent light and outputting speckle pattern light that is geometrically filtered by at least one detection fibers' diameter, angular position, or physical location in relation to the sensing fiber's non-terminated end. The coherent light is directed from a coherent source to the sensing fiber's non-terminated end by at least one injection optical fiber that is oriented side by side with the detection fibers, and secured within a launch optical coupler (LOC). The LOC secures the non-terminated end of the sensing in light communication with the detection optical fibers and injection optical fibers.
    Type: Application
    Filed: June 6, 2011
    Publication date: December 6, 2012
    Applicant: PICOKINETIX LLC
    Inventors: Robert Globus, Charles Osborne, Peter Lovely
  • Publication number: 20120298745
    Abstract: A method of decoding a two-dimensional enhanced-density barcode. A first and a second barcode are encoded in the enhanced-density barcode. The enhanced-density barcode includes a set of blocks. Each block includes a predefined number of sub-pixels. The blocks of the enhanced-density barcode being arranged relatively to each other in a geometrical lattice having a first and a second lattice direction. The method includes the steps of distorting of the enhanced-density barcode in the first lattice direction, resulting in a first distorted barcode, distorting of the enhanced-density barcode in the second lattice direction, resulting in a second distorted barcode, reconstructing the first barcode by low-pass filtering the first distorted barcode, reconstructing the second barcode by low-pass filtering the second distorted barcode.
    Type: Application
    Filed: August 9, 2012
    Publication date: November 29, 2012
    Applicant: International Business Machines Corporation
    Inventors: Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady