Patents by Inventor David K. Wright

David K. Wright has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11917404
    Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
    Type: Grant
    Filed: March 7, 2023
    Date of Patent: February 27, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeb R. Linton, Michael Amisano, John Melchionne, Dennis Kramer, David K. Wright, John Behnken
  • Patent number: 11755981
    Abstract: Technology for voting, or endorsing with votes, a set of subjects under review, such as a group of human individual peers or a set of products. Each voter in this system is provided with an amount of voting credits that may be allocated among and between at least some of the subjects under review. In some embodiments a discounting scheme is applied to the voting credit allocations so that multiple credits allocated to a single subject will typically count for fewer net “votes” for the subject as the number of credits allocated to that single subject increases. In some embodiments, the discounting scheme is polynomial voting.
    Type: Grant
    Filed: May 17, 2021
    Date of Patent: September 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, David K. Wright, Michael Amisano, John Melchionne, John Behnken, Dennis Kramer
  • Publication number: 20230209342
    Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
    Type: Application
    Filed: March 7, 2023
    Publication date: June 29, 2023
    Inventors: Jeb R. LINTON, Michael AMISANO, John MELCHIONNE, Dennis KRAMER, David K. WRIGHT, John BEHNKEN
  • Patent number: 11676011
    Abstract: Embodiments are disclosed for a method for private transfer learning. The method includes generating a machine learning model comprising a training application programming interface (API) and an inferencing API. The method further includes encrypting the machine learning model using a predetermined encryption mechanism. The method additionally includes copying the encrypted machine learning model to a trusted execution environment. The method also includes executing the machine learning model in the trusted execution environment using the inferencing API.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, John Behnken, John Melchionne, Michael Amisano, David K. Wright
  • Patent number: 11627459
    Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: April 11, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeb R. Linton, Michael Amisano, John Melchionne, Dennis Kramer, David K. Wright, John Behnken
  • Patent number: 11604986
    Abstract: Training a deep neural network model using a trusted execution environment is provided. A selection of two or more encrypted files owned by different entities within a plurality of encrypted files containing sensitive datasets is made by a user of a client device. The two or more encrypted files owned by the different entities are decrypted within the trusted execution environment to form decrypted sensitive datasets owned by the different entities. The decrypted sensitive datasets owned by the different entities are combined within the trusted execution environment to form combined sensitive data owned by the different entities. The deep neural network model is generated within the trusted execution environment based on the combined sensitive data owned by the different entities. The deep neural network model is trained within the trusted execution environment using the combined sensitive data owned by the different entities.
    Type: Grant
    Filed: February 28, 2020
    Date of Patent: March 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Michael Amisano, John Behnken, Jeb R. Linton, John Melchionne, David K. Wright, Dennis Kramer
  • Publication number: 20220366349
    Abstract: Technology for voting, or endorsing with votes, a set of subjects under review, such as a group of human individual peers or a set of products. Each voter in this system is provided with an amount of voting credits that may be allocated among and between at least some of the subjects under review. In some embodiments a discounting scheme is applied to the voting credit allocations so that multiple credits allocated to a single subject will typically count for fewer net “votes” for the subject as the number of credits allocated to that single subject increases. In some embodiments, the discounting scheme is polynomial voting.
    Type: Application
    Filed: May 17, 2021
    Publication date: November 17, 2022
    Inventors: Jeb R. Linton, David K. Wright, Michael Amisano, John Melchionne, John Behnken, Dennis Kramer
  • Publication number: 20220180751
    Abstract: A method, a computer program product and a computer system update and share relevant event information among vehicles. The method includes acquiring event information by a device having a sensor. The method also includes classifying the event information as relevant to a vehicle. The method further includes the device transmitting the event information classified as relevant to a first intermediate storage device within a range of the first intermediate storage device. In addition, the method includes the first intermediate storage device transmitting the received event information to a node in a network. The network includes at least one other vehicle within a range of the first intermediate storage device and one or more other intermediate storage devices. Lastly, the method includes a vehicle receiving the event information classified as relevant and modifying the operation of the vehicle.
    Type: Application
    Filed: December 3, 2020
    Publication date: June 9, 2022
    Inventors: John Melchionne, John Behnken, Michael Amisano, Jeb R. Linton, David K. Wright, Dennis Kramer
  • Publication number: 20220093248
    Abstract: An approach for detecting potential medical conditions may be provided. Privacy laws and healthcare regulations may prevent healthcare entities from sharing data or acknowledging even seeing a patient. Secure multi-party computation can allow for the analysis of or more patient's private health data in a secure database. The private health data will only be visible to the health entity which owns or controls the data. Further, a system with oblivious random access memory may be presented which allows for the analysis of one or more patient's multiple private healthcare records. A medical condition diagnosis may be made from the analysis of the multiple private healthcare records by the secure multi-party computation using oblivious random access memory, without divulging information any private healthcare data to unauthorized parties.
    Type: Application
    Filed: September 24, 2020
    Publication date: March 24, 2022
    Inventors: Michael Amisano, Jeb R. Linton, David K. Wright, Dennis Kramer, John Melchionne, John Behnken
  • Patent number: 11270024
    Abstract: Methods for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, a computer-implemented method includes: generating a garbled circuit program compiled into a first and second half; sending the second half of the garbled circuit program to a client server of a client; receiving social network data from a social network provider; and generating search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program, based on client data input at the second half of the garbled circuit program. The client data is private with respect to the social network provider and the social network data is private with respect to the client.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: March 8, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dennis Kramer, Jeb R. Linton, Michael Amisano, David K. Wright, John Melchionne, John Behnken
  • Patent number: 11250159
    Abstract: Systems for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, program instructions are executable by a computing device to cause the computing device to: generate a garbled circuit program compiled into a first half and a second half; send the second half of the garbled circuit program to a client server of a client; receive social network data from a social network provider; index, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, the social network data based on predetermined intent categories; and generate search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, based on client data at the second half of the garbled circuit program.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: February 15, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dennis Kramer, Jeb R. Linton, Michael Amisano, David K. Wright, John Melchionne, John Behnken
  • Patent number: 11117664
    Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Publication number: 20210271963
    Abstract: Training a deep neural network model using a trusted execution environment is provided. A selection of two or more encrypted files owned by different entities within a plurality of encrypted files containing sensitive datasets is made by a user of a client device. The two or more encrypted files owned by the different entities are decrypted within the trusted execution environment to form decrypted sensitive datasets owned by the different entities. The decrypted sensitive datasets owned by the different entities are combined within the trusted execution environment to form combined sensitive data owned by the different entities. The deep neural network model is generated within the trusted execution environment based on the combined sensitive data owned by the different entities. The deep neural network model is trained within the trusted execution environment using the combined sensitive data owned by the different entities.
    Type: Application
    Filed: February 28, 2020
    Publication date: September 2, 2021
    Inventors: Michael Amisano, John Behnken, Jeb R. Linton, John Melchionne, David K. Wright, Dennis Kramer
  • Publication number: 20210257088
    Abstract: A first patient intervention is identified. The first patient intervention regards a first patient record that includes one or more attributes related to a first patient. The first patient intervention is transmitted to a first program split of a secure multi-party computation. A conflict is detected in the first patient intervention and an existing medical situation regarding the first patient. The conflict is detected by the first program split of the secure multi-party computation and by a third program split of the secure multi-party computation. Based on the detected conflict, a notification is generated by the first program split. The notification is based on the detected conflict. The notification based on the detected conflict is provided to a first client.
    Type: Application
    Filed: February 17, 2020
    Publication date: August 19, 2021
    Inventors: John Melchionne, Michael Amisano, John Behnken, Jeb R. Linton, David K. Wright, Dennis Kramer
  • Patent number: 11074486
    Abstract: The present invention provides a method, computer program product, and system of generating predicted reactions of a user. In some embodiments, the method, computer program product, and system include receiving an intelligence data store, receiving a current data object with a current query and at least one knowledge graph, identifying one or more patterns in the at least one knowledge graph, comparing using a deep neural net, the previous queries and associated one or more patterns with the current query and identified one or more patterns of the current data object, classifying the plurality data objects from the intelligence data store based on a closeness of the current query and identified one or more patterns with each of the previous queries and associated one or more patterns in the intelligence data store, and identifying, by the classification engine, potential dispositions based on the classification of the plurality of data objects.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: July 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, David K. Wright
  • Patent number: 11049599
    Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: June 29, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
  • Publication number: 20210125051
    Abstract: Embodiments are disclosed for a method for private transfer learning. The method includes generating a machine learning model comprising a training application programming interface (API) and an inferencing API. The method further includes encrypting the machine learning model using a predetermined encryption mechanism. The method additionally includes copying the encrypted machine learning model to a trusted execution environment. The method also includes executing the machine learning model in the trusted execution environment using the inferencing API.
    Type: Application
    Filed: October 24, 2019
    Publication date: April 29, 2021
    Inventors: Jeb R. Linton, John Behnken, John Melchionne, Michael Amisano, David K. Wright
  • Patent number: 10935131
    Abstract: In at least some implementations, a park lock assembly for a rotary component of a vehicle includes a lock body having at least one void, a lock member having an engagement portion selectively received within one of said at least one void, an actuator that drives the lock member to a position wherein the engagement portion may be received within one of said at least one void, and a biasing member received between the actuator and the lock member to permit the lock member to move relative to the actuator. The biasing member providing a force on the lock member tending to move the lock member toward the lock body.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: March 2, 2021
    Inventors: Aubrey J. Nofzinger, David K. Wright, Michael Goatley, Clément G. Corselli
  • Patent number: 10904754
    Abstract: Systems for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a computer program product is provided including a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: contact a mobile device network with a request to connect to the mobile device network; conduct an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; connect to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential; and store a temporary mobile subscriber identity assigned to the mobile device by the mobile device network, wherein the temporary mobile subscriber identity is filled with a null value.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: January 26, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeb R. Linton, Michael Amisano, John Melchionne, Dennis Kramer, David K. Wright, John Behnken
  • Publication number: 20200175201
    Abstract: Systems for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, program instructions are executable by a computing device to cause the computing device to: generate a garbled circuit program compiled into a first half and a second half; send the second half of the garbled circuit program to a client server of a client; receive social network data from a social network provider; index, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, the social network data based on predetermined intent categories; and generate search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, based on client data at the second half of the garbled circuit program.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Dennis KRAMER, Jeb R. LINTON, Michael AMISANO, David K. WRIGHT, John MELCHIONNE, John BEHNKEN