Patents by Inventor Mark E. Maresh
Mark E. Maresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12256284Abstract: A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.Type: GrantFiled: November 8, 2021Date of Patent: March 18, 2025Assignee: International Business Machines CorporationInventors: Lowell Thomason, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch, Bradley Smoley
-
Patent number: 12244172Abstract: A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.Type: GrantFiled: March 24, 2022Date of Patent: March 4, 2025Assignee: International Business Machines CorporationInventors: Marc Henri Coq, Richard John Fishbune, Mark E. Maresh, Eric B. Swenson
-
Publication number: 20240291861Abstract: Cybersecurity is provided for a transaction initiated by a matrix barcode using a smart device connected to a computer network by a device having a computer receiving a reading of a matrix barcode on an item. The matrix barcode electronically pointing to a URL (Uniform Resource Locator) for a web-based resource accessible using the device via a computer network. Using the computer of the device or a service computer, determining information parameters about the matrix barcode, and determining when the URL is identified as a registered service provider in a knowledge corpus communicating with the service computer. The URL can be validated as registered, when the URL is identified as corresponding to the registered service provider and based on the information parameters.Type: ApplicationFiled: February 27, 2023Publication date: August 29, 2024Inventors: Juan F. Vargas, Mark E. Maresh
-
Patent number: 12044739Abstract: Embodiments of the present invention manage a state of charge of a rechargeable battery for extended storage by determining a manual override for a storage protocol is not activate for a rechargeable battery associated with a battery charger and an electronic device. Receiving battery data, environment data, and historical data for the rechargeable battery associated with a battery charger. Embodiments of the present invention determine to activate the storage protocol for the rechargeable battery based on the battery data, the environment data, and the historical data and discharge the rechargeable battery to a preset state of charge level based on the storage protocol.Type: GrantFiled: May 28, 2021Date of Patent: July 23, 2024Assignee: International Business Machines CorporationInventors: Mark E. Maresh, Richard John Fishbune, Marc Henri Coq, Eric B. Swenson
-
Publication number: 20240194048Abstract: Dynamically coordinating interactive fence zones and alerts includes receiving, by one or more processors, location data corresponding to a first object. A virtual fence location and a virtual fence type are determined for the first object based on the received location data, and a first virtual fence is then established surrounding the first object. A plurality of parameters associated with the first virtual fence is received by the one or more processors, and a rule table is generated based on the received plurality of parameters associated with the first virtual fence. Data regarding a virtual fence boundary of the first virtual fence is received by the one or more processors, and based on the received data meeting a first rule of the rule table, an alert is sent to a user device.Type: ApplicationFiled: December 9, 2022Publication date: June 13, 2024Inventors: Lowell Thomason, Bradley Smoley, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch
-
Publication number: 20240154449Abstract: Managing battery cells in a battery pack circuit for reducing stored energy can include a plurality of battery packs electrically connected in a circuit in a battery system to provide a system output voltage. Each of the battery packs include a plurality of battery cells connected in an electrically conductive circuit, and each of the battery packs generate a pack output voltage collectively resulting in the system output voltage. In response to detecting when a cell of the plurality of battery cells of a battery pack of the battery packs approaches a threshold of a thermal state related to battery capacity, discharging electrical capacity of remaining cells in the battery pack thereby reducing available energy in the battery pack.Type: ApplicationFiled: November 3, 2022Publication date: May 9, 2024Inventors: Rami Jaber, Marc Henri Coq, Eric B. Swenson, Mark E. Maresh
-
Patent number: 11962178Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.Type: GrantFiled: June 3, 2021Date of Patent: April 16, 2024Assignee: International Business Machines CorporationInventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
-
Patent number: 11790076Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.Type: GrantFiled: June 3, 2021Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
-
Publication number: 20230307941Abstract: A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.Type: ApplicationFiled: March 24, 2022Publication date: September 28, 2023Inventors: Marc Henri Coq, Richard John Fishbune, Mark E. Maresh, Eric B. Swenson
-
Publication number: 20230148175Abstract: A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.Type: ApplicationFiled: November 8, 2021Publication date: May 11, 2023Inventors: Lowell Thomason, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch, Bradley Smoley
-
Patent number: 11589227Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: GrantFiled: February 11, 2020Date of Patent: February 21, 2023Assignee: KYNDRYL, INC.Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Publication number: 20220393493Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.Type: ApplicationFiled: June 3, 2021Publication date: December 8, 2022Inventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
-
Publication number: 20220391490Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.Type: ApplicationFiled: June 3, 2021Publication date: December 8, 2022Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
-
Publication number: 20220381834Abstract: Embodiments of the present invention manage a state of charge of a rechargeable battery for extended storage by determining a manual override for a storage protocol is not activate for a rechargeable battery associated with a battery charger and an electronic device. Receiving battery data, environment data, and historical data for the rechargeable battery associated with a battery charger. Embodiments of the present invention determine to activate the storage protocol for the rechargeable battery based on the battery data, the environment data, and the historical data and discharge the rechargeable battery to a preset state of charge level based on the storage protocol.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Inventors: Mark E. Maresh, Richard John Fishbune, Marc Henri Coq, Eric B. Swenson
-
Patent number: 11296886Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.Type: GrantFiled: April 5, 2019Date of Patent: April 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Publication number: 20220030702Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.Type: ApplicationFiled: July 26, 2020Publication date: January 27, 2022Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas
-
Patent number: 11120118Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.Type: GrantFiled: November 22, 2017Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 11121413Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.Type: GrantFiled: October 24, 2018Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
-
Publication number: 20210250765Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: ApplicationFiled: February 11, 2020Publication date: August 12, 2021Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 10949512Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.Type: GrantFiled: July 10, 2019Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney