Patents by Inventor Mark E. Maresh

Mark E. Maresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12256284
    Abstract: A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: March 18, 2025
    Assignee: International Business Machines Corporation
    Inventors: Lowell Thomason, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch, Bradley Smoley
  • Patent number: 12244172
    Abstract: A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.
    Type: Grant
    Filed: March 24, 2022
    Date of Patent: March 4, 2025
    Assignee: International Business Machines Corporation
    Inventors: Marc Henri Coq, Richard John Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20240291861
    Abstract: Cybersecurity is provided for a transaction initiated by a matrix barcode using a smart device connected to a computer network by a device having a computer receiving a reading of a matrix barcode on an item. The matrix barcode electronically pointing to a URL (Uniform Resource Locator) for a web-based resource accessible using the device via a computer network. Using the computer of the device or a service computer, determining information parameters about the matrix barcode, and determining when the URL is identified as a registered service provider in a knowledge corpus communicating with the service computer. The URL can be validated as registered, when the URL is identified as corresponding to the registered service provider and based on the information parameters.
    Type: Application
    Filed: February 27, 2023
    Publication date: August 29, 2024
    Inventors: Juan F. Vargas, Mark E. Maresh
  • Patent number: 12044739
    Abstract: Embodiments of the present invention manage a state of charge of a rechargeable battery for extended storage by determining a manual override for a storage protocol is not activate for a rechargeable battery associated with a battery charger and an electronic device. Receiving battery data, environment data, and historical data for the rechargeable battery associated with a battery charger. Embodiments of the present invention determine to activate the storage protocol for the rechargeable battery based on the battery data, the environment data, and the historical data and discharge the rechargeable battery to a preset state of charge level based on the storage protocol.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: July 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Mark E. Maresh, Richard John Fishbune, Marc Henri Coq, Eric B. Swenson
  • Publication number: 20240194048
    Abstract: Dynamically coordinating interactive fence zones and alerts includes receiving, by one or more processors, location data corresponding to a first object. A virtual fence location and a virtual fence type are determined for the first object based on the received location data, and a first virtual fence is then established surrounding the first object. A plurality of parameters associated with the first virtual fence is received by the one or more processors, and a rule table is generated based on the received plurality of parameters associated with the first virtual fence. Data regarding a virtual fence boundary of the first virtual fence is received by the one or more processors, and based on the received data meeting a first rule of the rule table, an alert is sent to a user device.
    Type: Application
    Filed: December 9, 2022
    Publication date: June 13, 2024
    Inventors: Lowell Thomason, Bradley Smoley, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch
  • Publication number: 20240154449
    Abstract: Managing battery cells in a battery pack circuit for reducing stored energy can include a plurality of battery packs electrically connected in a circuit in a battery system to provide a system output voltage. Each of the battery packs include a plurality of battery cells connected in an electrically conductive circuit, and each of the battery packs generate a pack output voltage collectively resulting in the system output voltage. In response to detecting when a cell of the plurality of battery cells of a battery pack of the battery packs approaches a threshold of a thermal state related to battery capacity, discharging electrical capacity of remaining cells in the battery pack thereby reducing available energy in the battery pack.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 9, 2024
    Inventors: Rami Jaber, Marc Henri Coq, Eric B. Swenson, Mark E. Maresh
  • Patent number: 11962178
    Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: April 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
  • Patent number: 11790076
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Publication number: 20230307941
    Abstract: A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.
    Type: Application
    Filed: March 24, 2022
    Publication date: September 28, 2023
    Inventors: Marc Henri Coq, Richard John Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20230148175
    Abstract: A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.
    Type: Application
    Filed: November 8, 2021
    Publication date: May 11, 2023
    Inventors: Lowell Thomason, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch, Bradley Smoley
  • Patent number: 11589227
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: February 21, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Publication number: 20220393493
    Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Inventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
  • Publication number: 20220391490
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Publication number: 20220381834
    Abstract: Embodiments of the present invention manage a state of charge of a rechargeable battery for extended storage by determining a manual override for a storage protocol is not activate for a rechargeable battery associated with a battery charger and an electronic device. Receiving battery data, environment data, and historical data for the rechargeable battery associated with a battery charger. Embodiments of the present invention determine to activate the storage protocol for the rechargeable battery based on the battery data, the environment data, and the historical data and discharge the rechargeable battery to a preset state of charge level based on the storage protocol.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Mark E. Maresh, Richard John Fishbune, Marc Henri Coq, Eric B. Swenson
  • Patent number: 11296886
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: April 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20220030702
    Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.
    Type: Application
    Filed: July 26, 2020
    Publication date: January 27, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas
  • Patent number: 11120118
    Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 11121413
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20210250765
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Application
    Filed: February 11, 2020
    Publication date: August 12, 2021
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Patent number: 10949512
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney