Patents by Inventor Mark E. Maresh

Mark E. Maresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240154449
    Abstract: Managing battery cells in a battery pack circuit for reducing stored energy can include a plurality of battery packs electrically connected in a circuit in a battery system to provide a system output voltage. Each of the battery packs include a plurality of battery cells connected in an electrically conductive circuit, and each of the battery packs generate a pack output voltage collectively resulting in the system output voltage. In response to detecting when a cell of the plurality of battery cells of a battery pack of the battery packs approaches a threshold of a thermal state related to battery capacity, discharging electrical capacity of remaining cells in the battery pack thereby reducing available energy in the battery pack.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 9, 2024
    Inventors: Rami Jaber, Marc Henri Coq, Eric B. Swenson, Mark E. Maresh
  • Patent number: 11962178
    Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: April 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
  • Patent number: 11790076
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Publication number: 20230307941
    Abstract: A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.
    Type: Application
    Filed: March 24, 2022
    Publication date: September 28, 2023
    Inventors: Marc Henri Coq, Richard John Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20230148175
    Abstract: A method for managing a virtual fence for a secondary device with respect to a controller device includes activating the controller device associated with a first object and a secondary device associated with a second object. The method includes establishing the virtual fence for the controller device and the secondary device, where the first virtual fence surrounds the secondary device and the controller device is positioned within the first virtual fence. The method includes receiving, from the controller device, a ping with location information for the controller device and the secondary device. The method includes, responsive to determining an adjustment to the first virtual fence is required, adjusting the first virtual fence based on a movement of the secondary device from a first location to a second location.
    Type: Application
    Filed: November 8, 2021
    Publication date: May 11, 2023
    Inventors: Lowell Thomason, Jessica Wandrey, Mark E. Maresh, Richard Burton Finch, Bradley Smoley
  • Patent number: 11589227
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: February 21, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Publication number: 20220393493
    Abstract: A method for managing a battery to perform a final action, the method includes determining a battery supplying power to an electronic device is discharging and receiving battery specification information for the battery. The method includes receiving environmental condition information for the battery and determining an open circuit voltage for the battery. The method includes determining a base capacity for the battery, a first capacity reduction for the battery based on the battery specification, and a second capacity reduction for the battery based on the environmental condition information. The method includes determining an overall expected capacity for the battery based on the first capacity reduction and the second capacity reduction, where the overall expected capacity represents available energy. Responsive to determining the available energy for the battery is less than a required energy to perform an action prior to battery depletion, the method includes sending a warning notification.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Inventors: Eric B. Swenson, Marc Henri Coq, Mark E. Maresh, Richard John Fishbune
  • Publication number: 20220391490
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Publication number: 20220381834
    Abstract: Embodiments of the present invention manage a state of charge of a rechargeable battery for extended storage by determining a manual override for a storage protocol is not activate for a rechargeable battery associated with a battery charger and an electronic device. Receiving battery data, environment data, and historical data for the rechargeable battery associated with a battery charger. Embodiments of the present invention determine to activate the storage protocol for the rechargeable battery based on the battery data, the environment data, and the historical data and discharge the rechargeable battery to a preset state of charge level based on the storage protocol.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Mark E. Maresh, Richard John Fishbune, Marc Henri Coq, Eric B. Swenson
  • Patent number: 11296886
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: April 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20220030702
    Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.
    Type: Application
    Filed: July 26, 2020
    Publication date: January 27, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas
  • Patent number: 11120118
    Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 11121413
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20210250765
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Application
    Filed: February 11, 2020
    Publication date: August 12, 2021
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Patent number: 10949512
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10693857
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10614206
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include presenting, by a processing device, an object set to a user, wherein the object set comprises a plurality of objects in a first order; receiving, by the processing device, a rearranged object set, wherein the rearranged object set comprises the plurality of objects in a second order; comparing the rearranged object set to a known sequential object set stored in a data store; and responsive to determining that the rearranged object set matches a known sequential object set, enabling the user to access a restricted resource.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10599828
    Abstract: Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device. The authentication image may include first data generated in response to user input to the user device, second data generated by the user application, and third data generated by the service provider system. The service provider system may then authenticate access to the user account based at least in part on the authentication image and send an indication to the user device that access to the user account has been authenticated. Authenticating access to the user account includes determining that the first data, second data, and third data match respective data expected by the service provider system.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: March 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10587130
    Abstract: An apparatus is provided for an electrical component to automatically provide a discharge of a rechargeable battery to a predetermined state of charge. The apparatus includes the electrical component determining a rechargeable battery is not connected to a device and discharging the rechargeable battery. The apparatus includes the electronic component determining whether a state of charge exceeds the predetermined state of charge in the rechargeable battery and responsive to determining that the state of charge exceeds the predetermined state of charge, continuing discharging the rechargeable battery.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Patent number: 10581857
    Abstract: Methods, systems and computer program products for controlling access to a host site are provided. Aspects include receiving, receiving an authentication video and processing the authentication video to identify a plurality of scenes. Aspects also include identifying a representative image for each of the plurality of scenes and comparing the representative image for each of the plurality of scenes with stored one of a plurality of master images. Based on a determination that a similarity between the representative image for each of the plurality of scenes and the one of the plurality of master images is between a first threshold level and second threshold level, aspects include granting access to the host site.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: March 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney