Patents by Inventor Mark E. Maresh

Mark E. Maresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180349582
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: November 15, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10147982
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: December 4, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20180332013
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10078771
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: September 18, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10055569
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: August 21, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180226691
    Abstract: A wet cell battery, where a first cell in a wet-cell battery includes a set of anode electrodes and a set of cathode electrodes, and where electrically conductive debris accumulates on a surface inside the first cell to an expected height. An anode electrode in the set of anode electrodes has an anode end closest to the surface, and a cathode electrode in the set of cathode electrodes has a cathode end closest to the surface. A first gap distance between the anode end and the surface is different from a second gap distance between the cathode end and the surface. When the electrically conductive debris accumulates up to the expected height, the debris fails to make simultaneous electrical contact with the anode electrode and the cathode electrode due to the different gap distances.
    Type: Application
    Filed: February 7, 2017
    Publication date: August 9, 2018
    Applicant: International Business Machines Corporation
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20180226696
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Application
    Filed: February 7, 2017
    Publication date: August 9, 2018
    Applicant: International Business Machines Corporation
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Patent number: 10044202
    Abstract: An apparatus is provided for an electrical component to automatically provide a discharge of a rechargeable battery to a predetermined state of charge. The apparatus includes the electrical component determining a rechargeable battery is not connected to a device and discharging the rechargeable battery. The apparatus includes the electronic component determining whether a state of charge exceeds the predetermined state of charge in the rechargeable battery and responsive to determining that the state of charge exceeds the predetermined state of charge, continuing discharging the rechargeable battery.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Patent number: 10003062
    Abstract: A device may include an electronic component stack cover having an open end sized to receive a modular electronic component stack including a plurality of like modular electronic components, an at least partially closed end, and sides extending from the at least partially closed end toward the open end. The at least partially closed end and the at least one side may form a chamber. At least one electrically conductive probe may extend from the at least partially closed end into the chamber. The chamber may conform to an outer shape of at least a portion of the modular electronic component stack, and the electrically conductive probe may be configured to electrically interface with a first connector on the electronic component stack when the stack is within the chamber.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: June 19, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Yakup Bulur, Richard J. Fishbune, Mark E. Maresh, Neil C. Swenson, Adam M. Wheeler
  • Publication number: 20180157819
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include presenting, by a processing device, an object set to a user, wherein the object set comprises a plurality of objects in a first order; receiving, by the processing device, a rearranged object set, wherein the rearranged object set comprises the plurality of objects in a second order; comparing the rearranged object set to a known sequential object set stored in a data store; and responsive to determining that the rearranged object set matches a known sequential object set, enabling the user to access a restricted resource.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180157823
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at a user device, a first object set; transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user; and responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180150626
    Abstract: Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device. The authentication image may include first data generated in response to user input to the user device, second data generated by the user application, and third data generated by the service provider system. The service provider system may then authenticate access to the user account based at least in part on the authentication image and send an indication to the user device that access to the user account has been authenticated. Authenticating access to the user account includes determining that the first data, second data, and third data match respective data expected by the service provider system.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180152428
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 9984319
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180131203
    Abstract: An apparatus is provided for an electrical component to automatically provide a discharge of a rechargeable battery to a predetermined state of charge. The apparatus includes the electrical component determining a rechargeable battery is not connected to a device and discharging the rechargeable battery. The apparatus includes the electronic component determining whether a state of charge exceeds the predetermined state of charge in the rechargeable battery and responsive to determining that the state of charge exceeds the predetermined state of charge, continuing discharging the rechargeable battery.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 10, 2018
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20180131206
    Abstract: An apparatus is provided for an electrical component to automatically provide a discharge of a rechargeable battery to a predetermined state of charge. The apparatus includes the electrical component determining a rechargeable battery is not connected to a device and discharging the rechargeable battery. The apparatus includes the electronic component determining whether a state of charge exceeds the predetermined state of charge in the rechargeable battery and responsive to determining that the state of charge exceeds the predetermined state of charge, continuing discharging the rechargeable battery.
    Type: Application
    Filed: December 29, 2017
    Publication date: May 10, 2018
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Patent number: 9966773
    Abstract: Embodiments of the invention relate to a multi-cell battery, with at least two cells electrically connected in a first parallel arrangement, which is connected in series to a second parallel arrangement of at least two additional cells. Each cell is locally connected to a sensor to sense and control current of each cell in parallel or parallel-series combination in the multi-cell battery. A control module is in communication with each sensor, and associated instructions electrically remove or disable a cell from the multi-cell battery determined to be defective based on measurements from the associated sensor. A configuration performs measurements and monitors a state of health of each cell in the multi-cell battery, the measurements including temperature, voltage and current sensing. Identifying one cell of the cells in the multi-cell battery as subject to a performance failure results in electrically switching the identified cell to an off position.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: May 8, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Yakup Bulur, Richard J. Fishbune, Mark E. Maresh, Neil C. Swenson, Adam M. Wheeler
  • Publication number: 20180115894
    Abstract: A computer-implemented method for securing access to a host site. The method includes creating, using a processor system, an access code for access to a user account hosted by the host site and providing, using the processor system, the access code to the host site, the access code including user provided images in a defined sequence. The method also includes creating, using the processor system, an access attempt code for access to the user account hosted by the host site and transmitting, by the processor system, the access attempt code to the host site. Based on a determination that the access attempt code matches the access code, the method includes accessing, using the processor system, the user account hosted by the host site.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: MARK E. MARESH, COLM NOLAN, JUAN F. VARGAS, MICHAEL J. WHITNEY
  • Publication number: 20180114008
    Abstract: A computer-implemented method for allowing access to a user account hosted by a host site. The method includes receiving an access attempt code requesting access to the user account hosted by the host site and retrieving an access code for allowing access to the user account hosted by the host site, the access code comprising user provided images in a defined sequence. The method also includes determining whether the access attempt code matches the access code, and based on a determination that the access attempt code matches the access code, providing the access to the user account hosted by the host site.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: MARK E. MARESH, COLM NOLAN, JUAN F. VARGAS, MICHAEL J. WHITNEY
  • Publication number: 20180114009
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Application
    Filed: October 3, 2017
    Publication date: April 26, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney