Patents by Inventor Pierre Secondo

Pierre Secondo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7791484
    Abstract: The present invention relates to a system for tamper detection. A tamper detection system in accordance with an embodiment of the present invention includes: a passive electronic sensor including a circuit having first, second, and third nodes; a load connected between the first and second nodes of the circuit; a friable electrical connection element connected between the second and third nodes of the circuit; and a storage unit, connected to the second node of the circuit, for storing an identification code of the sensor; wherein in use a voltage is applied across the first and third nodes of the circuit, and when the friable electrical connection element is intact, the second node of the circuit is at a first voltage, and when the friable electrical connection element is broken, the second node of the circuit is at a second voltage.
    Type: Grant
    Filed: April 24, 2008
    Date of Patent: September 7, 2010
    Assignee: International Business Machines Corporation
    Inventors: Francois Commagnac, Jean-Christophe Mestres, Joaquin Picon, Pierre Secondo
  • Publication number: 20100159953
    Abstract: A computer-implemented method, system, and computer program product for handling identification information emitted by a radio frequency device, and a radio frequency device for emitting identification information. The method receives and stores identification information transmitted by the radio frequency device, retrieves the identification information from the first mobile communication device, and inserts the identification information into the communication. The system includes a first mobile communication device, a second communication device, and an inserting means. The computer program product includes computer program instructions for carrying out the steps of the method.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 24, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Denis Aubert, Joaquin Picon, Pierre Secondo, Joel Viale
  • Patent number: 7728728
    Abstract: A method and systems for collecting data from a huge number of pre-filled forms are disclosed. According to the method and systems of the invention, the pre-filled forms comprise RFID tags, check boxes, and electrical connection between the RFID tags and the check boxes so that responses are modified according to checked boxes. In a preferred embodiment, each check box comprises at least two electrical terminals electrically connected to the RFID tag through a register. Using a pencil with conductive ink for checking the check boxes establishes an electrical contact between the terminals that modify the value of the register that in turn, modifies the response of the RFID tag. When the check boxes identifiers of a form have been collected, the identifier of the form is stored within the RFID reader to avoid further reading of the RFID tag, or the identifier of the RFID tag is erased.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: June 1, 2010
    Assignee: International Business Machines Corporation
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo
  • Publication number: 20100123580
    Abstract: The present invention is directed to tamper detection, memorization, and indication for packaging. A method in accordance with an embodiment of the present invention includes: detecting when the package is opened and closed; and generating an alarm if the package is opened more than once after it is initially closed to indicate that the package has been tampered with.
    Type: Application
    Filed: January 14, 2009
    Publication date: May 20, 2010
    Inventors: Gerard Marmigere, Bernard Pucci, Xavier Rey-Robert, Pierre Secondo
  • Publication number: 20100117797
    Abstract: A closure includes a closing member for sealing an opening of a pressurized container. The closing member may include a passive electronic sensor coupled thereto that includes a status register that may be readable by, for example, a RFID reader. The status register is responsive to a pressure change in the pressurized container caused by an insertion of the closing member into the opening or an extraction of the closing member from the opening. The status value in the status register indicates whether the pressurized container has been tampered with. An identification register may include a pressurized container identification encrypted with the private key of the manufacturer, which can be decrypted for comparing to identification on the pressurized container to identify tampering.
    Type: Application
    Filed: November 14, 2008
    Publication date: May 13, 2010
    Inventors: Frederic J. Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20100099398
    Abstract: A system, method and program product for managing inbound calls on a mobile device. A system is provided that includes: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information.
    Type: Application
    Filed: October 22, 2008
    Publication date: April 22, 2010
    Inventors: Frederic J. Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20100097184
    Abstract: The present invention is directed to a method and apparatus for reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag; interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs.
    Type: Application
    Filed: November 10, 2008
    Publication date: April 22, 2010
    Inventors: Frederic Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20100097196
    Abstract: The present invention is directed to a method and apparatus for visually locating short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in the container, wherein each second RFID tag is coupled to a respective illumination source; addressing one of the first RFID tags; and activating the illumination source coupled to each second RFID tag that captured the ID of the addressed first RFID tag.
    Type: Application
    Filed: November 10, 2008
    Publication date: April 22, 2010
    Inventors: Frederic Bauchot, Gerard Marmigere, Joaquin Picon, Xavier Rey-Robert, Pierre Secondo
  • Publication number: 20100097185
    Abstract: The present invention is directed to a method and apparatus for radio frequency identification (RFID) tag positional addressing. A method in accordance with an embodiment of the present invention includes: activating a plurality of first RFID tags, wherein each first RFID tag emits an identification (ID) and a position; capturing the IDs and positions emitted by the first RFID tags using a plurality of second RFID tags, wherein each second RFID tag captures the IDs and positions emitted by the first RFID tags located in a vicinity of the second RFID tag, and wherein each second RFID tag determines its physical location based on the captured IDs and positions; and sending a read command including a position of a targeted one of the second RFID tags that is to be read, wherein only the targeted second RFID tag located at the position in the read command responds to the read command.
    Type: Application
    Filed: November 10, 2008
    Publication date: April 22, 2010
    Inventors: Frederic Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20100074420
    Abstract: A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated.
    Type: Application
    Filed: October 1, 2008
    Publication date: March 25, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frederic J. Bauchot, Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20090315720
    Abstract: The present invention describes a RFID tag and a system and method involving a plurality of RFID tags. Each RFID tag is attached to an object (or to a structure or a person) on which the presence of a predefined fluid is monitored. In a first state, (absence of the monitored fluid), the tag is acting as a passive RFID tag, and the information it holds, (at least its identifier—ID), can be read with a proximity reader (a hand held or stationary/fixed reader). This operation is performed when the RFID tag is attached to the object (or person) to be monitored. At this stage a table associating tag ID, object name (or person name) and location (or any other information), may be built, and may be recorded so that information it contains is accessible by a control center. In a second state, whenever the monitored fluid appears on the tagged object, a fluid activated battery generates the electrical power which is used to power the RFID tag.
    Type: Application
    Filed: May 28, 2007
    Publication date: December 24, 2009
    Inventors: Jean-Yves Clement, Pierre Secondo, Jerome Tarte
  • Publication number: 20090201154
    Abstract: A surveyor's mark and a method for forming the mark. The mark includes a stick and a head assembled to the stick. The stick is configured to be planted in a ground and the head is configured to be above the ground. The head includes a tag having an identification number. The identification number has a value which is a first code value. The stick includes a tinny wire configured as an electrical conducting loop and connected to the tag. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in the head being disassembled from the stick and the tinny wire breaking so as to open the loop which changes the value of the identification number from the first code value to a second code value.
    Type: Application
    Filed: April 19, 2007
    Publication date: August 13, 2009
    Inventors: Frederic Bauchot, Gerard Marmigere, Pierre Secondo
  • Publication number: 20090169019
    Abstract: A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object.
    Type: Application
    Filed: February 14, 2007
    Publication date: July 2, 2009
    Inventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
  • Patent number: 7552220
    Abstract: A method and computing systems for refreshing objects stored by a Proxy cache server from Web content servers. The refresh is requested by the Proxy cache server only if the expiration date attached to a stored object has expired. The refresh of one object is requested by the Proxy cache server to the Web content server upon a request from the browser of a client device. Additionally, the Proxy cache server can send a Refresh_request command to the Web content servers applying to a list of objects for which the expiration date has expired. The refreshed objects are not sent by the Web content server if the last modified date has changed but rather if, and only if, the object content, identified by a signature, has been changed. This method and system have the advantage of offloading the computing resources involved for data transfer through the network connecting the servers.
    Type: Grant
    Filed: August 12, 2003
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Gerard Marmigere, Joaquin Picon, Pierre Secondo
  • Publication number: 20090157772
    Abstract: A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
    Type: Application
    Filed: February 20, 2009
    Publication date: June 18, 2009
    Inventors: Joaquin Picon, Pierre Secondo, Gerard Marmigere
  • Publication number: 20090121019
    Abstract: A ballot paper and a voting system. The paper ballot is initially a voted ballot paper including: a recorded vote including candidate/party information for an election on a voting day in a jurisdiction, a burnable radio frequency identification (RFID) tag including a fuse not blown, and a basic RFID tag storing the jurisdiction's signature. The recorded vote is not revealable while the fuse is not blown and is revealable responsive to the fuse being blown. The voting system includes a ballot box and a ballot counting machine. The ballot box is configured to receive and authenticate the voted ballot paper and to generate a verified ballot paper. The ballot counting machine is configured to receive and authenticate the verified ballot paper, to effectuate a blowing of the fuse to reveal the recorded vote and to subsequently count the ballot paper and direct the ballot paper to a candidate box.
    Type: Application
    Filed: November 6, 2008
    Publication date: May 14, 2009
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo
  • Publication number: 20090121018
    Abstract: A voting method. A ballot paper is received. The received ballot paper includes a recorded vote. The recorded vote includes candidate/party information for an election held on a voting day in a jurisdiction. The ballot paper includes a burnable radio frequency identification (RFID) tag including an on-tag fuse that is not blown. The recorded vote is not revealable while the fuse is not blown and is revealable in response to the fuse being subsequently blown. After the ballot paper is received, the ballot paper is authenticated and the fuse is blown to reveal the recorded vote, followed by counting the ballot paper and directing the ballot paper to a candidate box.
    Type: Application
    Filed: November 5, 2008
    Publication date: May 14, 2009
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo
  • Publication number: 20090121840
    Abstract: A method and apparatus for determining the position of four tires on corresponding four wheels in a vehicle. Each wheel has an axis of rotation. Each tire has an embedded Radio Frequency IDentification (RFID) tag. The RFID tags embedded in the four tires have respective identifiers denoted as ID1, ID2, ID3, and ID4. A position to place a reader antenna is determined and the reader antenna is subsequently placed in the determined position. The reader antenna in the determined position emitting N signals to the respective RFID tag in the four tires. A delay is measured for receiving each signal reflected from the RFID tags. Which wheel of the four wheels each tire is on is identified according to the measured delays.
    Type: Application
    Filed: January 5, 2009
    Publication date: May 14, 2009
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo
  • Patent number: 7516420
    Abstract: A method is disclosed to create files in a file system hierarchy in a way which facilitates their retrieval. The method comprises the steps of: entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
    Type: Grant
    Filed: June 13, 2003
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Joaquin Picon, Pierre Secondo, Gerard Marmigere
  • Publication number: 20090045911
    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
    Type: Application
    Filed: October 16, 2006
    Publication date: February 19, 2009
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo