Patents by Inventor Rhonda L. Childress

Rhonda L. Childress has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10521756
    Abstract: A method, executed by one or more processors, includes identifying at least one product for delivery and create a shipping manifest for the at least one product. The method includes extracting from the shipping manifest, a required amount of storage space for the at least one product and one or more environmental conditions required for storage of the at least one product at the receiving location. Furthermore, the method includes identifying a storage space location for storage of the at least one product at the receiving location, wherein the identified storage space location provides the required amount of storage space and the one or more environmental conditions required for the at least one product.
    Type: Grant
    Filed: June 3, 2016
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Kim A. Eckert, Ryan D. McNair
  • Publication number: 20190380325
    Abstract: Embodiments of the present invention provides a systems and methods for pest control. The system detects one or more pests based on receiving sensor data from one or more sensors associated with a predefined location. The system analyzes the sensor data with cognitive machine learning based on the detected pests. The system generates a treatment recommendation report based on the analysis and outputs the treatment recommendation report.
    Type: Application
    Filed: June 18, 2018
    Publication date: December 19, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Stan K. Daley
  • Publication number: 20190385199
    Abstract: A system and method for filtering recommendations for an exercise machine based on a user fitness metric compared to similar fitness metrics of other users includes receiving biometric and activity data from a plurality of registered users, obtaining a machine usage data from a plurality of internet-connected exercise machines associated with the plurality of registered users, profiling the plurality of registered users using the biometric and activity data and the machine usage data to determine a fitness metric of each registered user, calculating the user fitness metric, in response to receiving a user request for recommendations and reviews for the exercise machine, and filtering the recommendations and reviews for the exercise machine to exclude recommendations and reviews from the plurality of registered users having a fitness metric that does not correspond to the user fitness metric.
    Type: Application
    Filed: June 18, 2018
    Publication date: December 19, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Kim A. Eckert, Minh Q. Pham
  • Publication number: 20190379998
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Application
    Filed: August 22, 2019
    Publication date: December 12, 2019
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10502532
    Abstract: Systems and methods for dynamic camouflaging are disclosed. A computer-implemented method can be used with the system including determining, by a computing device, if current environment image data is available for a location of one or more users, and instructing, by the computing device, at least one image-enabled clothing system of the one or more users to display a camouflage image based on the determining. The camouflage image is based on the current environment image data when the current environment image data is available, and the camouflage image is based on historic image data associated with the location of the one or more users when the current environment image data is not available.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: December 10, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Bender, Rhonda L. Childress, Timothy J. Forshee-Lee, Mary E. Rudden
  • Publication number: 20190362447
    Abstract: A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. The processor(s) assigns a service provider(s) to a portion of the identified individuals. The processor(s) obtains preference information related to the portion and determines environmental information related to an environment experienced by the portion by locating at least one sensor within a predetermined distance of the portion, and communicating, over the wireless communications connection, with the at least one sensor. The processor(s) generate simulations for providing services to the portion that include temporal parameters and selects an optimal simulation.
    Type: Application
    Filed: August 12, 2019
    Publication date: November 28, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Michael P. Shute
  • Publication number: 20190362071
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Application
    Filed: August 9, 2019
    Publication date: November 28, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Patent number: 10482770
    Abstract: A method, system, and/or computer program product controls operations of a vehicle based on a condition of cargo being transported. One or more processors receive output from a camera on a first cargo vehicle, wherein the output from the camera describes a movement of cargo caused by movement of the first cargo vehicle. The processor(s) determine, based on the output from the camera, that the movement of the first cargo vehicle has caused cargo in the first cargo vehicle to shift beyond a predetermined amount, and transmit instructions to a second cargo vehicle to adjust initial cargo loading operations on the second cargo vehicle based on determining that the movement of the first cargo vehicle has caused the cargo to shift beyond the predetermined amount in the first cargo vehicle.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: November 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Evelyn R. Anderson, Michael Bender, Michael Boone, Rhonda L. Childress
  • Publication number: 20190340519
    Abstract: Disclosed embodiments provide techniques for providing vehicular recommendations based on driver habits. Embodiments utilize a variety of input data, including, but not limited to, static vehicular data, dynamic vehicular data, and/or environmental data. In embodiments, empirical rules are used to adjust recommended maintenance schedules based on the input conditions. Additionally, the adjusted recommendations along with unscheduled maintenance data are input to a machine learning system, such as a neural network. The machine learning system is used to further revise the maintenance schedule, estimate end of life of the vehicle, and issue recommendations for when to sell a vehicle and recommendations on attributes of a new vehicle for acquisition.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 7, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Kim A. Eckert, Minh Q. Pham
  • Publication number: 20190340675
    Abstract: A computer-implemented method includes: monitoring, by a user device, a location of the user device; determining, by the user device and based on the monitoring, that the user is within a threshold distance or a threshold arrival time of the service provider location; and outputting, by the user device, user information to the service provider based on the determining that the user is within the threshold distance or the threshold arrival time of the service provider location. The user information indicates services to provide to the user by the service provider upon the user's arrival to the service provider location. The outputting causes the service provider to receive the user information for serving the user upon the user's arrival to the service provider location.
    Type: Application
    Filed: July 15, 2019
    Publication date: November 7, 2019
    Inventors: Rhonda L. CHILDRESS, Kim A. ECKERT, Ryan D. MCNAIR, Minh Q. PHAM
  • Publication number: 20190339990
    Abstract: A method, computer program product, and system includes a processor(s) intercepting an instruction, upon receipt on the instruction, by the one or more processors in the computing device on a communications network, prior to execution of the instruction by the processor(s) in the computing device. The processor(s) determines a state of the computing device and based on the state of the computing device and a portion of the instruction, the processor(s) determines that the instruction is precluded from executing on the computing device.
    Type: Application
    Filed: July 10, 2019
    Publication date: November 7, 2019
    Inventors: Michael Bender, Rhonda L. Childress, Rahul Gupta
  • Publication number: 20190332745
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Application
    Filed: July 8, 2019
    Publication date: October 31, 2019
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 10460103
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: October 29, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Patent number: 10445302
    Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example operation may include one or more of identifying blockchain transactions, designating each of the blockchain transactions as an independent transaction type or a dependent transaction type, and determining an order to process the blockchain transactions based on the independent transaction type or the dependent transaction type.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: October 15, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Rahul Gupta, David B. Kumhyr, Maharaj Mukherjee
  • Patent number: 10430561
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: October 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 10424028
    Abstract: A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. The processor(s) assigns a service provider(s) to a portion of the identified individuals. The processor(s) obtains preference information related to the portion and determines environmental information related to an environment experienced by the portion by locating at least one sensor within a predetermined distance of the portion, and communicating, over the wireless communications connection, with the at least one sensor. The processor(s) generate simulations for providing services to the portion that include temporal parameters and selects an optimal simulation.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: September 24, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Michael P. Shute
  • Patent number: 10419876
    Abstract: An approach includes contacting a predefined contact information when a mobile device, which is password protected, is lost and subsequently found. The approach includes receiving an activation event predefined for a specified password protected mobile device, and receiving predefined contact information stored in the mobile device while the mobile device remains password protected, upon the receipt of the activation event.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: September 17, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 10402894
    Abstract: A computer-implemented method includes: monitoring, by a user device, a location of the user device; determining, by the user device and based on the monitoring, that the user is within a threshold distance or a threshold arrival time of the service provider location; and outputting, by the user device, user information to the service provider based on the determining that the user is within the threshold distance or the threshold arrival time of the service provider location. The user information indicates services to provide to the user by the service provider upon the user's arrival to the service provider location. The outputting causes the service provider to receive the user information for serving the user upon the user's arrival to the service provider location.
    Type: Grant
    Filed: July 12, 2016
    Date of Patent: September 3, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Kim A. Eckert, Ryan D. McNair, Minh Q. Pham
  • Publication number: 20190265056
    Abstract: A method directs a self-driving cargo vehicle to take an alternate route based on cargo sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor and a camera, which describe an amount of movement of first cargo being transported by a first cargo vehicle on a first cargo vehicle. The processor(s) evaluate a profile of a controller on a second cargo vehicle, which is a self-driving vehicle, and which is transporting second cargo that is a same type of cargo as the first cargo. The processor(s) determine an alternate route for the second cargo vehicle, and then transmit instructions to the controller to take the second cargo vehicle on the alternate route.
    Type: Application
    Filed: May 10, 2019
    Publication date: August 29, 2019
    Inventors: EVELYN R. ANDERSON, MICHAEL BENDER, MICHAEL BOONE, RHONDA L. CHILDRESS
  • Patent number: 10395017
    Abstract: A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical digital footprint of a user. The historical digital footprint is a record of past digital data about the user, and describes a pattern of activities of the user. The processor(s) generate a simulated digital footprint for the user. The simulated digital footprint conforms to the pattern of activities of the user, and describes simulated current activities of the user. The processor(s) transmit the simulated digital footprint to the public while a current real digital footprint is being created for the user, such that use of the pattern of activities of the user provides an imperceptible transition from the historical digital footprint to the simulated digital footprint, and where the simulated digital footprint prevents the public from accessing the current real digital footprint of the user.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Timothy J. Hahn, David B. Kumhyr