Patents by Inventor Samuel Scott Adams
Samuel Scott Adams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11507769Abstract: A method and system to interpret sensor transmission patterns to analyze anomalies in a smart environment include obtaining a map of the smart environment, the map including an indication of obstructions and openings. The method includes determining an initial location of each sensor of a plurality of sensors in the smart environment. Each sensor emits a transmission after each detection. The method also includes identifying an initial transmission pattern associated with each sensor, and identifying a change in the initial transmission pattern of a sensor among the plurality of sensors. The change is interpreted to determine whether the change in the initial transmission pattern of the sensor among the plurality of sensors is due to movement or obstruction of the sensor. Action is taken based on a determination that the sensor among the plurality of sensors is obstructed or removed.Type: GrantFiled: December 12, 2018Date of Patent: November 22, 2022Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Scott Gerard, Aliza Heching, Samuel Scott Adams, Mohammad Arif Ul Alam
-
Patent number: 11316833Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include executing a program, via the processor, using zero-knowledge verifiable computing to remove private content from a pre-approved version of a content to ensure privacy of a condition of a user from a provider of the content.Type: GrantFiled: March 26, 2020Date of Patent: April 26, 2022Inventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
-
Publication number: 20200228502Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include executing a program, via the processor, using zero-knowledge verifiable computing to remove private content from a pre-approved version of a content to ensure privacy of a condition of a user from a provider of the content.Type: ApplicationFiled: March 26, 2020Publication date: July 16, 2020Inventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
-
Patent number: 10708234Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include a content request receiving circuit configured to receive a service request from a user, to communicate the service request to a provider, and to receive pre-approved versions of content from the provider, a content matching circuit configured to match a pre-approved version of content of the pre-approved versions of content to the user based on a condition of the user, a user data receiving circuit configured to receive user data to complete the pre-approved version of the content, and a zero-knowledge verifiable computing circuit configured to execute a program using zero-knowledge verifiable computing to remove private content from the pre-approved version of the content to ensure privacy of the condition of the user from the provider.Type: GrantFiled: March 24, 2016Date of Patent: July 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
-
Publication number: 20200193155Abstract: A method and system to interpret sensor transmission patterns to analyze anomalies in a smart environment include obtaining a map of the smart environment, the map including an indication of obstructions and openings. The method includes determining an initial location of each sensor of a plurality of sensors in the smart environment. Each sensor emits a transmission after each detection. The method also includes identifying an initial transmission pattern associated with each sensor, and identifying a change in the initial transmission pattern of a sensor among the plurality of sensors. The change is interpreted to determine whether the change in the initial transmission pattern of the sensor among the plurality of sensors is due to movement or obstruction of the sensor. Action is taken based on a determination that the sensor among the plurality of sensors is obstructed or removed.Type: ApplicationFiled: December 12, 2018Publication date: June 18, 2020Inventors: Susann Marie Keohane, Scott Gerard, Aliza Heching, Samuel Scott Adams, Mohammad Arif Ul Alam
-
Patent number: 10346759Abstract: Automatically create abstractions of large sets of data and then probabilistic inferences based on the abstractions. The probabilistic inference is derived from the logical hierarchy using Bayesian statistics to infer a probabilistic event based upon a characteristic of the data in a hierarchy of synthetic events. The logical hierarchy of a set of a plurality of synthetic events is related by at least one characteristic of data is built by accessing a first set of data. The first set of data is organized based on a first characteristic. A second set of data different than the first set of data is accessed. A second set of data based is organized based on a second characteristic. The first characteristic and the second characteristic are processed to generate a synthetic event. The synthetic event is a third set of data representing a result of a mathematical computation defined by an operation S(p1)==>F(p2).Type: GrantFiled: September 28, 2015Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Samuel Scott Adams, Robert R. Friedlander, James R. Kraemer, Kelly Grant Lee
-
Patent number: 10120957Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.Type: GrantFiled: June 2, 2017Date of Patent: November 6, 2018Assignee: International Business Machines CorporationInventors: Samuel Scott Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
-
Publication number: 20170277904Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include a content request receiving circuit configured to receive a service request from a user, to communicate the service request to a provider, and to receive pre-approved versions of content from the provider, a content matching circuit configured to match a pre-approved version of content of the pre-approved versions of content to the user based on a condition of the user, a user data receiving circuit configured to receive user data to complete the pre-approved version of the content, and a zero-knowledge verifiable computing circuit configured to execute a program using zero-knowledge verifiable computing to remove private content from the pre-approved version of the content to ensure privacy of the condition of the user from the provider.Type: ApplicationFiled: March 24, 2016Publication date: September 28, 2017Inventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
-
Publication number: 20170270220Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.Type: ApplicationFiled: June 2, 2017Publication date: September 21, 2017Applicant: International Business Machines CorporationInventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
-
Patent number: 9703894Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.Type: GrantFiled: September 25, 2015Date of Patent: July 11, 2017Assignee: International Business Machines CorporationInventors: Samuel Scott Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
-
Patent number: 9697898Abstract: A content addressable memory system, method and computer program product is described. The memory system comprises a location addressable store having data identified by location and multiple levels of content addressable stores each holding ternary content words. The content words are associated with references to data in the location addressable store and the content words containing at least one next entry bit for sorting content words in a physical ordered sequence to create content ordered memory. The content store levels might be implemented using different technologies that have different performance, capacity, and cost attributes. The memory system includes a content based cache for improved performance and a content addressable memory management unit for managing memory access operations and virtual memory addressing.Type: GrantFiled: September 24, 2015Date of Patent: July 4, 2017Assignee: International Business Machines CorporationInventors: Samuel Scott Adams, Suparna Bhattacharya, Robert R. Friedlander, James R. Kraemer
-
Publication number: 20170092358Abstract: A content addressable memory system, method and computer program product is described. The memory system comprises a location addressable store having data identified by location and multiple levels of content addressable stores each holding ternary content words. The content words are associated with references to data in the location addressable store and the content words containing at least one next entry bit for sorting content words in a physical ordered sequence to create content ordered memory. The content store levels might be implemented using different technologies that have different performance, capacity, and cost attributes. The memory system includes a content based cache for improved performance and a content addressable memory management unit for managing memory access operations and virtual memory addressing.Type: ApplicationFiled: September 24, 2015Publication date: March 30, 2017Inventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
-
Publication number: 20170091344Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
-
Publication number: 20170091639Abstract: Automatically create abstractions of large sets of data and then probabilistic inferences based on the abstractions. The probabilistic inference is derived from the logical hierarchy using Bayesian statistics to infer a probabilistic event based upon a characteristic of the data in a hierarchy of synthetic events. The logical hierarchy of a set of a plurality of synthetic events is related by at least one characteristic of data is built by accessing a first set of data. The first set of data is organized based on a first characteristic. A second set of data different than the first set of data is accessed. A second set of data based is organized based on a second characteristic. The first characteristic and the second characteristic are processed to generate a synthetic event. The synthetic event is a third set of data representing a result of a mathematical computation defined by an operation S(p1)==>F(p2).Type: ApplicationFiled: September 28, 2015Publication date: March 30, 2017Inventors: Samuel Scott ADAMS, Robert R. FRIEDLANDER, James R. KRAEMER, Kelly Grant LEE
-
Patent number: 9195440Abstract: A method, system, and computer program product for amorphous data preparation for intelligent data source selection in application development are provided in the illustrative embodiments. A set of keywords is selected from a code portion of a source code. Using a subset of the set of keywords, an expected circumstance is determined, the expected circumstance being a circumstance relevant to a purpose of the source code. From a set of data sources, a data source is identified, wherein the data source provides information usable in the expected circumstance. A manner of accessing the information from the data source is identified. Pseudo-code is constructed to implement the manner of accessing the information from the data source. A weight is assigned to the data source based upon a type of input used for selecting the pseudo-code, wherein the selecting uses the pseudo-code in the source code.Type: GrantFiled: November 26, 2013Date of Patent: November 24, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel Scott Adams, Rosalind Toy Allen Radcliffe, Elizabeth Vera Woodward, Shunguo Yan
-
Publication number: 20150149981Abstract: A method, system, and computer program product for amorphous data preparation for intelligent data source selection in application development are provided in the illustrative embodiments. A set of keywords is selected from a code portion of a source code. Using a subset of the set of keywords, an expected circumstance is determined, the expected circumstance being a circumstance relevant to a purpose of the source code. From a set of data sources, a data source is identified, wherein the data source provides information usable in the expected circumstance. A manner of accessing the information from the data source is identified. Pseudo-code is constructed to implement the manner of accessing the information from the data source. A weight is assigned to the data source based upon a type of input used for selecting the pseudo-code, wherein the selecting uses the pseudo-code in the source code.Type: ApplicationFiled: November 26, 2013Publication date: May 28, 2015Applicant: International Business Machines CorporationInventors: Samuel Scott Adams, Rosalind Toy Allen Radcliffe, Elizabeth Vera Woodward, Shunguo Yan
-
Publication number: 20140358952Abstract: A method, computer program product and system for generating and maintaining synthetic context events. The steps include searching a data structure of synthetic context-based objects and associated data for a pattern of context exhibited at a first specified frequency within a first specified time period; combining the synthetic context-based objects and associated data exhibiting the pattern of context exhibited at the first specified frequency within the first specified time period into a synthetic context event; and optimizing and maintaining the synthetic context event by searching the data structure for additional synthetic context-based objects and associated data exhibiting a same pattern of context at a second specified time period different than the first specified time period and adding the additional synthetic context-based objects and associated data to the synthetic context event.Type: ApplicationFiled: May 31, 2013Publication date: December 4, 2014Inventors: Samuel Scott Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
-
Publication number: 20140358948Abstract: A method, system, and computer program product for detecting anomalous events from a data input comprising a plurality of events. The method comprising the steps of: selecting at least one filter selecting for context data determined to be probabilistically present within a specified degree of certainty in the data input; comparing the data input to the selected at least one filter; discarding the events from the data input that are the same as the context data for which the at least one filter selects; and storing in a repository the events remaining in the data input as anomalous events.Type: ApplicationFiled: May 28, 2013Publication date: December 4, 2014Inventors: Samuel Scott Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
-
Publication number: 20140324735Abstract: A method, system and computer program product for maximizing the utility of data obtained from multiple intersecting data structures and stored in a multi-dimension information space. The method includes the steps of generating a rigid mathematical structure within the multi-dimensional information space; dividing the rigid mathematical structure into segments, each segment having a volume determined by a time of access to the segment relative to an event, a duration of access to the segment and a quantity of data in the segment; and determining a sellable price point for each segment of the rigid mathematical structure based on the volume of the segment.Type: ApplicationFiled: April 24, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Samuel Scott Adams, Robert R. Friedlander, James R. Kraemer, Philip R. Varker