Patents by Inventor Stephen Y. Chow
Stephen Y. Chow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10839337Abstract: An apparatus, termed a destination validation device (DVD), comprises a sensor configured to sense physical presence of a parcel and to obtain metadata from said parcel; at least one data processor connected with at least one memory storing software instructions that when executed causes the DVD to at least determine from reading the obtained metadata whether a signature is required for delivery of the parcel, and prepare a destination delivery acknowledgement indicating whether said signature is required; and a transmitter configured to communicate the prepared destination delivery acknowledgement external of the DVD. In this manner a delivery service can verify that the parcel is at the physical delivery location. Further details provide for also obtaining the (digital) signature when the metadata indicates it is required for delivery of the parcel. Other embodiments include a method and a computer program product comprised of software instructions on a computer-readable medium.Type: GrantFiled: June 23, 2015Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: Nader M. Nassar, Grant D. Miller, Erich D. Walls, Richard Newhook, Stephen Y. Chow
-
Patent number: 9852636Abstract: Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.Type: GrantFiled: May 18, 2012Date of Patent: December 26, 2017Assignee: International Business Machines CorproationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20160379157Abstract: An apparatus, termed a destination validation device (DVD), comprises a sensor configured to sense physical presence of a parcel and to obtain metadata from said parcel; at least one data processor connected with at least one memory storing software instructions that when executed causes the DVD to at least determine from reading the obtained metadata whether a signature is required for delivery of the parcel, and prepare a destination delivery acknowledgement indicating whether said signature is required; and a transmitter configured to communicate the prepared destination delivery acknowledgement external of the DVD. In this manner a delivery service can verify that the parcel is at the physical delivery location. Further details provide for also obtaining the (digital) signature when the metadata indicates it is required for delivery of the parcel. Other embodiments include a method and a computer program product comprised of software instructions on a computer-readable medium.Type: ApplicationFiled: June 23, 2015Publication date: December 29, 2016Inventors: Nader M. Nassar, Grant D. Miller, Erich D. Walls, Richard Newhook, Stephen Y. Chow
-
Patent number: 8875239Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.Type: GrantFiled: August 10, 2011Date of Patent: October 28, 2014Assignee: International Business Machines CorporationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Patent number: 8793761Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.Type: GrantFiled: August 10, 2011Date of Patent: July 29, 2014Assignee: International Business Machines CorporationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20130311641Abstract: Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.Type: ApplicationFiled: May 18, 2012Publication date: November 21, 2013Applicant: International Business Machines CorporationInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20130212662Abstract: Implementing security access includes creating a coordinate system that includes a first axis and a second axis. Points on the first axis and the second axis specify corresponding coordinates. The security access also includes randomly selecting values from a database and populating the coordinate system with the values and selecting a set of the coordinates from the coordinate system. The set of coordinates is indicative of an instruction. The security access further includes generating an image from the coordinate system and the values, the image including labels for the coordinates along respective first axis and second axis, and identifying values corresponding to the set of coordinates. The values correspond to the set of coordinates indicative of an answer to the instruction. The security access also includes transmitting the image and the instruction to a user device, and using the image, the instruction, and the answer as a security access mechanism.Type: ApplicationFiled: February 14, 2012Publication date: August 15, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard Newhook, Erich D. Walls
-
Publication number: 20130042303Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.Type: ApplicationFiled: August 10, 2011Publication date: February 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls
-
Publication number: 20130042302Abstract: Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.Type: ApplicationFiled: August 10, 2011Publication date: February 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Y. Chow, Grant D. Miller, Nader M. Nassar, Richard J. Newhook, Erich D. Walls