Patents by Inventor Zachary Burns
Zachary Burns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240076421Abstract: Provided herein is technology relating to polymerization and producing polymers and particularly, but not exclusively, to methods, systems, and compositions for producing articles using three-dimensional printing and for improving control of polymerization using a polymerization photoinhibitor having fast back reaction kinetics such as hexaarylbiimidazole compounds and bridged hexaarylbiimidazole compounds.Type: ApplicationFiled: November 13, 2023Publication date: March 7, 2024Inventors: Timothy F. Scott, Harry van der Laan, Megan A. Cole, Mark A. Burns, Martin P. De Beer, Zachary D. Pritchard, Avi Bregman
-
Patent number: 11778130Abstract: An apparatus for selectively displaying a reverse image of a user includes a screen configured to display images, an imaging device hidden behind the screen, a processor, and a memory. The memory includes instructions stored thereon which, when executed by the processor, cause the apparatus to capture the first image of a user, determine an eye-level height of the user based on the captured first image, move the imaging device to the determined eye-level height of the user, capture a second image of the user at the eye-level height of the user, render a mirrored image of the second image based on the vertical axis of the imaging device, and display the rendered mirrored image on the screen.Type: GrantFiled: January 18, 2023Date of Patent: October 3, 2023Inventor: Zachary Burns
-
Patent number: 11416478Abstract: Data structures for the transmission or storage of records and the efficient serialization and deserialization of such records are disclosed. Embodiments of such a data structure offer a large and flexible data structure and format that may include an object format and a stream format. These data structures may be a packed sequence that may include fields of varying types and encodings with an order determined by the schema of a particular type of record being serialized.Type: GrantFiled: January 8, 2020Date of Patent: August 16, 2022Assignee: LIVE EARTH, LLCInventor: Zachary Burns
-
Patent number: 11055260Abstract: Systems and methods for the compression and decompression of geospatial locations are disclosed. The compression and decompression are based on a prediction of the geospatial location and a geometrical projection of the Earth.Type: GrantFiled: December 17, 2019Date of Patent: July 6, 2021Assignee: LIVE EARTH, LLCInventor: Zachary Burns
-
Patent number: 10769285Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: GrantFiled: May 18, 2016Date of Patent: September 8, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10733324Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: March 19, 2019Date of Patent: August 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Publication number: 20200218713Abstract: Data structures for the transmission or storage of records and the efficient serialization and deserialization of such records are disclosed. Embodiments of such a data structure offer a large and flexible data structure and format that may include an object format and a stream format. These data structures may be a packed sequence that may include fields of varying types and encodings with an order determined by the schema of a particular type of record being serialized.Type: ApplicationFiled: January 8, 2020Publication date: July 9, 2020Inventor: Zachary Burns
-
Publication number: 20200192869Abstract: Systems and methods for the compression and decompression of geospatial locations are disclosed. The compression and decompression are based on a prediction of the geospatial location and a geometrical projection of the Earth.Type: ApplicationFiled: December 17, 2019Publication date: June 18, 2020Inventor: Zachary Burns
-
Publication number: 20190213358Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: March 19, 2019Publication date: July 11, 2019Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10255459Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: May 18, 2016Date of Patent: April 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Publication number: 20170337399Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Publication number: 20170337382Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Publication number: 20160377448Abstract: A computer implemented prediction and alert method automatically executable by a processing unit of a portable computing device. The method includes determining that an event begins from event information of the portable computing device, generating a list of likely event results based on current conditions of the event and historical data, alerting a user to an event result problem for each likely event result in accordance with first and second determinations as the event information indicates that an event decision of the event is upcoming, removing unlikely event results from the list once the event decision is passed and repeating the generating, alerting and removing until only a single event result remains on the list.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. Flaherty
-
Patent number: 9436859Abstract: Embodiments are directed to a method of identifying an identification (ID) tag. The method includes using a movable reader to determine a presence of an ID tag, an absence of the ID tag and that the ID tag has moved. The method further includes using the movable reader to determine a localization probability score of the ID tag, and, based on the localization probability score, adjust the movable reader's determination of the presence of the ID tag.Type: GrantFiled: September 29, 2014Date of Patent: September 6, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. B. Flaherty
-
Publication number: 20160092708Abstract: Embodiments are directed to a method of identifying an identification (ID) tag. The method includes using a movable reader to determine a presence of an ID tag, an absence of the ID tag and that the ID tag has moved. The method further includes using the movable reader to determine a localization probability score of the ID tag, and, based on the localization probability score, adjust the movable reader's determination of the presence of the ID tag.Type: ApplicationFiled: September 29, 2014Publication date: March 31, 2016Inventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J.B. Flaherty
-
Publication number: 20140324983Abstract: Embodiments relate to customizing instant messaging traffic. An aspect includes receiving a first association between a contact and a category and a second association between the category and one or more receiving client devices. A status from the one or more receiving client devices is routed to the contact based on the first and second associations. Additionally, a message from the contact is routed to the one or more receiving client devices based on the first and second associations.Type: ApplicationFiled: April 30, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Zachary A. Burns, Yuk L. Chan, Kin K. Choi, David J. Flaherty, Mark A. Scott
-
Publication number: 20140082099Abstract: In a method for notifying an owner or other rightful user of a mobile device of a misplaced mobile device, a computer receives social networking information about the rightful user of the mobile device. The computer receives, from the mobile device, a set of contextual information that is associated with the mobile device. The computer determines, based on the set of contextual information, whether the mobile device has been misplaced. In response to the computer determining that the mobile device has been misplaced, the computer dynamically identifies, based on the set of contextual information and on the social networking information, one or more contacts associated with the rightful user. In response to the computer determining that the mobile device has been misplaced, the computer sends a notification message to the identified one or more contacts. The notification message indicates that the rightful user's mobile device has been misplaced.Type: ApplicationFiled: September 19, 2012Publication date: March 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Zachary Burns, Yuk Lung Chan, Kin Choi, David J.B. Flaherty, Kevin H. Peters, Mark Allen Scott