Patents by Inventor C. Hunt
C. Hunt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10216289Abstract: Methods, systems and computer program products for emulating a laser pointer with a mobile device are provided. Aspects include determining a position of the mobile device in a room having a display screen, determining a location of the display screen in the room, and determining an orientation of the mobile device. Aspects also include calculating a line vector originating from the mobile device and modifying a display on the display screen to include an indicator of a point at which the line vector intersects the display screen based on a determination that the line vector intersects the display screen.Type: GrantFiled: April 29, 2016Date of Patent: February 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James K. Hook, Hamish C. Hunt, Nicholas K. Lincoln, Simon D. Stone
-
Patent number: 10204267Abstract: A method and system for authenticating a user. An expected digital representation of an iris of at least one authentic user is generated, by combining a first digital representation of an iris of an eye of at least one authentic user with a second digital representation of at least one authentic overlay pattern. In response to a determination that a third digital representation of a captured image of an iris of a user to be authenticated does not match the expected digital representation: the expected digital representation is modified to alter a relative rotational alignment between the representation of the at least one authentic overlay pattern and the expected digital representation of the iris; and a further comparison between the modified expected digital representation and the third digital representation is performed. From the further comparison, an authentication signal indicative of whether authentication of the user has been successful is generated.Type: GrantFiled: July 9, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Hamish C. Hunt, Ashley Shea
-
Patent number: 10171962Abstract: A method and apparatus for controlling a second mobile device in response to a first mobile device having no connection to a telephony service. A first unique identifier is assigned to the first group by a broker service apparatus that is a computer apparatus. The telephony service is notified of the first unique identifier. In response to receiving a first control signal including the first unique identifier and from the telephony service, the first unique identifier is used to identify the first group. The data is targeted to the first mobile device. In response to the first mobile device not being connected to the broker service apparatus and the second mobile device being connected to the broker service apparatus, a second control signal, which includes the identifier of the first mobile device, is issued to the second mobile device in order to forward the data to the second mobile device.Type: GrantFiled: October 27, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Hamish C. Hunt, Nicholas K. Lincoln, Christopher J. Poole, Mark A. Woolley
-
Patent number: 10146397Abstract: This invention relates to a system, method and computer program product for a graphic user interface (GUI) comprising: a GUI controller for controlling a GUI; a graphical cursor engine for projecting a mouse cursor on to a GUI and responsive to a user moving and controlling a mouse to select the graphical controls; a user action recorder for recording sequences of user actions in the GUI in a database of user sequences for a plurality of GUI user sessions; a next action engine for determining, in a particular GUI user session, a next action with the highest probability for a particular GUI based on one or more recorded sequences for that GUI in the database of user sequences and user past actions in that session; and a biasing engine for biasing graphical cursor movement towards the next action with the highest probability.Type: GrantFiled: November 27, 2015Date of Patent: December 4, 2018Assignee: International Business Machines CorporationInventors: Andrew S. Feltham, James K. Hook, Hamish C. Hunt, Nicholas K. Lincoln
-
Publication number: 20180330376Abstract: Secure passcode entry using a mobile device having augmented reality capability. The mobile device is registered with an authorization server to register an agreed input display algorithm with an initialization seed, and a user passcode is registered with the authorization server. A superset of options is obtained from an input interface device at which a user passcode is to be entered. The superset of options is processed using the input display algorithm and initialization seed to result in an arrangement of characters including the characters of a registered user passcode. The arrangement of characters is overlaid using the augmented reality capability of the mobile device in relation to an input interface of the input interface device.Type: ApplicationFiled: July 25, 2018Publication date: November 15, 2018Inventors: Simon A. S. Briggs, James K. Hook, Hamish C. Hunt, Nicholas K. Lincoln
-
Publication number: 20180314885Abstract: A method and system for authenticating a user. An expected digital representation of an iris of at least one authentic user is generated, by combining a first digital representation of an iris of an eye of at least one authentic user with a second digital representation of at least one authentic overlay pattern. In response to a determination that a third digital representation of a captured image of an iris of a user to be authenticated does not match the expected digital representation: the expected digital representation is modified to alter a relative rotational alignment between the representation of the at least one authentic overlay pattern and the expected digital representation of the iris; and a further comparison between the modified expected digital representation and the third digital representation is performed. From the further comparison, an authentication signal indicative of whether authentication of the user has been successful is generated.Type: ApplicationFiled: July 9, 2018Publication date: November 1, 2018Inventors: Hamish C. Hunt, Ashley Shea
-
Publication number: 20180285600Abstract: Briefly stated, the disclosed technology is generally directed to integrated circuit (IC) technology for an IoT processor. In one example, multiple components may be tightly or otherwise integrated onto a single die, e.g., a single monolithic integrated circuit. In one basic example, the components may include a security processing unit and a radio. The components may also include one or more microprocessors (e.g., a processor capable of executing a high-level operating system), microcontrollers, secure memories, encryption components, peripheral interfaces, and/or the like. The security processing unit and/or the configuration of the components may enable, facilitate, or otherwise provide for security features such as tamper resistance, data security, and/or the like.Type: ApplicationFiled: June 21, 2017Publication date: October 4, 2018Inventors: Galen C. HUNT, Robert SHEARER, George T. LETEY, Douglas L. STILES, Edmund B. NIGHTINGALE
-
Patent number: 10078783Abstract: A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained. A second digital representation of at least one authentic overlay pattern is obtained. A third digital representation of a captured image of an iris of a user to be authenticated is obtained, where the iris of the user has been overlaid with a contact lens including a further overlay pattern thereby creating an image composed of the iris of the user and the further overlay pattern. An expected digital representation of an iris of at least one authentic user is generated, by combining the first and second digital representations. Authenticating the user is attempted by comparing the third digital representation with the expected digital representation. An authentication signal indicative of whether authentication of the user has been successful is generated based on the comparing.Type: GrantFiled: January 11, 2017Date of Patent: September 18, 2018Assignee: International Business Machines CorporationInventors: Hamish C. Hunt, Ashley Shea
-
Publication number: 20180234817Abstract: A method and apparatus for controlling a second mobile device in response to a first mobile device having no connection to a telephony service. A first unique identifier is assigned to the first group by a broker service apparatus that is a computer apparatus. The telephony service is notified of the first unique identifier. In response to receiving a first control signal including the first unique identifier and from the telephony service, the first unique identifier is used to identify the first group. The data is targeted to the first mobile device. In response to the first mobile device not being connected to the broker service apparatus and the second mobile device being connected to the broker service apparatus, a second control signal, which includes the identifier of the first mobile device, is issued to the second mobile device in order to forward the data to the second mobile device.Type: ApplicationFiled: October 27, 2015Publication date: August 16, 2018Inventors: Hamish C. Hunt, Nicholas K. Lincoln, Christopher J. Poole, Mark A. Woolley
-
Patent number: 10049358Abstract: Secure passcode entry using a mobile device having augmented reality capability. The mobile device is registered with an authorization server to register an agreed input display algorithm with an initialization seed, and a user passcode is registered with the authorization server. A superset of options is obtained from an input interface device at which a user passcode is to be entered. The superset of options is processed using the input display algorithm and initialization seed to result in an arrangement of characters including the characters of a registered user passcode. The arrangement of characters is overlaid using the augmented reality capability of the mobile device in relation to an input interface of the input interface device.Type: GrantFiled: October 20, 2015Date of Patent: August 14, 2018Assignee: International Business Machines CorporationInventors: Simon A. S. Briggs, James K. Hook, Hamish C. Hunt, Nicholas K. Lincoln
-
Patent number: 10042988Abstract: A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A plurality of user login credentials submitted by a user utilizing the pair of AR glasses to access a plurality of encrypted code. The method may determine the user is authorized to access a portion of the plurality of encrypted code based on the received plurality of user login credentials. The method may further decrypt the portion based on determining the user is authorized to access the portion. The method may further include displaying the decrypted portion on a lens within the pair of AR glasses.Type: GrantFiled: August 8, 2017Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: James K. Hook, Hamish C. Hunt, Nicholas K. Lincoln
-
Publication number: 20180197005Abstract: A method and system for authenticating a user. A first digital representation of an iris of an eye of at least one authentic user is obtained. A second digital representation of at least one authentic overlay pattern is obtained. A third digital representation of a captured image of an iris of a user to be authenticated is obtained, where the iris of the user has been overlaid with a contact lens including a further overlay pattern thereby creating an image composed of the iris of the user and the further overlay pattern. An expected digital representation of an iris of at least one authentic user is generated, by combining the first and second digital representations. Authenticating the user is attempted by comparing the third digital representation with the expected digital representation. An authentication signal indicative of whether authentication of the user has been successful is generated based on the comparing.Type: ApplicationFiled: January 11, 2017Publication date: July 12, 2018Inventors: Hamish C. Hunt, Ashley Shea
-
Publication number: 20180165448Abstract: The disclosed technology is generally directed to integrated circuit technology with defense-in-depth. In one example of the technology, an integrated circuit includes a set of independent execution environments including at least two independent execution environments. At least two of the independent execution environments are general purpose cores with differing capabilities. The independent execution environments in the set of independent execution environments are configured to have a defense-in-depth hierarchy.Type: ApplicationFiled: February 27, 2017Publication date: June 14, 2018Inventors: Edmund B. Nightingale, Reuben R. Olinsky, Galen C. Hunt, Douglas Stiles, George Thomas Letey
-
Publication number: 20180165922Abstract: Controlling transmission of an alert to a user of a device providing audio. An event which is identified as an alert is detected, and it is determined that the alert is a notifiable alert. A movement sensor associated with the user is monitored during a time period after detection of the notifiable alert. During the time period, it is determined whether movement of the sensor has deviated from a prior pattern of movement. A deviation indicates a user response to the alert. An action to alert the user is taken if the movement of the sensor during the time period has not deviated from the prior pattern of movement indicating that the user has not responded to the original alert. There is no such action if the movement of the sensor has deviated from the prior pattern of movement indicating a user response to the alert.Type: ApplicationFiled: December 14, 2016Publication date: June 14, 2018Inventors: Hamish C. Hunt, Nicholas K. Lincoln, Christopher J. Poole, Mark A. Woolley
-
Patent number: 9971444Abstract: Touch sensors with multiple electrically isolated touch regions are disclosed. A touch sensor may be electrically partitioned into a first touch region and a second touch region. The first touch region and the second touch region may be physically connected and electrically isolated from each other. The first touch region and the second touch region may each independently define an independently operable portion of the touch sensor such that a failure in one of the first touch region or the second touch region does not impair operations in another one of the first touch region or the second touch region. A touch sensor configured in this manner may be implemented as a standalone touch sensing device, or as a component of other devices such as electronic displays or the like.Type: GrantFiled: May 11, 2016Date of Patent: May 15, 2018Assignee: Rockwell Collins, Inc.Inventors: Alan M. Kuefler, Allen C. Hunt
-
Publication number: 20180109478Abstract: According to one embodiment, a method for lossy data compression is provided. The method may also include determining a length and a plurality of bounding characters associated with each data item within the data message. The method may further include encoding each data item within the data message by replacing each data item with the determined length and the determined plurality of bounding characters. The method may also include transmitting the data message to a recipient.Type: ApplicationFiled: December 19, 2017Publication date: April 19, 2018Inventors: Hamish C. Hunt, Nicholas K. Lincoln, Christopher J. Poole, Mark A. Woolley
-
Publication number: 20180095779Abstract: Model-based virtual system provisioning includes accessing a model of a workload to be installed on a virtual machine of a system as well as a model of the system. A workload refers to some computing that is to be performed, and includes an application to be executed to perform the computing, and optionally includes the operating system on which the application is to be installed. The workload model identifies a source of the application and operating system of the workload, as well as constraints of the workload, such as resources and/or other capabilities that the virtual machine(s) on which the workload is to be installed must have. An installation specification for the application is also generated, the installation specification being derived at least in part from the model of the workload and the model of the virtual system.Type: ApplicationFiled: September 29, 2017Publication date: April 5, 2018Inventors: Anders B. Vinberg, Robert M. Fries, Kevin Grealish, Galen C. Hunt, Aamer Hydrie, Edwin R. Lassettre, Rob Mensching, Geoffrey Outhred, John M. Parchem, Bassam Tabbara, Rene Antonio Vega, Robert V. Welland, Eric J. Winner, Jeffrey A. Woolsey
-
Publication number: 20180091362Abstract: Disclosed are methods, systems and computer program products for operating and controlling network-enabled devices. A network-enabled device communicates capability information representative of its set of capabilities. The network-enabled device also communicates a status signal indicative of the status of the device. It may be determined that the first network-enabled device is unable or unavailable to perform a function based on a status signal communicated by the first network-enabled device. A second network-enabled device may be identified to assign a failover function to based on the respective capabilities of the second network-enabled devices.Type: ApplicationFiled: October 27, 2017Publication date: March 29, 2018Inventors: JAMES K. HOOK, HAMISH C. HUNT, NICHOLAS K. LINCOLN, SIMON D. STONE
-
Patent number: 9912624Abstract: According to one embodiment, a method for lossy data compression is provided. The method may include receiving a data message from a sender. The method may also include determining a length and a plurality of bounding characters associated with each data item within the received data message. The method may further include encoding each data item within the received data message by replacing each data item with the determined length and the determined plurality of bounding characters. The method may also include transmitting the received data message to a recipient.Type: GrantFiled: September 25, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Hamish C. Hunt, Nicholas K. Lincoln, Christopher J. Poole, Mark A. Woolley
-
Patent number: RE46832Abstract: An emergency exit door lock system configured to cooperate with a door hinged in a door frame for sensing when a person attempts to open the door, and for allowing the door to open after a subsequent delay. The system comprises an electromagnet affixable to a door frame for electromagnetically attracting an armature resiliently affixed at a variable armature separation distance to an armature mounting device, the device being affixable to the door. A proximity sensor including an analog Hall Effect device is mountable to the frame for detecting movement of the door away from a closed position. A controller, such as a micro-controller, receives a signal from the sensor and causes an alarm as a function of the signal. The signal is indicative of the armature separation distance, the controller being calibrate-able to provide a door alarm signal and door opening signal at any desired value of the armature separation distance.Type: GrantFiled: September 1, 2016Date of Patent: May 8, 2018Assignee: Hanchett Entry Systems, Inc.Inventors: Robert C. Hunt, Thomas Edward Roth