Patents by Inventor Christopher Diebold O'Toole

Christopher Diebold O'Toole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160189159
    Abstract: There are provided systems and methods for peer location detection to determine an identity of a user. A user may initiate a transaction request for approval at a merchant location that the merchant rarely or has never visited. The transaction request may be initiated with a communication device of the user or through a payment instrument where the user has the communication device while at the merchant's location. The user may choose to not share the user's location using the communication device, thus, a payment processing service may not utilize the user's location as additional fraud detection. However, another user associated with the user may choose to share the location of the other user, such as through the communication device or in another transaction or transaction request. The payment processing service may detect the location of the associated user to assess a risk of fraud.
    Type: Application
    Filed: December 29, 2014
    Publication date: June 30, 2016
    Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole
  • Publication number: 20160189151
    Abstract: An electronic commerce server connected to a network has access to user data, device data and public key data. The server receives transaction details including a digital signature from a mobile device, the digital signature generated using a first private key associated with a first public key. The server generates a challenge based on the transaction details and transmits the challenge to at least one computing device according to device data associated with the mobile device or user data associated with the user of the mobile device. The server may then receive a response to the challenge from the at least one computing device, the response including a digital signature generated using a second private key associated with a second public key. The server authorizes the transaction based on reading the first digital signature using the first public key and reading the second digital signature using the second public key.
    Type: Application
    Filed: December 31, 2014
    Publication date: June 30, 2016
    Inventors: Robert He, Christopher Diebold O'Toole, Bryant Genepang Luk, Eric Byungho Min
  • Publication number: 20160188973
    Abstract: Methods, systems, and computer program products are disclosed for automatically adjusting a display to obscure application data. In an example, a computer-implemented method may include collecting eye data from a user, receiving the eye data collected from the user, analyzing the eye data, determining that eyesight of the user is on a display based on the eye data, providing data on the display to the user when the eyesight of the user is determined to be on the display, determining that the eyesight of the user is off the display, obscuring the data on the display in response to determining that the eyesight of the user is off the display, removing the obscuring applied to the data on the display when the eyesight of the user returns to the display.
    Type: Application
    Filed: December 29, 2014
    Publication date: June 30, 2016
    Inventors: Jason Ziaja, Bryant Genepang Luk, Christopher Diebold O'Toole, Jennifer T. Brenner, Robert He, Yu Tang, Ananya Das
  • Publication number: 20160182801
    Abstract: Systems and methods are presented for modifying image parameters of an image to be captured by an image capturing device based on input from a wearable computing device. In some embodiments, the system receives image data, determines an image parameter based on the image data, and receives data from a wearable computing device positioned proximate to a subject of the image. The system modifies the image parameter based on the data received from the wearable computing device and captures the image data using the modified image parameter.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Bryant Genepang Luk, Richard Chapman Bates, Christopher Diebold O'Toole, Robert He, Jennifer T. Brenner, Yu Tang, Jason Ziaja, Ananya Das
  • Publication number: 20160179498
    Abstract: A system for maintaining and upgrading hardware device functioning provides processes to select and install updates for software (e.g., applications or apps) on the hardware device. A notification system provides information for discretion and control over the selection of software updates to be applied to consumer mobile devices according to the particular characteristics of the device, e.g., the model of device, the specific operating system of the device, and software applications installed on the device. The notification system may be integral with app stores on mobile devices and tablets, and may also be applicable to the Internet of Things. A notification may take the form, for example, of a warning or recommendation associated with an update for an app on the user device and may enable the user to make an informed decision beforehand about whether or not to install a particular update on the user device.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Ananya Das, Jason Ziaja, Bryant Genepang Luk, Jennifer T. Brenner, Yu Tang, Robert He, Christopher Diebold O'Toole
  • Publication number: 20160182816
    Abstract: Systems and methods are presented for identifying unintended subjects in an image to be captured and causing an action based on the unintended subjects. In some embodiments, the system receives image data indicative of an image to be captured, determines a first set of subjects within the image data, determines an identity of a second set of subjects included in the first set of subjects within the image data, and determined an existence of one or more unidentified subjects of the first set of subjects. The system then generates an interrupt indicative of the one or more unidentified subjects of the first set of subjects.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Bryant Genepang Luk, Richard Chapman Bates, Christopher Diebold O'Toole, Robert He, Jennifer T. Brenner, Yu Tang, Jason Ziaja, Ananya Das
  • Publication number: 20160173359
    Abstract: In various example embodiments, devices including a wearable device may be associated to share information and coordinate data between the devices as part of a coordination between relationship wearables. For example, a first wearable device and a second device, each associated with different users, may provide data to a history analysis module. The history analysis module may analyze this data for coordinated relationship patters made up of repeated events. Coordinated relationship data may be generated by this analysis, and then used by a current data analysis module to analyze an incoming stream of current data from at least one of the devices. When a repeated status value is identified within the current data stream, a coordination communication may be initiated.
    Type: Application
    Filed: December 12, 2014
    Publication date: June 16, 2016
    Inventors: Jennifer T. Brenner, Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole, Yu Tang, Jason Ziaja, Ananya Das
  • Publication number: 20160163200
    Abstract: Disclosed are systems, mediums, and methods for managing and controlling travel for a convoy of vehicles. A traffic control system includes a traffic control device that receives one or more signals indicating two or more vehicles proximate to a location. The traffic control device determines a convoy based at least on the one or more signals, where the convoy includes the two or more vehicles proximate to the location. The traffic control device determines traffic-signal data based at least on the convoy, where the traffic-signal data is configured to maintain threshold distances between two or more vehicles in the convoy. The traffic control device transmits the traffic-signal data to a traffic controller configured to select one or more traffic signals, where the one or more traffic signals enable the two or more vehicles to maintain the threshold distances between the two or more vehicles in the convoy.
    Type: Application
    Filed: December 3, 2014
    Publication date: June 9, 2016
    Inventors: Robert He, Bryant Luk, Christopher Diebold O'Toole, Jennifer Brenner, Yu Tang, Ananya Das, Jason Ziaja
  • Publication number: 20160153853
    Abstract: In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
    Type: Application
    Filed: December 1, 2014
    Publication date: June 2, 2016
    Inventors: Jennifer T. Brenner, Bryant Genepang Luk, Robert He, Ananya Das, Christopher Diebold O'Toole, Yu Tang, Richard Chapman Bates, Jason Ziaja
  • Publication number: 20160155166
    Abstract: A system or method is provided to allow customers or users to bid for positions in a line. In particular, the system may determine the positions of various users in line and may set up a line bidding interface for the line. The line bidding interface may present users with various information of the line and various bidding options. The system may allow a user to post the user's line position for others to bid on. Further, the system may allow a user to post a monetary offer for another user to leave or switch line position. The system also may allow one or more users to bid for another user to leave the front of the line. For example, one or more users may crowd source a monetary offer for a user who is in the front of the line to leave.
    Type: Application
    Filed: December 2, 2014
    Publication date: June 2, 2016
    Inventors: Robert He, Bryant Genepang Luk, Christopher Diebold O'Toole
  • Publication number: 20160155281
    Abstract: Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
    Type: Application
    Filed: December 1, 2014
    Publication date: June 2, 2016
    Inventors: Christopher Diebold O'Toole, Bryant Genepang Luk, Robert He, Richard Chapman Bates, Jennifer T. Brenner, Yu Tang
  • Publication number: 20160132652
    Abstract: Systems and methods for controlling the spread of a communicable disease are provided. A combination of physiological data and location data is used to estimate the likelihood that an individual is ill. Once an individual is determined to be ill, the individual's location history may be examined and individuals who were exposed to the individual identified. By tracking individuals who may be ill or who have reported themselves to be ill, and by identifying individuals with a possible exposure to those who may be ill, potential carriers of illness can be quarantined and their access to areas where communicable diseases pose a high risk limited.
    Type: Application
    Filed: November 11, 2014
    Publication date: May 12, 2016
    Inventors: Richard Chapman Bates, Bryant Luk, Robert He, Christopher Diebold O'Toole, Jennifer Brenner, Ananya Das, Jason Ziaja, Yu Tang
  • Publication number: 20160127766
    Abstract: Devices, systems, and methods for detecting user devices to determine a state of a watched show are provided. A digital video recorder (DVR) is configured to store a media file associated with a media program. The DVR detects one or more user devices within a predetermined vicinity while the media program is being played. The DVR identifies users who are interested in the media program. The DVR tracks a watch status associated with the media program indicating which users have watched or are watching the media program based on the detected user devices. For stored media files, the DVR determines whether to delete the media file based on whether all users who are interested in the media program have completed watching the media program. The DVR may track user activity and/or vital signs based on sensor data from wearable devices, for example, to determine user reaction and/or user interests.
    Type: Application
    Filed: October 31, 2014
    Publication date: May 5, 2016
    Inventors: Bryant Genepang Luk, Christopher Diebold O'Toole, Richard Chapman Bates, Robert He
  • Publication number: 20160069705
    Abstract: Systems and methods are presented for sequencing locations and events and determining routing and itineraries for the sequence. In some embodiments the system may receive a starting location, a first location, and a second location in a default order. The system may determine a sequence from the starting location for the first location and the second location. The system may generate a route for the sequence with the route having transportation directions between the starting location, the second location, and the first location indicative of the sequence. The system may display the route in a graphical user interface of an application.
    Type: Application
    Filed: September 5, 2014
    Publication date: March 10, 2016
    Inventors: Jennifer T. Brenner, Yu Tang, Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole
  • Publication number: 20160057626
    Abstract: There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
    Type: Application
    Filed: August 22, 2014
    Publication date: February 25, 2016
    Inventors: Christopher Diebold O'Toole, Bryant Genepang Luk, Robert He, Jennifer Brenner, Yu Tang
  • Publication number: 20160048892
    Abstract: A system, method, and computer readable medium is provided to identify a user that can provide relevant information to another user currently located at a particular location. A device location (DL) manager receives first data indicating a presence of a first computing device at a location that corresponds to an item. The first computing device is associated with a first user account. The DL manager sends a first notification to the first user account due to activity related to the item by a second user account. The first notification identifies the second user account. The DL manager receives a message from the first user account for the second user account.
    Type: Application
    Filed: August 14, 2014
    Publication date: February 18, 2016
    Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole
  • Publication number: 20150355893
    Abstract: A system and/or method may be provided to install applications based on location. In particular, a location of a user device may be detected. Based on the location of the user device, one or more applications may be selected to be installed automatically on the user device. Further, when the user device departs from the location, the application may automatically be uninstalled. Thus, applications may be installed and/or uninstalled on the user device based on the location of the user device. The automatically installed application may provide functionality or information associated with the location that triggered the installation. For example, a merchant's store may be associated with the merchant's application which may be installed automatically on devices of customers who enter the merchant's store.
    Type: Application
    Filed: June 9, 2014
    Publication date: December 10, 2015
    Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole, Yu Tang, Jennifer T. Brenner
  • Publication number: 20150339318
    Abstract: Systems and method for splitting a bill offline include detecting one or more local devices using local wireless communications provided by a peer-to-peer communication module. At least one payer device of the one or more local devices is selected for apportioning a primary bill. An offline payment authorization is then received from each at least one payer device through local wireless communications provided by the peer-to-peer communication module. When an Internet connection is later detected, the system provider connects to the Internet and sends the offline payment authorization received from each at least one payer device to a payment provider device over the Internet. The payment provider device may then transfer funds from account(s) of the at least one payer device to the account of the system provider.
    Type: Application
    Filed: May 22, 2014
    Publication date: November 26, 2015
    Inventors: Christopher Diebold O'Toole, Yu Tang, Bryant Genepang Luk, Robert He, Jennifer Tatiana Brenner
  • Publication number: 20150332033
    Abstract: Example methods and systems directed to a Transaction Manager are described. According to various embodiments, the Transaction Manager generates modules and sends modules to various computing devices. The modules, when executed on a computing device(s), cause a computing device(s) to execute various actions described below. Transaction Manager sends modules to a wireless mobile device. Upon executing the modules, the wireless mobile device receives a transaction initiation message and presents an alert upon receipt of the transaction initiation message. The wireless mobile device detects an occurrence of a physical gesture and recognizes the occurrence of the physical gesture as authorization to proceed with a transaction. The wireless mobile device sends a response to the transaction initiation message based on detecting the occurrence of the physical gesture. The response includes a customer identification for the transaction.
    Type: Application
    Filed: May 19, 2014
    Publication date: November 19, 2015
    Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole, Jennifer T. Brenner, Yu Tang
  • Publication number: 20150333960
    Abstract: A method and a system a thermal context manager (hereinafter “TCM”) detects a thermal state and a position of a computing device. Based on the detected thermal state(s) and the detected position(s) of the computing device, the TCM initiates an action associated with the computing device. The TCM continually monitors the computing device in order to create a thermal state profile of the computing device. To create the thermal state profile, the TCM stores data representing each detected instance of the thermal state of the computing device and data representing each detected position of the computing device.
    Type: Application
    Filed: May 19, 2014
    Publication date: November 19, 2015
    Inventors: Robert He, Bryant Genepang Luk, Christopher Diebold O'Toole