Patents by Inventor Todd Seager
Todd Seager has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9858031Abstract: Computer-implemented methods, computer program products and computer systems that create a virtual extended display on mobile devices by providing a first device in a first location d at least a second device in a second location, followed by joining together the first and second devices within an aggregation session via a network. Logical data of visual content is shared between the first and second devices, and the viewed output display of the visual content split amongst the first and second device displays within the aggregation session. During the aggregation session, at least one of the devices therein is manipulated by movement or changing device parameters to virtually change the viewed output display of the visual content on the manipulated device.Type: GrantFiled: March 11, 2013Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Douglas S. Brown, John F. Kelley, Todd Seager, Robert J. Torres
-
Patent number: 9569873Abstract: A method, process, and associated systems for automatically selecting and masking areas of a still image or frame of a video clip as a function of depth-information metadata embedded into the image or frame. An image-editing or video-editing workstation receives an image or frame into which has been embedded a set of depth values. Each depth value identifies a distance from the camera position of an object depicted by a pixel of the image or frame. When a user directs the workstation to automatically select or mask a region of the image or frame, the workstation uses the depth values, optionally in conjunction with other graphical properties of each pixel, to automatically select which pixels to include in the selection or mask such that the selection or mask identifies an approximate area of the image or frame that represents a three-dimensional object.Type: GrantFiled: January 2, 2015Date of Patent: February 14, 2017Assignee: International Business Machines CoprorationInventors: John F. Kelley, Todd Seager
-
Publication number: 20150154779Abstract: A method, process, and associated systems for automatically selecting and masking areas of a still image or frame of a video clip as a function of depth-information metadata embedded into the image or frame. An image-editing or video-editing workstation receives an image or frame into which has been embedded a set of depth values. Each depth value identifies a distance from the camera position of an object depicted by a pixel of the image or frame. When a user directs the workstation to automatically select or mask a region of the image or frame, the workstation uses the depth values, optionally in conjunction with other graphical properties of each pixel, to automatically select which pixels to include in the selection or mask such that the selection or mask identifies an approximate area of the image or frame that represents a three-dimensional object.Type: ApplicationFiled: January 2, 2015Publication date: June 4, 2015Inventors: John F. Kelley, Todd Seager
-
Patent number: 8983176Abstract: A method, process, and associated systems for automatically selecting and masking areas of a still image or video clip using imported depth information. An image-editing or video-editing application receives a set of depth values that are each associated with an area of a still image or video frame. Each depth value identifies the distance from the camera position of an object depicted by the area associated with the depth value. When a user directs the application to automatically select or mask a region of the image or frame, the application uses the depth values to automatically choose which pixels to include in the selection or mask such that the selection or mask best approximates an area of the image or frame that represents a three-dimensional object.Type: GrantFiled: January 2, 2013Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: John F. Kelley, Todd Seager
-
Publication number: 20140358595Abstract: A method, system, and computer program product for parking reservation that encourages car-pooling are provided in the illustrative embodiments. A processor, at a first mobile data processing system representing an automobile, receives an input to create a reservation for a parking location. A second mobile data processing system is detected, wherein the second mobile data processing system is within a threshold distance of the first mobile data processing system. A determination is made whether a movement of the second mobile data processing system relative to the first mobile data processing system is less than a threshold measure of the movement. Responsive to the determining being affirmative, a qualifier is applied to the reservation to obtain a benefit in the reservation, wherein the qualifier accrues a benefit to the reservation.Type: ApplicationFiled: May 31, 2013Publication date: December 4, 2014Inventors: Douglas Stuart Brown, John Falk Kelley, Todd Seager, Robert J. Torres
-
Publication number: 20140358596Abstract: A method, system, and computer program product for an environmentally-friendly parking reservation system are provided in the illustrative embodiments. A computer receives a request to make a reservation for parking a vehicle in a parking area. A parking location in the parking area is selected in an application, forming a selection. The computer modifies the selection based on a qualifier in the request, the qualifier indicating an environmentally-friendly aspect of the vehicle. The computer generates a response, the response identifying the parking location.Type: ApplicationFiled: May 31, 2013Publication date: December 4, 2014Inventors: Douglas Stuart Brown, John Falk Kelley, Todd Seager, Robert J. Torres
-
Publication number: 20140253417Abstract: Computer-implemented methods, computer program products and computer systems that create a virtual extended display on mobile devices by providing a first device in a first location and at least a second device in a second location, followed by joining together the first and second devices within an aggregation session via a network. Logical data of visual content is shared between the first and second devices, and the viewed output display of the visual content split amongst the first and second device displays within the aggregation session. During the aggregation session, at least one of the devices therein is manipulated by movement or changing device parameters to virtually change the viewed output display of the visual content on such manipulated device.Type: ApplicationFiled: March 11, 2013Publication date: September 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Douglas S. Brown, John F. Kelley, Todd Seager, Robert J. Torres
-
Publication number: 20140215613Abstract: A computer system where a second, dedicated processor (sometimes called an SPU, to distinguish from the central processing unit (CPU)) has logic to manage and control an intrusion detection hardware set and an intrusion response hardware set. The intrusion response hardware detects physical intrusions (for example, cryogenic attacks), and the response hardware set responds in various ways to attempt to protect the sensitive data in a volatile memory from the detected physical intrusion. A dedicated power storage device powers the SPU and the intrusion response hardware set.Type: ApplicationFiled: January 25, 2013Publication date: July 31, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John F. Kelley, Todd Seager
-
Publication number: 20140184586Abstract: In a method for visualizing depth of field, a computing device determines a distance value for each respective pixel of a plurality of pixels of a digital image based on a distance between subject matter depicted in the respective pixel and an imaging device integrated with the computing device. The computing device determines a depth of field of the digital image. The computing device compares the depth of field of the digital image to the distance value for each respective pixel to determine a first set of pixels of the plurality of pixels having distance values outside the depth of field and a second set of pixels of the plurality of pixels having distance values inside the depth of field. The computing device indicates the first set of pixels in a user interface.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: John F. Kelley, Todd Seager
-
Patent number: 8736450Abstract: An apparatus to deter theft of a movable product is provided. In one aspect, the apparatus comprises a housing, a plug connected to the housing to insert into an electrical socket to receive power, a bracket connected to the housing and having an opening to receive a locking cable while the opening of the bracket protrudes from the housing. A switch, within the housing, responsive to protrusion of the opening of the bracket from the housing to receive the locking cable. An electrical circuitry, within the housing, responsive to the switch being in a first state, and absence of power at the plug to sound an alarm, and responsive to the switch being in a second state or the presence of power at the plug to prevent sounding of the alarm.Type: GrantFiled: April 4, 2012Date of Patent: May 27, 2014Assignee: International Business Machines CorporationInventors: Douglas S. Brown, John F. Kelley, Todd Seager
-
Publication number: 20130335223Abstract: Embodiments of the present invention provide a method and system of deterring theft of an electronic device connected to an external source of charging power. In one aspect, responsive to a user request to arm the electronic device and the electronic device being connected to the source of charging power, the electronic device arming the electronic device. In another aspect, while the electronic device is armed, the electronic device detecting loss of the connection to the source of charging power, and in response, the electronic device activating an alarm or notifying another computing device that the connection of the electronic device has been disconnected from the source of charging power.Type: ApplicationFiled: June 18, 2012Publication date: December 19, 2013Applicant: International Business Machines CorporationInventors: Douglas S. Brown, John F. Kelley, Todd Seager
-
Publication number: 20130265164Abstract: An apparatus to deter theft of a movable product is provided. In one aspect, the apparatus comprises a housing, a plug connected to the housing to insert into an electrical socket to receive power, a bracket connected to the housing and having an opening to receive a locking cable while the opening of the bracket protrudes from the housing. A switch, within the housing, responsive to protrusion of the opening of the bracket from the housing to receive the locking cable. An electrical circuitry, within the housing, responsive to the switch being in a first state, and absence of power at the plug to sound an alarm, and responsive to the switch being in a second state or the presence of power at the plug to prevent sounding of the alarm.Type: ApplicationFiled: April 4, 2012Publication date: October 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Douglas S. Brown, John F. Kelley, Todd Seager
-
Patent number: 8543836Abstract: In a method for controlling access to an encrypted document, a request to access the encrypted document is received. The access request includes a user ID and a user password. A one-way hash function is performed on the user password to generate a hash value. An access control table is searched for the hash value which indicates an authorization for the user to access the encrypted document. The hash value corresponds to a document password encrypted with the user password. The document password is decrypted using the user password. The encrypted document is decrypted using the decrypted document password.Type: GrantFiled: August 23, 2011Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Douglas S. Brown, John F. Kelley, Todd Seager, Robert J. Torres
-
Publication number: 20130054976Abstract: In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Douglas S. Brown, John F. Kelley, Todd Seager, Robert J. Torres