Patents by Inventor John C. Weast

John C. Weast has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170353773
    Abstract: Technologies for presenting an advertisement on a media consumption device includes receiving a request to seek past a commercial included in media content played on the media consumption device, determining an advertisement based on the commercial, and presenting the advertisement to a user of the media consumption device during performance of the requested seek function. The advertisement may be, for example, an extracted frame or image of the commercial and may include a logo or phrase associated with a product or service advertised in the commercial. Similar technologies related to a media content distribution system are also disclosed.
    Type: Application
    Filed: March 20, 2017
    Publication date: December 7, 2017
    Inventor: John C. Weast
  • Patent number: 9820513
    Abstract: Techniques to determine depth for a number of wearable devices, which may be worn in layers are provided. A wearable device can receive measurements from sensors to include sensors from a number of other wearable devices. Based on the sensor measurements, the wearable device can determine a depth for the wearable devices. The depth can include an indication of which wearable device is closest to a user, which wearable device is closest to an external environment, or the like.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: November 21, 2017
    Assignee: INTEL CORPORATION
    Inventors: John C. Weast, Wendy March, Eric Lewallen, Cory J. Booth
  • Publication number: 20170285585
    Abstract: Technologies for controlling a machine include a compute system configured to control operation of the machine. The compute system is configured to detect a moral conflict related to the operation of the machine and determine operational choices for operation of the machine to resolve the moral conflict. The compute system also determines a moral agent likely to be affected by each operational choice and one or more moral rules applicable to the moral conflict. The moral agents may be weighted based on a set of weighting rules, which may vary based on geographical location and/or other criteria. Each moral rule defines a goal to be achieved by the operation of the machine. The compute system is further configured to select one of the operational choices to resolve the conflict based on the determined moral agents and the moral rules and control the machine to perform the selected operational choice.
    Type: Application
    Filed: April 2, 2016
    Publication date: October 5, 2017
    Inventors: John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Publication number: 20170265051
    Abstract: One or more sensors gather data, one or more processors analyze the data, and one or more indicators notify a user if the data represent an event that requires a response. One or more of the sensors and/or the indicators is a wearable device for wireless communication. Optionally, other components may be vehicle-mounted or deployed on-site. The components form an ad-hoc network enabling users to keep track of each other in challenging environments where traditional communication may be impossible, unreliable, or inadvisable. The sensors, processors, and indicators may be linked and activated manually or they may be linked and activated automatically when they come within a threshold proximity or when a user does a triggering action, such as exiting a vehicle. The processors distinguish extremely urgent events requiring an immediate response from less-urgent events that can wait longer for response, routing and timing the responses accordingly.
    Type: Application
    Filed: May 26, 2017
    Publication date: September 14, 2017
    Inventors: Deepak S. Vembar, Lenitra M. Durham, Glen J. Anderson, Cory J. Booth, Joshua Ekandem, Kathy Yuen, Giuseppe Raffa, John C. Weast
  • Patent number: 9705964
    Abstract: In some embodiments, remote graphics rendering may be facilitated by causing thin clients, that send raw graphics data to a local server for rendering, to downscale the data to a size appropriate for use by the local server. In some embodiments this avoids the storage of unnecessary data which is not useful for the local server because the actual display size on the local server is smaller than what the transmitted raw data would permit.
    Type: Grant
    Filed: May 22, 2013
    Date of Patent: July 11, 2017
    Assignee: Intel Corporation
    Inventors: Chengming Zhao, Tao Zhao, John C. Weast
  • Patent number: 9705547
    Abstract: One or more sensors gather data, one or more processors analyze the data, and one or more indicators notify a user if the data represent an event that requires a response. One or more of the sensors and/or the indicators is a wearable device for wireless communication. Optionally, other components may be vehicle-mounted or deployed on-site. The components form an ad-hoc network enabling users to keep track of each other in challenging environments where traditional communication may be impossible, unreliable, or inadvisable. The sensors, processors, and indicators may be linked and activated manually or they may be linked and activated automatically when they come within a threshold proximity or when a user does a triggering action, such as exiting a vehicle. The processors distinguish extremely urgent events requiring an immediate response from less-urgent events that can wait longer for response, routing and timing the responses accordingly.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: July 11, 2017
    Assignee: Intel Corporation
    Inventors: Deepak S. Vembar, Lenitra M. Durham, Glen J. Anderson, Cory J. Booth, Joshua Ekandem, Kathy Yuen, Giuseppe Raffa, John C. Weast
  • Publication number: 20170184416
    Abstract: Technologies for managing sensor anomalies in a compute system include determining whether sensor data received from a first sensor is anomalous based on sensor data from another sensor and a correlation rule. The correlation rule defines an excepted correlation between the first sensor data and the second sensor data. If the correlation between the first sensor data and the second sensor data is not observed, the first sensor data may be deemed anomalous. If so, the first sensor data may be verified using another sensor or other correlation. If the first sensor is determined to be malfunctioning, the compute system may mitigate the loss of the first sensor by using another sensor in its place.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Tobias M. Kohlenberg, Brian D. Johnson, John C. Weast
  • Publication number: 20170185428
    Abstract: Technologies for managing sensor conflicts in a compute system include determining an implication of stimuli sensed by two or more sensors of the compute system and determining whether a conflict exists between the determined implications. If a conflict does exist, an amount of discomfort is applied to the compute device. For example, a performance characteristic of the compute device may be adversely impacted based on the determined conflict. In some embodiments, the level of applied discomfort is based on a magnitude, importance, and/or duration of the implication conflict.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Tobias M. Kohlenberg, Brian D. Johnson, John C. Weast
  • Publication number: 20170185078
    Abstract: Technologies for managing sensor malfunctions in a compute system include detecting a malfunctioning sensor of the compute system and determining a sensor function performed by the malfunctioning sensor. In response to detection of the malfunctioning sensor, a different sensor of the compute system is selected to perform the sensor function of the malfunctioning sensor. The selected sensor may be of a different sensor type relative to the sensor type of the malfunctioning sensor. The compute system subsequently performs the sensor function of the malfunctioning sensor using the selected sensor. To do so, the compute system may increase, modify, or adjust the manner in which the sensor data from the selected sensor is processed.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Publication number: 20170184563
    Abstract: Technologies for controlling degradation of a sensor mote including detecting a trigger event and initiating degradation of at least a portion of the sensor mote in response to the trigger event. The trigger event may be embodied as any type of event detectable by the sensor mote such as a trigger signal, particular sensed data, expiration of a reference time period, completion of a task, and so forth. The sensor mote may imitate the degradation by, for example, controlling a valve to release a chemical stored in the sensor mote or allow a substance into the sensor mote.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Glen J. Anderson, John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Patent number: 9676250
    Abstract: Embodiments of apparatus and methods for adaptively controlling air quality in a vehicle compartment are described. In embodiments, an apparatus may include a sensor interface configured to interface with one or more sensors, disposed at one or more locations at one or more sides or in an interior space of a vehicle compartment, and configured to measure one or more indicators of air quality at the one or more locations. The apparatus may further include one or more airflow controllers configured to adaptively control a plurality of ventilation components of the vehicle compartment to regulate airflow in the interior space, based at least in part on the measured indicators of air quality. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: July 24, 2013
    Date of Patent: June 13, 2017
    Assignee: Intel Corporation
    Inventors: John C. Weast, Timothy J. Gresham
  • Patent number: 9618359
    Abstract: Various systems and methods for improving map and navigation data are described herein. An electronic navigation system for improving map and navigation data comprises a database access module to access a database of physiological information to obtain a biometric value, the biometric value associated with a location and a time; a processing module to determine whether the biometric value violates a threshold; and a display module to display a notification on a map when the threshold is violated, the map including an area around the location associated with the biometric value, and the notification displayed proximate to the location associated with the biometric value.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: April 11, 2017
    Assignee: Intel Corporation
    Inventors: John C. Weast, Lenitra M. Durham, Giuseppe Raffa
  • Publication number: 20170092095
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Application
    Filed: December 13, 2016
    Publication date: March 30, 2017
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Patent number: 9602885
    Abstract: Technologies for presenting an advertisement on a media consumption device includes receiving a request to seek past a commercial included in media content played on the media consumption device, determining an advertisement based on the commercial, and presenting the advertisement to a user of the media consumption device during performance of the requested seek function. The advertisement may be, for example, an extracted frame or image of the commercial and may include a logo or phrase associated with a product or service advertised in the commercial. Similar technologies related to a media content distribution system are also disclosed.
    Type: Grant
    Filed: July 19, 2013
    Date of Patent: March 21, 2017
    Assignee: Intel Corporation
    Inventor: John C. Weast
  • Patent number: 9602490
    Abstract: The present application is directed to user authentication confidence based on multiple devices. A user may possess at least one device. The device may determine a device confidence level that the identity of the user is authentic based on at least data collected by a data collection module in the device. For example, a confidence module in the device may receive the data from the data collection module, determine a quality corresponding to the data and determine the device confidence level based on the quality. If the user possesses two or more devices, at least one of the devices may collect device confidence levels from other devices to determine a total confidence level. For example, a device may authenticate the other devices and then receive device confidence levels for use in determining the total confidence level, which may be used to set an operational mode in a device or system.
    Type: Grant
    Filed: November 10, 2014
    Date of Patent: March 21, 2017
    Assignee: Intel Corporation
    Inventors: Lenitra M. Durham, Deepak S. Vembar, John C. Weast, Cory J. Booth
  • Patent number: 9547971
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: January 17, 2017
    Assignee: Intel Corporation
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Patent number: 9516381
    Abstract: Techniques and architecture are disclosed for managing power use during operation of an electronic device capable of processing and/or playback of audio and/or video (AV) content. In some instances, the disclosed techniques/architecture can be used, for example: (1) to stop decoding and/or rendering of AV content upon detecting that a user wishes to stop or is otherwise unable to consume (e.g., hear/listen to or otherwise utilize) such AV content; and/or (2) to continue/re-enable decoding and/or rendering of AV content upon detecting that a user wishes or is otherwise able to continue/resume consumption thereof. In some cases, use of the disclosed techniques/architecture may reduce central processing unit (CPU) cycles, audio digital signal processing (DSP), rendering hardware usage, etc., and/or otherwise make more efficient use of battery charge, and thus may realize an improvement in battery life, for example, for a mobile/battery-operated device capable of AV processing and/or playback.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: December 6, 2016
    Assignee: INTEL CORPORATION
    Inventors: John C. Weast, Nicolas C. Galoppo Von Borries
  • Publication number: 20160306968
    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
    Type: Application
    Filed: June 22, 2016
    Publication date: October 20, 2016
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160292575
    Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: May 29, 2016
    Publication date: October 6, 2016
    Inventors: John C. Weast, Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
  • Publication number: 20160285842
    Abstract: A mechanism is described for dynamically facilitating curator-controlled message delivery experiences at computing devices according to one embodiment. A method of embodiments, as described herein, includes detecting a computing device at a location, and determining proximity of the computing device from one or more computing devices at or around the location, where the location may relate to an event. The method may further include creating a proximity map including plotting of the computing device and the one or more computing devices, and generating a message for the computing device based on one or more of the proximity map, and communicating the message to at least one of the computing device and the one or more computing devices for presentation.
    Type: Application
    Filed: March 25, 2015
    Publication date: September 29, 2016
    Inventors: CORY J. BOOTH, Glen J. Anderson, John C. Weast, Lenitra M. Durham, Giuseppe Raffa, Deepak S. Vembar