Patents by Inventor John C. Weast

John C. Weast has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160282842
    Abstract: Technologies for bio-chemically controlling operation of a machine include applying a bio-chemical agent to an operator of the machine and controlling an operational characteristic of the machine based on the presence of the bio-chemical agent on the operator. The operational characteristic of the machine may be controlled based on the presence or lack of the biochemical agent on the operator. In some embodiments, the bio-chemical agent may be configured to generate a bio-chemical trigger in response to exposure to a biochemical or biological characteristic of the operator. The operation of the machine may be controlled based on such bio-chemical trigger or reaction.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: John C. Weast, Brian D. Johnson
  • Publication number: 20160286299
    Abstract: Systems and methods may provide for determining a usage configuration of a wearable device and setting an activation state of an air conduction speaker of the wearable device based at least in part on the usage configuration. Additionally, an activation state of a tissue conduction speaker of the wearable device may be set based at least in part on the usage configuration. In one example, the usage configuration is determined based on a set of status signals that indicate one or more of a physical position, a physical activity, a current activation state, an interpersonal proximity state or a manual user request associated with one or more of the air conduction speaker or the tissue conduction speaker.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: Glen J. Anderson, Ryan S. Brotman, Giuseppe Raffa, John C. Weast, Daniel S. Lake, Deepak S. Vembar, Lenitra M. Durham, Brad Jackson
  • Publication number: 20160282129
    Abstract: Technologies for providing information to a user while traveling include a mobile computing device to determine network condition information associated with a route segment. The route segment may be one of a number of route segments defining at least one route from a starting location to a destination. The mobile computing device may determine a route from the starting location to the destination based on the network condition information. The mobile computing device may upload the network condition information to a crowdsourcing server. A mobile computing device may predict a future location of the device based on device context, determine a safety level for the predicted location, and notify the user if the safety level is below a threshold safety level. The device context may include location, time of day, and other data. The safety level may be determined based on predefined crime data. Other embodiments are described and claimed.
    Type: Application
    Filed: December 19, 2013
    Publication date: September 29, 2016
    Inventors: Ren WANG, Zhongghong OU, Arvind KUMAR, Kristoffer FLEMING, Tsung-Yuan C. TAI, Timothy J. GRESHAM, John C. WEAST, Corey KUKIS
  • Publication number: 20160285492
    Abstract: One or more sensors gather data, one or more processors analyze the data, and one or more indicators notify a user if the data represent an event that requires a response. One or more of the sensors and/or the indicators is a wearable device for wireless communication. Optionally, other components may be vehicle-mounted or deployed on-site. The components form an ad-hoc network enabling users to keep track of each other in challenging environments where traditional communication may be impossible, unreliable, or inadvisable. The sensors, processors, and indicators may be linked and activated manually or they may be linked and activated automatically when they come within a threshold proximity or when a user does a triggering action, such as exiting a vehicle. The processors distinguish extremely urgent events requiring an immediate response from less-urgent events that can wait longer for response, routing and timing the responses accordingly.
    Type: Application
    Filed: March 26, 2015
    Publication date: September 29, 2016
    Inventors: Deepak S. Vembar, Lenitra M. Durham, Glen J. Anderson, Cory J. Booth, Joshua Ekandem, Kathy Yuen, Giuseppe Raffa, John C. Weast
  • Publication number: 20160278444
    Abstract: Various systems and methods for implementing smart clothing are described herein. A wearable system for implementing smart clothing comprises a sensor module to receive sensor data from a sensor of the wearable system; a state module to use the sensor data to construct a comfort state of a user of the wearable system; a context module to determine a context of the comfort state; an access module to access a comfort model of the user, the comfort model reflecting target comfort states for associated contexts; and an actuation module to initiate actuators in the wearable system based on the comfort model, the comfort state, and the context of the comfort state.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: Adam Jordan, Rita H. Wouhaybi, John C. Weast, Joshua Ratcliff
  • Publication number: 20160281094
    Abstract: Technologies for manufacturing an engineered biological system include determining a plurality of functions to be performed by the engineered biological system while in a corresponding state. The engineered biological system is to transition between states based on the presence of a corresponding transition trigger defined by a biological key associated with each state. A state machine mapping is generated for the manufacture of the engineered biological system. The engineered biological system is verified and subsequently activated in a host. An engineered biological system and associated method for performing a biological function are also disclosed.
    Type: Application
    Filed: March 28, 2015
    Publication date: September 29, 2016
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160284172
    Abstract: A method is described to facilitate behavioral nudging. The method includes receiving sensory data from one or more wearable devices, determining a context for a user wearing the one or more wearable devices based on the sensory data, determining a mechanism to nudge the user to reinforce user behavior based on stored preferences and policies and transmitting a nudging stimulus to at least one of the wearable devices via the determined mechanism to provide a notification to the user.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: John C. Weast, Glen J. Anderson, Giuseppe Raffa
  • Publication number: 20160262108
    Abstract: Technologies for regulating power consumption include a mobile computing device to generate a power profile based on historical power usage data of the mobile computing device. The mobile computing device determines a power usage context of the mobile computing device and estimates a future power consumption of the mobile computing device based on at least one of the power profile or the power usage context. The mobile computing device regulates a power consumption of the mobile computing device based on the estimated future power consumption.
    Type: Application
    Filed: November 27, 2013
    Publication date: September 8, 2016
    Inventors: John C. WEAST, Timothy J. GRESHAM, Corey KUKIS
  • Patent number: 9407961
    Abstract: Systems and methods may determine a visibility state of an application window associated with a media stream, and selectively decode a media stream based on a visibility state. One or more decode operations with respect to media content, such as video content, may be prevented if a visibility state indicates that at least a portion of an application window includes a blocked state. One or more decode operations with respect to media content, such as video content, may be permitted if a visibility state indicates that at least a portion of an application window includes a visible state. The systems and methods result in benefits to resource utilization, such as processor utilization, power consumption, and so on.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 2, 2016
    Assignee: Intel Corporation
    Inventor: John C. Weast
  • Publication number: 20160188875
    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160189517
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Publication number: 20160188788
    Abstract: Technologies for bio-chemically controlling operation of a machine are disclosed.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian D. Johnson
  • Publication number: 20160183878
    Abstract: Technologies for managing device functions of an ingestible computing device include determining whether adaptation of a device function of the ingestible computing device is required based on sensor data generated by the ingestible computing device. If device function adaption is determined to be required, the ingestible computing device determines a new device function to be performed, obtains program code modules to perform the new device function, and locally compiles the new program code modules to generate executable code. The ingestible computing device may execute the executable code to cause the ingestible computing device to begin performing the new device function. The ingestible computing device may obtain the program code modules from a local function database or via an authenticated wireless communication.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian C. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160191565
    Abstract: Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network infrastructure, determining whether the computing device is a member of the graft-network, and establishing initial network privileges for the computing device if the computing device is not a member, without direct programming of the member. The network privileges of members of the graft-network are updated over time as a function of the length of time for which the computing device is in physical presence of the network infrastructure. A computing device may be in physical presence of the network by physical contacting a communication bus of the network infrastructure or being within a limited communication range of the communication bus. New members to the graft-network may be quarantined to reduce risk to the network.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: Jennifer A. Healey, Kenneth T. Anderson, John C. Weast, Tobias M. Kohlenberg
  • Patent number: 9378364
    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: June 28, 2016
    Assignee: Intel Corporation
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160174620
    Abstract: Techniques to determine depth for a number of wearable devices, which may be worn in layers are provided. A wearable device can receive measurements from sensors to include sensors from a number of other wearable devices. Based on the sensor measurements, the wearable device can determine a depth for the wearable devices. The depth can include an indication of which wearable device is closest to a user, which wearable device is closest to an external environment, or the like.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Applicant: Intel Corporation
    Inventors: JOHN C. WEAST, WENDY MARCH, ERIC LEWALLEN, CORY J. BOOTH
  • Publication number: 20160182496
    Abstract: Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area network may be identified. It may be determined that the device is worn by the body of the body area network based on a set of models of the body. The device may be promoted from potential participant to trusted participant of the body area network in response to determining that the device is on the body.
    Type: Application
    Filed: December 17, 2014
    Publication date: June 23, 2016
    Inventors: John C. Weast, Cory J. Booth, Deepak Vembar, Lenitra M. Durham
  • Patent number: 9374789
    Abstract: In one embodiment, the present invention includes an apparatus having a central processing unit (CPU) to execute instructions, a hub coupled to the CPU, and multiple physical devices coupled to the hub. The physical devices may each correspond to a different network communication protocol, and may each include a physical unit to forward packets to the hub while the system is in a low power mode. The hub may remain enabled during the low power mode and may include media access control functionality for handling incoming packets of different physical devices. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: June 21, 2016
    Assignee: Intel Corporation
    Inventor: John C. Weast
  • Patent number: 9355356
    Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: May 31, 2016
    Assignee: Intel Corporation
    Inventors: John C. Weast, Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
  • Publication number: 20160148015
    Abstract: Technologies for displaying public and private images includes a display device and one or more user viewing devices. The display device is configured to display or generate a personalized image or video that is viewable by an authorized user viewing device and not viewable by unauthorized viewing devices. To facilitate the display of the personalized images, the display device and the user viewing device(s) may negotiate a display protocol to be used by the display device to display the personalized image in a private manner. In some embodiment, the display device may also display a public image or video that is viewable by unauthorized viewing devices and/or individuals without viewing devices.
    Type: Application
    Filed: November 24, 2014
    Publication date: May 26, 2016
    Inventors: John C. Weast, Joshua Boelter