Patents by Inventor John C. Weast

John C. Weast has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160286299
    Abstract: Systems and methods may provide for determining a usage configuration of a wearable device and setting an activation state of an air conduction speaker of the wearable device based at least in part on the usage configuration. Additionally, an activation state of a tissue conduction speaker of the wearable device may be set based at least in part on the usage configuration. In one example, the usage configuration is determined based on a set of status signals that indicate one or more of a physical position, a physical activity, a current activation state, an interpersonal proximity state or a manual user request associated with one or more of the air conduction speaker or the tissue conduction speaker.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: Glen J. Anderson, Ryan S. Brotman, Giuseppe Raffa, John C. Weast, Daniel S. Lake, Deepak S. Vembar, Lenitra M. Durham, Brad Jackson
  • Publication number: 20160262108
    Abstract: Technologies for regulating power consumption include a mobile computing device to generate a power profile based on historical power usage data of the mobile computing device. The mobile computing device determines a power usage context of the mobile computing device and estimates a future power consumption of the mobile computing device based on at least one of the power profile or the power usage context. The mobile computing device regulates a power consumption of the mobile computing device based on the estimated future power consumption.
    Type: Application
    Filed: November 27, 2013
    Publication date: September 8, 2016
    Inventors: John C. WEAST, Timothy J. GRESHAM, Corey KUKIS
  • Patent number: 9407961
    Abstract: Systems and methods may determine a visibility state of an application window associated with a media stream, and selectively decode a media stream based on a visibility state. One or more decode operations with respect to media content, such as video content, may be prevented if a visibility state indicates that at least a portion of an application window includes a blocked state. One or more decode operations with respect to media content, such as video content, may be permitted if a visibility state indicates that at least a portion of an application window includes a visible state. The systems and methods result in benefits to resource utilization, such as processor utilization, power consumption, and so on.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 2, 2016
    Assignee: Intel Corporation
    Inventor: John C. Weast
  • Publication number: 20160189517
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Publication number: 20160188875
    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160188788
    Abstract: Technologies for bio-chemically controlling operation of a machine are disclosed.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian D. Johnson
  • Publication number: 20160183878
    Abstract: Technologies for managing device functions of an ingestible computing device include determining whether adaptation of a device function of the ingestible computing device is required based on sensor data generated by the ingestible computing device. If device function adaption is determined to be required, the ingestible computing device determines a new device function to be performed, obtains program code modules to perform the new device function, and locally compiles the new program code modules to generate executable code. The ingestible computing device may execute the executable code to cause the ingestible computing device to begin performing the new device function. The ingestible computing device may obtain the program code modules from a local function database or via an authenticated wireless communication.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: John C. Weast, Brian C. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160191565
    Abstract: Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network infrastructure, determining whether the computing device is a member of the graft-network, and establishing initial network privileges for the computing device if the computing device is not a member, without direct programming of the member. The network privileges of members of the graft-network are updated over time as a function of the length of time for which the computing device is in physical presence of the network infrastructure. A computing device may be in physical presence of the network by physical contacting a communication bus of the network infrastructure or being within a limited communication range of the communication bus. New members to the graft-network may be quarantined to reduce risk to the network.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: Jennifer A. Healey, Kenneth T. Anderson, John C. Weast, Tobias M. Kohlenberg
  • Patent number: 9378364
    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: June 28, 2016
    Assignee: Intel Corporation
    Inventors: John C. Weast, Brian D. Johnson, Tobias M. Kohlenberg
  • Publication number: 20160182496
    Abstract: Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area network may be identified. It may be determined that the device is worn by the body of the body area network based on a set of models of the body. The device may be promoted from potential participant to trusted participant of the body area network in response to determining that the device is on the body.
    Type: Application
    Filed: December 17, 2014
    Publication date: June 23, 2016
    Inventors: John C. Weast, Cory J. Booth, Deepak Vembar, Lenitra M. Durham
  • Publication number: 20160174620
    Abstract: Techniques to determine depth for a number of wearable devices, which may be worn in layers are provided. A wearable device can receive measurements from sensors to include sensors from a number of other wearable devices. Based on the sensor measurements, the wearable device can determine a depth for the wearable devices. The depth can include an indication of which wearable device is closest to a user, which wearable device is closest to an external environment, or the like.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Applicant: Intel Corporation
    Inventors: JOHN C. WEAST, WENDY MARCH, ERIC LEWALLEN, CORY J. BOOTH
  • Patent number: 9374789
    Abstract: In one embodiment, the present invention includes an apparatus having a central processing unit (CPU) to execute instructions, a hub coupled to the CPU, and multiple physical devices coupled to the hub. The physical devices may each correspond to a different network communication protocol, and may each include a physical unit to forward packets to the hub while the system is in a low power mode. The hub may remain enabled during the low power mode and may include media access control functionality for handling incoming packets of different physical devices. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: June 21, 2016
    Assignee: Intel Corporation
    Inventor: John C. Weast
  • Patent number: 9355356
    Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: May 31, 2016
    Assignee: Intel Corporation
    Inventors: John C. Weast, Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
  • Publication number: 20160148015
    Abstract: Technologies for displaying public and private images includes a display device and one or more user viewing devices. The display device is configured to display or generate a personalized image or video that is viewable by an authorized user viewing device and not viewable by unauthorized viewing devices. To facilitate the display of the personalized images, the display device and the user viewing device(s) may negotiate a display protocol to be used by the display device to display the personalized image in a private manner. In some embodiment, the display device may also display a public image or video that is viewable by unauthorized viewing devices and/or individuals without viewing devices.
    Type: Application
    Filed: November 24, 2014
    Publication date: May 26, 2016
    Inventors: John C. Weast, Joshua Boelter
  • Publication number: 20160142816
    Abstract: Systems and methods may provide for sending a sound wave signal and measuring a body conduction characteristic of the sound wave signal. Additionally, a user authentication may be performed based at least in part on the body conduction characteristic. In one example, the body conduction characteristic includes one or more of a timing, a frequency or an amplitude of the sound wave signal after passing through one or more of bone or tissue.
    Type: Application
    Filed: November 18, 2014
    Publication date: May 19, 2016
    Applicant: Intel Corporation
    Inventors: JOHN C. WEAST, GLEN J. ANDERSON, GIUSEPPE RAFFA, DANIEL S. LAKE, KATHY YUEN, LENITRA M. DURHAM
  • Publication number: 20160134609
    Abstract: The present application is directed to user authentication confidence based on multiple devices. A user may possess at least one device. The device may determine a device confidence level that the identity of the user is authentic based on at least data collected by a data collection module in the device. For example, a confidence module in the device may receive the data from the data collection module, determine a quality corresponding to the data and determine the device confidence level based on the quality. If the user possesses two or more devices, at least one of the devices may collect device confidence levels from other devices to determine a total confidence level. For example, a device may authenticate the other devices and then receive device confidence levels for use in determining the total confidence level, which may be used to set an operational mode in a device or system.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Applicant: Intel Corporation
    Inventors: LENITRA M. DURHAM, DEEPAK S. VEMBAR, JOHN C. WEAST, CORY J. BOOTH
  • Publication number: 20160127800
    Abstract: Technologies for presenting an advertisement on a media consumption device includes receiving a request to seek past a commercial included in media content played on the media consumption device, determining an advertisement based on the commercial, and presenting the advertisement to a user of the media consumption device during performance of the requested seek function. The advertisement may be, for example, an extracted frame or image of the commercial and may include a logo or phrase associated with a product or service advertised in the commercial. Similar technologies related to a media content distribution system are also disclosed.
    Type: Application
    Filed: July 19, 2013
    Publication date: May 5, 2016
    Inventor: John C. WEAST
  • Publication number: 20160091337
    Abstract: Various systems and methods for improving map and navigation data are described herein. An electronic navigation system for improving map and navigation data comprises a database access module to access a database of physiological information to obtain a biometric value, the biometric value associated with a location and a time; a processing module to determine whether the biometric value violates a threshold; and a display module to display a notification on a map when the threshold is violated, the map including an area around the location associated with the biometric value, and the notification displayed proximate to the location associated with the biometric value.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: John C. Weast, Lenitra M. Durham, Giuseppe Raffa
  • Publication number: 20160088268
    Abstract: Techniques to project an image from a wearable computing device are provided. A wearable computing device including a projector configured to project an image into a user field of view based on output from one or more sensors and/or images captured by a camera. The wearable computing device can also include a touch input device. The wearable computing device can project an image responsive to a users touch based on signals received from the touch input device.
    Type: Application
    Filed: September 23, 2014
    Publication date: March 24, 2016
    Inventors: Lenitra M. Durham, Glen J. Anderson, John C. Weast, Giuseppe Raffa
  • Publication number: 20160086104
    Abstract: A mechanism is described for facilitating data gathering and expectations setting according to one embodiment. A method of embodiments, as described herein, includes detecting an invitation relating to an event, where the invitation may include an invitation to an invitee to attend the event. The method may further include obtaining data relating to the event from a plurality of sources, where the data further relates to other invitees of the event. The method may further include interpreting the obtained data based on one or more of filtering factors and relevancy factors, generating recommendations based on the interpreted data, where the recommendations may include expectations relating to the event. The method may further include facilitating communication of the recommendations to set the expectations for the invitee in anticipation of the event.
    Type: Application
    Filed: September 19, 2014
    Publication date: March 24, 2016
    Inventors: RITA HANNA WOUHAYBI, JOHN C. WEAST, ADAM CLAY JORDAN, JOSHUA J. RATLIFF, LAMA NACHMAN