Patents by Inventor Matthew G. Dyor
Matthew G. Dyor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140267179Abstract: An electronic device may include a touch screen electronic display configured to offset and/or shift the contact locations of touch implements and/or displayed content based on one or more calculated parallax values. The parallax values may be associated with the viewing angle of an operator relative to the display of the electronic device. In various embodiments, the parallax value(s) may be calculated using three-dimensional location sensors, an angle of inclination of a touch implement, and/or one or more displayed calibration objects. Parallax values may be utilized to remap contact locations by a touch implement, shift and/or offset displayed content, and/or perform other transformations as described herein. A stereoscopically displayed content may be offset such that a default display plane is coplanar with a touch surface rather than a display surface. Contacts by a finger may be remapped using portions of the contact region and/or a centroid of the contact region.Type: ApplicationFiled: May 15, 2013Publication date: September 18, 2014Inventors: Steven Bathiche, Jesse R. Cheatham, III, Paul H. Dietz, Matthew G. Dyor, Philip A. Eckhoff, Anoop Gupta, JR., Kenneth P. Hinckley, III, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Craig J. Mundie, Nathan P. Myhrvold, Andreas G. Nowatzyk, Robert C. Petroski, Danny Allen Reed, Clarence T. Tegreene, Charles Whitmer, Victoria Y.H. Wood, Lowell L. Wood, JR.
-
Patent number: 8811638Abstract: Techniques for sensory enhancement and augmentation are described. Some embodiments provide an audible assistance facilitator system (“AAFS”) configured to provide audible assistance to a user via a hearing device. In one embodiment, the AAFS receives data that represents an utterance of a speaker received by a hearing device of the user, such as a hearing aid, smart phone, media device, or the like. The AAFS identifies the speaker based on the received data, such as by performing speaker recognition. The AAFS determines speaker-related information associated with the identified speaker, such as by determining an identifier (e.g., name or title) of the speaker, by locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AAFS then informs the user of the speaker-related information, such as by causing an audio representation of the speaker-related information to be output via the hearing device.Type: GrantFiled: December 1, 2011Date of Patent: August 19, 2014Assignee: Elwha LLCInventors: Richard T. Lord, Robert W. Lord, Nathan P. Myhrvold, Clarence T. Tegreene, Roderick A. Hyde, Lowell L. Wood, Jr., Muriel Y. Ishikawa, Victoria Y. H. Wood, Charles Whitmer, Paramvir Bahl, Douglas C. Burger, Ranveer Chandra, William H. Gates, III, Paul Holman, Jordin T. Kare, Craig J. Mundie, Tim Paek, Desney S. Tan, Lin Zhong, Matthew G. Dyor
-
Publication number: 20140176343Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: obtaining location data associated with a portion of a region including at least one sensor; wirelessly transmitting one or more sensor operation activation signals to one or more sensors; and powering one or more sensing operations of a sensor via the one or more sensor operation activation signals.Type: ApplicationFiled: December 26, 2012Publication date: June 26, 2014Applicant: ELWHA LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, Jr.
-
Publication number: 20140177524Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving one or more wireless signals associated with a sensing capability status of at least one sensor; wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to the sensing capability status of the at least one sensor; and at least one of powering one or more sensing operations of the at least one sensor and charging one or more power storage devices of the at least one sensor via the one or more sensor operation activation signals.Type: ApplicationFiled: December 28, 2012Publication date: June 26, 2014Applicant: ELWHA LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140175876Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: generating electrical power from at least one ambient source via at least one structurally integrated electromagnetic transducer; powering at least one transmitter via the electrical power to wirelessly transmit one or more sensor operation activation signals to one or more sensors; and at least one of powering one or more sensing operations of one or more sensors via the electrical power or charging one or more power storage devices electrically coupled to the one or more sensors via the electrical power.Type: ApplicationFiled: August 7, 2013Publication date: June 26, 2014Applicant: Elwha, Inc.Inventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140180628Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving one or more wireless signals indicative of a presence of a sensor within a portion of a region to be monitored; storing location data associated with the portion of the region to be monitored; and wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to the location data.Type: ApplicationFiled: December 26, 2012Publication date: June 26, 2014Applicant: ELWHA LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140176061Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: generating electrical power from at least one ambient source via at least one transducer; powering at least one transmitter via the electrical power from at least one ambient source to wirelessly transmit one or more sensor operation activation signals to one or more sensors; and at least one of powering one or more sensing operations of the one or more sensors or charging one or more power storage devices of the one or more sensors via the one or more sensor operation activation signals.Type: ApplicationFiled: July 3, 2013Publication date: June 26, 2014Applicant: Elwha LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140180630Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving electrical power via at least one structurally integrated electrically conductive element; and powering one or more sensing operations of one or more sensors via the electrical power.Type: ApplicationFiled: September 6, 2013Publication date: June 26, 2014Applicant: Elwha LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140180639Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to one or more transmission authorization parameters; and powering one or more sensing operations of a sensor via the one or more sensor operation activation signals.Type: ApplicationFiled: December 26, 2012Publication date: June 26, 2014Applicant: ELWHA LLCInventors: Jesse R. Cheatham, III, Matthew G. Dyor, Peter N. Glaskowsky, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung, Michael F. Koenig, Robert W. Lord, Richard T. Lord, Craig J. Mundie, Nathan P. Myhrvold, Robert C. Petroski, Desney S. Tan, Lowell L. Wood, JR.
-
Publication number: 20140123249Abstract: Disclosed herein are example embodiments for behavioral fingerprinting via corroborative user device. For certain example embodiments, one or more devices may (i) ascertain at least one indicator of a proximity of at least one corroborative user device that is affiliated with a behavioral fingerprint and (ii) incorporate the at least one indicator of a proximity of the at least one corroborative user device into an authentication-related analysis for a user device that is associated with the behavioral fingerprint. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: Elwha LLC, a limited liability corporation of the State of DelawareInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xeudong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvoid, Clarence T. Tegreene
-
Publication number: 20140123253Abstract: Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: Elwha LLC, a limited liability corporation of the State of DelawareInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xeudong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Patent number: 8713704Abstract: A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. A level of authentication determination may additionally/alternatively include at least determining a behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of a computing device. A level of authentication determination may additionally/alternatively include at least determining an authentication level with respect to a computing device at least partially based on a behavioral fingerprint determined from interaction(s) with another device.Type: GrantFiled: May 18, 2012Date of Patent: April 29, 2014Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Patent number: 8689350Abstract: A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: November 23, 2011Date of Patent: April 1, 2014Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Patent number: 8688980Abstract: A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: November 23, 2011Date of Patent: April 1, 2014Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Publication number: 20140040989Abstract: Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint.Type: ApplicationFiled: July 31, 2012Publication date: February 6, 2014Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Publication number: 20130303195Abstract: Systems and methods are described relating to accepting an indication of a traveled path of at least one mobile device over a specified time period; determining, using a microprocessor, a predicted location of the at least one mobile device at least partly based on receiving the indication of the traveled path over a specified time period; and presenting an indication of the predicted location of the at least one mobile device at least partially based on accepting an indication of a traveled path and determining a predicted location of the at least one mobile device.Type: ApplicationFiled: April 5, 2013Publication date: November 14, 2013Inventors: Paramvir Bahl, Douglas C. Burger, Ranveer Chandra, Matthew G. Dyor, William Gates, Pablos Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Craig J. Mundie, Nathan P. Myhrvold, Tim Paek, John D. Rinaldo, JR., Desney S. Tan, Clarence T. Tegreene, Charles Whitmer, Lowell L. Wood, JR., Victoria Y.H. Wood, Lin Zhong
-
Publication number: 20130268773Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity.Type: ApplicationFiled: March 14, 2013Publication date: October 10, 2013Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Danny Allen Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, Jr.
-
Publication number: 20130268756Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.Type: ApplicationFiled: March 14, 2013Publication date: October 10, 2013Applicant: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Danny Allen Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, JR.
-
Patent number: 8555077Abstract: Behavioral fingerprints hold gathered data related to users' interactions with a device or devices, inter alia. Behavioral fingerprints may be used to at least partially determine a level of accessibility of the device or of an aspect of the device for the user; provide a current status of a network-accessible user associated with the device; activate or deactivate functions, programs or features of the device; generate alerts regarding the user's interaction with the device; assist in identifying a current device as a device being currently used by a network-accessible user, etc. Behavioral fingerprints may include statistical calculations on social network collected data, user input, sensor-provided data as provided by GPS, accelerometers, microphones, cameras, timers, touch-panels, or other indication or combination of the foregoing, whether originating from the device or the network.Type: GrantFiled: November 23, 2011Date of Patent: October 8, 2013Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Publication number: 20130191887Abstract: A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: ApplicationFiled: November 23, 2011Publication date: July 25, 2013Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene