Patents by Inventor Tobias M. Kohlenberg

Tobias M. Kohlenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9806941
    Abstract: Described herein are systems and methods for managing and distributing device and/or software settings. In some embodiments, the systems and methods permit a first device to upload settings information and/or user information to a network server. The network server may store such settings information and post it for download by at least one second device. Mechanisms for establishing a trust rating for such settings information are also described.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: October 31, 2017
    Assignee: INTEL CORPORATION
    Inventors: Rita H. Wouhaybi, Tobias M. Kohlenberg, Stanley Mo, Mubashir A. Mian
  • Publication number: 20170310775
    Abstract: Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: July 10, 2017
    Publication date: October 26, 2017
    Inventors: Igor Tatourian, Rita H. Wouhaybi, Hong Li, Tobias M. Kohlenberg
  • Publication number: 20170285585
    Abstract: Technologies for controlling a machine include a compute system configured to control operation of the machine. The compute system is configured to detect a moral conflict related to the operation of the machine and determine operational choices for operation of the machine to resolve the moral conflict. The compute system also determines a moral agent likely to be affected by each operational choice and one or more moral rules applicable to the moral conflict. The moral agents may be weighted based on a set of weighting rules, which may vary based on geographical location and/or other criteria. Each moral rule defines a goal to be achieved by the operation of the machine. The compute system is further configured to select one of the operational choices to resolve the conflict based on the determined moral agents and the moral rules and control the machine to perform the selected operational choice.
    Type: Application
    Filed: April 2, 2016
    Publication date: October 5, 2017
    Inventors: John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Publication number: 20170269632
    Abstract: Technologies are presented that provide contextually interactive apparel in practical implementations and applications. A method for directing a change in an interface of a wearable device may include detecting a trigger and providing a change command to an interface controller of a wearable device based on the trigger. The interface controller may direct a change (e.g., a change in visual pattern, audio, etc.) in an interface of the wearable device, based on the change command, that is perceivable by persons in proximity of the wearable device. The providing the change command may include providing one or more change commands to a plurality of wearable devices in a choreographed manner. The method may further include determining other wearable devices that exist and/or are being concurrently worn within a predetermined proximity of the wearable device, and providing information regarding the other wearable devices.
    Type: Application
    Filed: June 7, 2017
    Publication date: September 21, 2017
    Inventors: Stephen C. Chadwick, Michael T. Moran, Charles Baron, Tobias M. Kohlenberg
  • Patent number: 9740882
    Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: August 22, 2017
    Assignee: Intel Corporation
    Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
  • Publication number: 20170230394
    Abstract: This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to generate snapshots of device operation. The MLE may use active or planned operations in the snapshot to learn user behavior. Once normal user behavior is established for the device, the MLE may be able to determine when snapshots include unusual behavior that may signify a threat to the device. Snapshots determined to include unusual behavior may be transmitted to a remote resource for evaluation. The remote resource may include at least a user behavior classification engine (UBCE) to classify the user behavior by characterizing it as at least one type of use. The snapshot may be analyzed by the UBCE to determine if potential threats exist in the device, and the threat analysis may be provided to the device for evaluation and/or corrective action.
    Type: Application
    Filed: April 4, 2017
    Publication date: August 10, 2017
    Applicant: Intel Corporation
    Inventors: Tobias M. Kohlenberg, Igor Tatourian
  • Publication number: 20170184416
    Abstract: Technologies for managing sensor anomalies in a compute system include determining whether sensor data received from a first sensor is anomalous based on sensor data from another sensor and a correlation rule. The correlation rule defines an excepted correlation between the first sensor data and the second sensor data. If the correlation between the first sensor data and the second sensor data is not observed, the first sensor data may be deemed anomalous. If so, the first sensor data may be verified using another sensor or other correlation. If the first sensor is determined to be malfunctioning, the compute system may mitigate the loss of the first sensor by using another sensor in its place.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Tobias M. Kohlenberg, Brian D. Johnson, John C. Weast
  • Publication number: 20170187697
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes a password field identifier to: monitor a computing device to detect entry of password information for web services, the password field identifier to identify when the password information for a first one of the web services is new or is changing. When the password information is new or is changing, capture the entered password associated with the first one of the web services. The example apparatus further includes a password linkage monitor to store a hash value of the captured password in a password vault and associate the stored hash value of the captured password with the first one of the web services.
    Type: Application
    Filed: January 3, 2017
    Publication date: June 29, 2017
    Inventors: Hong Li, Tobias M. Kohlenberg, Lawrence Hurst
  • Publication number: 20170184563
    Abstract: Technologies for controlling degradation of a sensor mote including detecting a trigger event and initiating degradation of at least a portion of the sensor mote in response to the trigger event. The trigger event may be embodied as any type of event detectable by the sensor mote such as a trigger signal, particular sensed data, expiration of a reference time period, completion of a task, and so forth. The sensor mote may imitate the degradation by, for example, controlling a valve to release a chemical stored in the sensor mote or allow a substance into the sensor mote.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Glen J. Anderson, John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Publication number: 20170185428
    Abstract: Technologies for managing sensor conflicts in a compute system include determining an implication of stimuli sensed by two or more sensors of the compute system and determining whether a conflict exists between the determined implications. If a conflict does exist, an amount of discomfort is applied to the compute device. For example, a performance characteristic of the compute device may be adversely impacted based on the determined conflict. In some embodiments, the level of applied discomfort is based on a magnitude, importance, and/or duration of the implication conflict.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Tobias M. Kohlenberg, Brian D. Johnson, John C. Weast
  • Publication number: 20170185078
    Abstract: Technologies for managing sensor malfunctions in a compute system include detecting a malfunctioning sensor of the compute system and determining a sensor function performed by the malfunctioning sensor. In response to detection of the malfunctioning sensor, a different sensor of the compute system is selected to perform the sensor function of the malfunctioning sensor. The selected sensor may be of a different sensor type relative to the sensor type of the malfunctioning sensor. The compute system subsequently performs the sensor function of the malfunctioning sensor using the selected sensor. To do so, the compute system may increase, modify, or adjust the manner in which the sensor data from the selected sensor is processed.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: John C. Weast, Tobias M. Kohlenberg, Brian D. Johnson
  • Publication number: 20170180542
    Abstract: A system includes a first mobile device configured to initiate communication with at least one other mobile device. The first mobile device includes a status indicator configured to provide a persistent visual indication to a user of the status of a mute function of the first user device during the active communication. The first mobile device further includes a user interface configured to receive predefined user input and allow the user to toggle between mute and un-mute states based on the user input regardless of whether a display of the device is shut off and/or the user interface is locked.
    Type: Application
    Filed: December 26, 2016
    Publication date: June 22, 2017
    Applicant: Intel Corporation
    Inventors: Mubashir A. Mian, Rita H. Wouhaybi, Stanley Mo, Tobias M. Kohlenberg, Jim S. Baca, David M. Stanasolovich
  • Patent number: 9646216
    Abstract: Various embodiments are generally directed to the provision and use of multiple person biometric authentication systems. An apparatus including a processor element and logic executable by the processor component is disclosed. The logic is configured to cause the apparatus to receive information including an indication of a plurality of biometric measurements and generate a combined biometric indicator based in part on the plurality of biometric measurements. The combined biometric indicator can be generated using fuzzy hashing techniques.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: May 9, 2017
    Assignee: INTEL CORPORATION
    Inventors: Jim S. Baca, Arjun M. Karpur, Dhaval R. Patel, Preetham M. Shambhat, Naissa Conde, Prital B. Shah, Anavai G. Ramesh, Tobias M. Kohlenberg
  • Patent number: 9613196
    Abstract: This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to generate snapshots of device operation. The MLE may use active or planned operations in the snapshot to learn user behavior. Once normal user behavior is established for the device, the MLE may be able to determine when snapshots include unusual behavior that may signify a threat to the device. Snapshots determined to include unusual behavior may be transmitted to a remote resource for evaluation. The remote resource may include at least a user behavior classification engine (UBCE) to classify the user behavior by characterizing it as at least one type of use. The snapshot may be analyzed by the UBCE to determine if potential threats exist in the device, and the threat analysis may be provided to the device for evaluation and/or corrective action.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: April 4, 2017
    Assignee: Intel Corporation
    Inventors: Tobias M. Kohlenberg, Igor Tatourian
  • Publication number: 20170092095
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Application
    Filed: December 13, 2016
    Publication date: March 30, 2017
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Patent number: 9582572
    Abstract: A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: February 28, 2017
    Assignee: Intel Corporation
    Inventors: Stanley Mo, Rita H. Wouhaybi, Mubashir A. Mian, Tobias M. Kohlenberg, Jim S. Baca
  • Patent number: 9563768
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes an alarm action engine to invoke a provisional transmission block in response to detecting entry of a candidate password, a password linkage monitor to retrieve a list of password hash values associated with previously used passwords, and to compare the list of password hash values to a hash of the candidate password, the alarm action engine to invoke a permanent block of the candidate password when a match condition occurs between the hash of the candidate password and a hash of one of the list of password hash values.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: February 7, 2017
    Assignee: Intel Corporation
    Inventors: Hong Li, Tobias M. Kohlenberg, Lawrence Hurst
  • Patent number: 9547971
    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: January 17, 2017
    Assignee: Intel Corporation
    Inventors: John C. Weast, Jennifer A. Healey, Tobias M. Kohlenberg, Dennis M. Morgan, Brian D. Johnson
  • Patent number: 9544318
    Abstract: A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may include active content, html data and cascading style sheets (CSS). In embodiments, a gateway device may rewrite the web page dynamically by rewriting node identifiers and class names, removing and separating client-side scripts from html data and CSS data, and blocking or disabling execution of the client-side scripts if these scripts contain vulnerable code. A web page may be rewritten based on analysis information provided by a third-party or analyzed at the gateway device.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: January 10, 2017
    Assignee: McAfee, Inc.
    Inventors: Igor Tatourian, Greeshma Yellareddy, Norman Yee, Sudip S. Chahal, Hong C. Li, Tobias M. Kohlenberg
  • Publication number: 20160378968
    Abstract: Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.
    Type: Application
    Filed: June 27, 2015
    Publication date: December 29, 2016
    Inventors: Jim S. Baca, David Stanasolovich, Tobias M. Kohlenberg, Prital B. Shah, David W. Baker