System and Method for User Nudging Via Wearable Devices
    1.
    发明申请
    System and Method for User Nudging Via Wearable Devices 审中-公开
    通过可穿戴设备进行用户触摸的系统和方法

    公开(公告)号:US20160284172A1

    公开(公告)日:2016-09-29

    申请号:US14666618

    申请日:2015-03-24

    IPC分类号: G08B6/00

    摘要: A method is described to facilitate behavioral nudging. The method includes receiving sensory data from one or more wearable devices, determining a context for a user wearing the one or more wearable devices based on the sensory data, determining a mechanism to nudge the user to reinforce user behavior based on stored preferences and policies and transmitting a nudging stimulus to at least one of the wearable devices via the determined mechanism to provide a notification to the user.

    摘要翻译: 描述了一种方法来促进行为微动。 该方法包括从一个或多个可穿戴设备接收感觉数据,基于感觉数据确定穿戴一个或多个可穿戴设备的用户的上下文,确定用于基于所存储的偏好和策略来推动用户加强用户行为的机制,以及 经由所确定的机制向至少一个可穿戴设备发送微移刺激以向用户提供通知。

    CURATOR-FACILITATED MESSAGE GENERATION AND PRESENTATION EXPERIENCES FOR PERSONAL COMPUTING DEVICES
    2.
    发明申请
    CURATOR-FACILITATED MESSAGE GENERATION AND PRESENTATION EXPERIENCES FOR PERSONAL COMPUTING DEVICES 审中-公开
    用于个人计算设备的通风机通风消息生成和演示经验

    公开(公告)号:US20160285842A1

    公开(公告)日:2016-09-29

    申请号:US14668608

    申请日:2015-03-25

    IPC分类号: H04L29/06 H04L29/08

    摘要: A mechanism is described for dynamically facilitating curator-controlled message delivery experiences at computing devices according to one embodiment. A method of embodiments, as described herein, includes detecting a computing device at a location, and determining proximity of the computing device from one or more computing devices at or around the location, where the location may relate to an event. The method may further include creating a proximity map including plotting of the computing device and the one or more computing devices, and generating a message for the computing device based on one or more of the proximity map, and communicating the message to at least one of the computing device and the one or more computing devices for presentation.

    摘要翻译: 描述了根据一个实施例的用于在计算设备处动态地促进策展人控制的消息传递体验的机制。 如本文所述的实施例的方法包括检测位置处的计算设备,以及确定位置处或周围的一个或多个计算设备的接近度,其中该位置可与事件相关。 该方法还可以包括创建邻近图,包括计算设备和一个或多个计算设备的绘图,以及基于邻近图中的一个或多个生成用于计算设备的消息,以及将消息传达到以下各项中的至少一个: 计算设备和用于呈现的一个或多个计算设备。

    TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES
    6.
    发明申请
    TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES 有权
    基于恐惧反应来确定威胁评估的技术

    公开(公告)号:US20160189517A1

    公开(公告)日:2016-06-30

    申请号:US14583695

    申请日:2014-12-27

    IPC分类号: G08B21/04

    摘要: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.

    摘要翻译: 基于恐惧响应来确定威胁评估的技术包括监测从位于被监视站点的传感器阵列接收到的传感器数据。 传感器数据可以包括指示被监测位点内的个体的物理行为的行为传感器数据和指示被监测位点内的个体的生理特性的生理传感器数据。 威胁评估可以基于行为传感器数据和生理传感器数据。 在一些实施例中,可以利用与所监视的站点相关的上下文数据来分析行为传感器数据和生理传感器数据,并基于此来确定威胁评估。

    TECHNOLOGIES FOR MANAGING DEVICE FUNCTIONS OF AN INGESTIBLE COMPUTING DEVICE
    7.
    发明申请
    TECHNOLOGIES FOR MANAGING DEVICE FUNCTIONS OF AN INGESTIBLE COMPUTING DEVICE 审中-公开
    用于管理不可忽略的计算设备的设备功能的技术

    公开(公告)号:US20160183878A1

    公开(公告)日:2016-06-30

    申请号:US14583705

    申请日:2014-12-27

    IPC分类号: A61B5/00 A61B5/07

    摘要: Technologies for managing device functions of an ingestible computing device include determining whether adaptation of a device function of the ingestible computing device is required based on sensor data generated by the ingestible computing device. If device function adaption is determined to be required, the ingestible computing device determines a new device function to be performed, obtains program code modules to perform the new device function, and locally compiles the new program code modules to generate executable code. The ingestible computing device may execute the executable code to cause the ingestible computing device to begin performing the new device function. The ingestible computing device may obtain the program code modules from a local function database or via an authenticated wireless communication.

    摘要翻译: 用于管理可摄入计算设备的设备功能的技术包括基于可摄入计算设备生成的传感器数据来确定是否需要适应可摄入计算设备的设备功能。 如果确定需要设备功能适应,则可摄取计算设备确定要执行的新设备功能,获得执行新设备功能的程序代码模块,并且本地编译新的程序代码模块以生成可执行代码。 可摄入计算设备可以执行可执行代码以使可摄入计算设备开始执行新的设备功能。 可摄取计算设备可以从本地功能数据库或经由认证的无线通信获得程序代码模块。

    Technologies for managing security threats to a computing system utilizing user interactions
    8.
    发明授权
    Technologies for managing security threats to a computing system utilizing user interactions 有权
    用于利用用户交互来管理计算系统的安全威胁的技术

    公开(公告)号:US09378364B1

    公开(公告)日:2016-06-28

    申请号:US14583692

    申请日:2014-12-27

    摘要: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.

    摘要翻译: 用于管理计算系统上的安全威胁的技术包括检测对计算系统的安全威胁,确定在计算系统上采用的多个缓解场景以减轻安全威胁,以及实施多个缓解场景。 每个减缓情景包括计算系统要采取的一个或多个威胁缓解动作,用于执行威胁减轻动作的计算系统的一个或多个响应系统以及要采取威胁减轻动作的时间序列。 评估每个减缓情景的结果,并根据结果确定验证的减缓情景。 可以随后训练或习惯计算设备的用户以响应于设计为复制安全威胁的威胁场景,在验证的缓解场景的实施期间请求来自用户的交互来减轻安全威胁。

    Maintaining network services across multiple physical interfaces
    9.
    发明申请
    Maintaining network services across multiple physical interfaces 有权
    维护跨多个物理接口的网络服务

    公开(公告)号:US20080240135A1

    公开(公告)日:2008-10-02

    申请号:US11729064

    申请日:2007-03-28

    申请人: John C. Weast

    发明人: John C. Weast

    IPC分类号: H04L12/56

    摘要: In one embodiment, the present invention includes an apparatus having a first processor to execute instructions, a subordinate processor coupled to the first processor, and multiple physical devices coupled to the subordinate processor. The physical devices may each correspond to a different network communication protocol, and may each include a physical unit to forward packets to the subordinate processor while the system is in a low power mode. The subordinate processor may remain enabled during the low power mode and may include media access control functionality for handling incoming packets of different physical devices. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,本发明包括具有执行指令的第一处理器,耦合到第一处理器的从属处理器和耦合到从属处理器的多个物理设备的装置。 物理设备可以各自对应于不同的网络通信协议,并且每个物理设备可以包括物理单元,以在系统处于低功率模式时将分组转发到下级处理器。 下级处理器可以在低功率模式期间保持使能,并且可以包括用于处理不同物理设备的传入分组的媒体访问控制功能。 描述和要求保护其他实施例。