Prosecution Insights
Last updated: April 19, 2026
Application No. 18/888,666

PHYSICAL DEMANDS CHARACTERIZATION SYSTEM AND METHODS

Non-Final OA §101§102
Filed
Sep 18, 2024
Examiner
LEE, PO HAN
Art Unit
3623
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
W. L. Gore & Associates, Inc.
OA Round
1 (Non-Final)
32%
Grant Probability
At Risk
1-2
OA Rounds
3y 6m
To Grant
74%
With Interview

Examiner Intelligence

Grants only 32% of cases
32%
Career Allow Rate
51 granted / 158 resolved
-19.7% vs TC avg
Strong +41% interview lift
Without
With
+41.2%
Interview Lift
resolved cases with interview
Typical timeline
3y 6m
Avg Prosecution
50 currently pending
Career history
208
Total Applications
across all art units

Statute-Specific Performance

§101
40.9%
+0.9% vs TC avg
§103
31.3%
-8.7% vs TC avg
§102
11.4%
-28.6% vs TC avg
§112
14.8%
-25.2% vs TC avg
Black line = Tech Center average estimate • Based on career data from 158 resolved cases

Office Action

§101 §102
Detailed Action The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Status of the Application and Claims This action is in reply to the application filed on 9/18/2024. This communication is the first action on the merits. IDS filed on 3/27/25, 11/21/2025, are acknowledged and considered by the Examiner. Claims 1-20 is/are currently pending and have been examined. Claim Rejections – 35 USC § 101 35 U.S.C. 101 reads as follows: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title. Claims 1-20 is/are rejected under 35 U.S.C. 101 because the claimed invention is directed to non-statutory subject matter. Claim 1 (similarly 11) recites, “A … comprising: (A) …; (B) … are configured to generate movement data related to the movement of the garment and timestamp data; (C) … is configured to: i) communicate with the one or more …; ii) receive the movement data and timestamp data; iii) store in a … a session data; and iv) create one or more session messages comprising the session data from each of the one or more …; (D) a … is configured to: i. receive the one or more session messages from the …; ii. compile the one or more session messages in order of the timestamp data; iii. create a plurality of time windows comprised of a pre-determined and sequential amount of session messages; iv. compute a feature of at least one of the plurality of time windows, wherein the feature comprises at least a minimum value, a maximum value or a standard deviation; v. utilize at least two of a pre-trained job task classifier for determining at least two states for at least one of the time windows; vi. determine a total session time; vii. aggregate each of the time windows by each of the at least two states and compute for each of the at least two states a total state output value wherein the state output value is a function of said total session time; and, viii. output a job task summary comprised of at least two of the total state output values.” Claim 11 additionally recites, “ … v) utilize a first pre-trained state classifier for determining a first state for at least one of the time windows; vi) utilize a second pre-trained state classifier for determining a second state for at least one of the time windows; …” Analyzing under Step 2A, Prong 1: The limitations regarding, …generate movement data related to the movement of the garment and timestamp data; i) communicate with the one or more …; ii) receive the movement data and timestamp data; iii) store in a … a session data; and iv) create one or more session messages comprising the session data from each of the one or more …; i. receive the one or more session messages from the …; ii. compile the one or more session messages in order of the timestamp data; iii. create a plurality of time windows comprised of a pre-determined and sequential amount of session messages; iv. compute a feature of at least one of the plurality of time windows, wherein the feature comprises at least a minimum value, a maximum value or a standard deviation; v. utilize at least two of a pre-trained job task classifier for determining at least two states for at least one of the time windows; vi. determine a total session time; vii. aggregate each of the time windows by each of the at least two states and compute for each of the at least two states a total state output value wherein the state output value is a function of said total session time; and, viii. output a job task summary comprised of at least two of the total state output values…v) utilize a first pre-trained state classifier for determining a first state for at least one of the time windows; vi) utilize a second pre-trained state classifier for determining a second state for at least one of the time windows;…, under the broadest reasonable interpretation, can include a human using their mind and using pen and paper to perform the above identified limitations, therefore, the claims are directed to a mental process. Further, …generate movement data related to the movement of the garment and timestamp data; i) communicate with the one or more …; ii) receive the movement data and timestamp data; iii) store in a … a session data; and iv) create one or more session messages comprising the session data from each of the one or more …; i. receive the one or more session messages from the …; ii. compile the one or more session messages in order of the timestamp data; iii. create a plurality of time windows comprised of a pre-determined and sequential amount of session messages; iv. compute a feature of at least one of the plurality of time windows, wherein the feature comprises at least a minimum value, a maximum value or a standard deviation; v. utilize at least two of a pre-trained job task classifier for determining at least two states for at least one of the time windows; vi. determine a total session time; vii. aggregate each of the time windows by each of the at least two states and compute for each of the at least two states a total state output value wherein the state output value is a function of said total session time; and, viii. output a job task summary comprised of at least two of the total state output values…v) utilize a first pre-trained state classifier for determining a first state for at least one of the time windows; vi) utilize a second pre-trained state classifier for determining a second state for at least one of the time windows;…, are humans evaluating stress and fatigue related to jobs and tasks performed by human workers, which are managing interactions and relationship between people, therefore the claims, are directed to certain methods of organizing human activities. Accordingly, the claims are directed to a mental process, certain methods of organizing human activities, and thus, the claims are directed to an abstract idea under the first prong of Step 2A. Analyzing under Step 2A, Prong 2: This judicial exception is not integrated into a practical application under the second prong of Step 2A. In particular, the claims recite the additional elements beyond the recited abstract idea identified under Step 2A, Prong 1, such as: Claim 1, 11: system, one or more sensor modules, a garment, wherein the one or more sensor modules, a first processor, wherein the first processor, memory module, second processor, wherein the second processor , and pursuant to the broadest reasonable interpretation, as an ordered combination, each of the additional elements are computing elements recited at high level of generality implementing the abstract idea, and thus, are no more than applying the abstract idea with generic computer components. Further, these additional elements generally link the abstract idea to a technical environment, namely the environment of a computer. Additionally, with respect to, “…receive…”, “…communicate…”, “…generate movement data…”, “…store…”, “…create…”, “…aggregate…”, “…output…”, these elements do not add a meaningful limitations to integrate the abstract idea into a practical application because they are extra-solution activity, pre and post solution activity - i.e. data gathering – “…receive…”, “…generate movement data…”, “…store…”, “…create…”, “…aggregate…”, “…communicate…”, data output – “…communicate…”, “…output…” Analyzing under Step 2B: The claim does not include additional elements that are sufficient to amount to significantly more than the judicial exception under Step 2B. As noted above, the aforementioned additional elements beyond the recited abstract idea are not sufficient to amount to significantly more than the recited abstract idea because, as an order combination, the additional elements are no more than mere instructions to implement the idea using generic computer components (i.e. apply it). Additionally, as an order combination, the additional elements append the recited abstract idea to well-understood, routine, and conventional activities in the field as individually evinced by the applicant’s own disclosure, as required by the Berkheimer Memo, in at least: [0053] Some of the general components utilized in this disclosure are widely known in the field of the disclosure, and their exact nature or type is not necessary for a person of ordinary skill in the art or science to understand the present disclosure; therefore, they will not be discussed in detail. [0054] It is appreciated that components of networks, network transmission, the internet, databases, and software services are all well known in the art of the internet of things (loT) and thus their exact features are not needed for one skilled in the art to practice the present disclosure without undue experimentation, and thus will not be described in detail. [0055] As used herein, the term "garment" is intended to indicate an article of clothing. While a shirt form factor is shown as the best mode of a garment, the present disclosure should not be limited to such a garment form factor. As used herein, a garment may be a jacket, pant, shirt, coverall, overall, glove, hat, and such. [0056] As used herein, the term "processor" is intended to mean any electronic device which processes data based upon instructions. As used herein, the term "processor" may include memory modules, and any other common circuits necessary to execute instructions and create a desired output. [0057] According to the present disclosure, Figure 6 shows a motion system 10 that is used to characterize one or more tasks of a job. At the highest level and as will be described later in detail, motion system 10 is comprised of a subject 60 generating kinematic movement data and timestamp data by wearing a motion shirt 20 having a plurality of sensors that communicate to a gateway 40.Gateway 40 transmits data and messages to a server system 50 that creates an output 100.Output 100 may provide a kinematic summary of tasks and states of a given job or create an optimized job and tasks for a given worker, also known as a job task summary. Output 100 may be a digital output 101, such as a web application or mobile application view, or a physical output 102, such as printed paper. [0058] Figure 1 shows a sensor module 30 having an outer plastic housing 31. Preferably housing 31 is waterproof. Figure 2 shows sensor module 30 with part of housing 31 removed as to show a battery 33, a printed circuit board 32, a sensor chip 34, and a sensor processor 35. Sensors, electronic components, and hardware are well known in the field of loT devices and thus the exact components or configuration of module 30 are not needed for one to understand and appreciate the present disclosure. Sensor 34 is preferably an inertial measurement unit (IMU) sensor that generates both movement and timestamp data and is comprised of at least one of an accelerometer 30A,agyroscope 30B, and a magnetometer 30C. Although any one or combination of sensor 30A, 30B, and 30C can be used within the spirit and scope of the present disclosure to understand body position and motion, the combination of 30A, 30B, and 30C provide the means of determining the absolute orientation of sensor module 30 in world space 3D coordinates. Conversion and data fusion of acceleration, gyroscope and magnetometer data into world space quaternions is well known in the art of motion capture and virtual reality. In addition to motion capture sensors, sensor module 30 may also contain an alternative sensor 30D that may be suitable for describing a given job, a state, or for a particular job location. 30D may be, but is not limited to, a GPS, flex sensor, bend sensor, strain sensor, heart rate sensor, tilt sensor, blood oxygen sensor, body temperature sensor, environmental sensor, or pressure sensor. Alternative sensor 30D may be any sensor that is common in the field of data capture or wearables and sensor chip 34 may be any combination of sensors into one or more packages or chips. Sensor chip 34 provides the means to create movement data that describes variables. [0059] Sensor chip 34 communicates via traces on printed circuit board 32 to module processor 35. As is common in the art of electronics, module processor 35 contains firmware code that allows it to coordinate the components of sensor 30.Module processor 35 may perform functions, such as but not limited to, controlling the charging of battery 33, aggregating and store data from sensor chip 34, and sending and receiving information to gateway 40.Module processor 35 includes a memory module, which can be any type of common memory type, including but not limited to RAM, EPROM or flash memory types. [0060] As shown in Figure 3, a plurality of sensor module 30 are placed on a garment 70 to create motion shirt 20.Garment 70 can be any type of common garment style, fabric or size, but for workforce applications it is preferably lightweight, long sleeved and snug to the body. According to the best mode of the present disclosure and for improved data accuracy, a zipper 71 is located slightly offset to the midplane of garment 70 as to not interfere with any optimal placements of sensor module 30 along the midplane. In addition to occupying midplane space, midline zippers are more likely to cause bunching of fabric. Also, according to the best mode of the present disclosure and shown in Figure 5 is that garment 70 has extended length sleeves which covers at least a portion of the wrist of subject 60. A thumb hole 73 enables the thumb of subject 70 to protrude through garment 70 and keep its sleeve and either sensor module 24 or 27 in an optimal position for data capture, but without overly restricting subject 70 from performing fine movements with his or her fingers. Thumb hole 73 provides the means of placing a motion sensor distal the wrist joint of subject 60 and to gather hand motion data. [0081] While the wearable driven job assessment system herein described constitute preferred embodiments of the present disclosure, it is to be understand the present disclosure is not limited to these precise components, assemblies or methods, and that changes may be made therein without departing from the scope and spirt of the disclosure. Furthermore, as an ordered combination, these elements amount to generic computer components receiving or transmitting data over a network, performing repetitive calculations, electronic record keeping, and storing and retrieving information in memory, which, as held by the courts, are well-understood, routine, and conventional. See MPEP 2106.05(d). Moreover, the remaining elements of dependent claims do not transform the recited abstract idea into a patent eligible invention because these remaining elements merely recite further abstract limitations that provide nothing more than simply a narrowing of the abstract idea recited in the independent claims. Looking at these limitations as an ordered combination adds nothing additional that is sufficient to amount to significantly more than the recited abstract idea because they simply provide instructions to use a generic arrangement of generic computer components to “apply” the recited abstract idea, perform insignificant extra-solution activity, and generally link the abstract idea to a technical environment. Thus, the elements of the claims, considered both individually and as an ordered combination, are not sufficient to ensure that the claim as a whole amounts to significantly more than the abstract idea itself. Since there are no limitations in these claims that transform the exception into a patent eligible application such that these claims amount to significantly more than the exception itself, claims 1-20 are rejected under 35 U.S.C. 101 as being directed to non-statutory subject matter. Claim Rejections - 35 USC § 102 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the basis for the rejections under this section made in this Office action: A person shall be entitled to a patent unless – (a)(1) the claimed invention was patented, described in a printed publication, or in public use, on sale or otherwise available to the public before the effective filing date of the claimed invention. (a)(2) the claimed invention was described in a patent issued under section 151, or in an application for patent published or deemed published under section 122(b), in which the patent or application, as the case may be, names another inventor and was effectively filed before the effective filing date of the claimed invention. Claim(s) 1-20 is/are rejected under 35 U.S.C. 102 as being unpatentable by US Patent Publication to US20200297250A1 to Elhawary et al., (hereinafter referred to as “Elhawary”). As per Claim 11, Elhawary teaches: A system comprising: A) one or more sensor modules; (in at least [0278] FIG. 9 illustrates a method for calibrating wearable sensors 190. Such a method may be implemented using the sensor packaging 2000 shown in FIGS. 2B-2D in order to properly calibrate the sensors 190 prior to beginning the detection of particular activities.) B) a garment, wherein the one or more sensor modules are configured to generate movement data related to the movement of the garment and timestamp data; (in at least [0086] a single primary wearable device 190 may be used and it may communicate with various sensors or transmitters on different parts of the user's body, as shown in FIG. 4A, in an environment in which the user is working, as shown in FIG. 4B, or on equipment the user is using. For example, a user may have a primary wearable device 190 that interacts with safety equipment worn by a user or with a humidity, temperature, or gas sensor located in a factory. [0151] FIG. 3B is a plot illustrating high risk postures over time for a worker, and FIG. 3C is a flowchart illustrating an alternative method for monitoring safety. While the basic method discussed may provide an alert, such as a vibration or device display indicating a high risk physical activity or movement any time such a movement was performed, such an approach may result in a large number of alerts to a worker. Such a large number of alerts may be ignored, or may irritate the worker. Accordingly, a separate metric, described herein and mentioned briefly above, may be used to evaluate accumulated risk over a period of time, and that metric may be used to determine whether a worker should be alerted for each individual high risk physical activity. This may take the form of a running gauge over a time window. [0207] the sensor device 190 may also be used to time stamp when a user comes into work, takes a break, or ends work by confirming the time period for which the user is within a work zone. Accordingly, a device trigger can be used to determine how many hours an employee has worked, and if they are allowed into the premises. Triggers can be based on a variety of activities, such as taking the device 190 out of its dock and returning it, putting the device 190 on and off of a belt, starting to walk after putting the device on, scanning an employee badge, or pressing a button or taking other action on the device 190 once a worker puts it on. [0214] FIG. 4A shows a system in which the wearable device 190, described generally as a wearable device 4010, may be implemented. As shown, a worker 4000 may be provided with a wearable device 4010. The wearable device 4010 typically includes multiple communication interfaces, as discussed above. This allows the wearable device 4010 to connect to servers 310 either directly or through a cloud computing interface 4020, in order to upload and receive information, as well as additional sensors 4030, 4040, 4050 on the worker's body which may communicate with the wearable device 4010 and may be provided to keep the worker productive and safe. These additional sensors 4030, 4040, 4050 may be applied directly to the worker's body, as in the case of sensor 4040, or may be integrated into safety equipment, such as sensor 4030, integrated into a harness, and 4050, integrated into a kneepad.) C) a first processor, wherein the first processor is configured to: ([0214][0376]) i) communicate with the one or more sensor modules; (in at least [0214] FIG. 4A shows a system in which the wearable device 190, described generally as a wearable device 4010, may be implemented. As shown, a worker 4000 may be provided with a wearable device 4010. The wearable device 4010 typically includes multiple communication interfaces, as discussed above. This allows the wearable device 4010 to connect to servers 310 either directly or through a cloud computing interface 4020, in order to upload and receive information, as well as additional sensors 4030, 4040, 4050 on the worker's body which may communicate with the wearable device 4010 and may be provided to keep the worker productive and safe. These additional sensors 4030, 4040, 4050 may be applied directly to the worker's body, as in the case of sensor 4040, or may be integrated into safety equipment, such as sensor 4030, integrated into a harness, and 4050, integrated into a kneepad.) ii) receive the movement data and timestamp data; (in at least [0207] the sensor device 190 may also be used to time stamp when a user comes into work, takes a break, or ends work by confirming the time period for which the user is within a work zone. Accordingly, a device trigger can be used to determine how many hours an employee has worked, and if they are allowed into the premises. Triggers can be based on a variety of activities, such as taking the device 190 out of its dock and returning it, putting the device 190 on and off of a belt, starting to walk after putting the device on, scanning an employee badge, or pressing a button or taking other action on the device 190 once a worker puts it on. [0285] FIG. 10A shows an acceleration profile corresponding to a user of the wearable device 4010 walking. FIG. 10B shows that acceleration profile modified by a known category of calibration error, where, for example, the wearable device 4010 is knocked out of alignment while the user is walking.) iii) store in a memory module a session data; and (in at least [0155] The window over which the first physical activity is evaluated is typically closed at the conclusion of the activity. At that point, the signal segment corresponding to the first physical activity may be excerpted (3030) and used for further evaluation or storage. For example, it may be stored in a log of activity, [0326] The identification of an initiation time (at 9110) can take a variety of forms. In some embodiments, the identification is by identifying a signature in the first signal itself. In other embodiments, the worker may indicate that they are initiating a physical activity. For example, a worker may scan a code on a box prior to lifting or otherwise manipulating the box. Alternatively, the identification may be by a server in communication with the wearable device, and the first category of physical activity may be identified based on a schedule associated with the worker and stored on the server.) iv) create one or more session messages comprising the session data from each of the one or more sensor modules; (in at least [0093] The sensor devices may further incorporate LEDs, displays, or other methods for delivering feedback to the workers 110, 140, 172 wearing the sensors. For example, the device may utilize a display to display the risk metrics, or a goal, rank or other relevant information like battery and signal status. The display may be touch sensitive in order to provide a user interface by way of the display. Other information displayed can be error or warning messages when a worker is detected to not be wearing the device correctly, or in a variety of other scenarios discussed below in more detail. The device can also show information like number of steps taken by a worker, calories burned, active hours in the shift, current time and the time to next break etc. This information can be shown when a worker requests it, at regular intervals, or automatically when one of the methods described below are used to identify a relevant or hazardous situation. [0272] generate actionable visualizations by summarizing metrics recorded over the course of an evaluation period, or over an extended period of time, by providing charts indicating high risk times of days, weeks, or months, so that specific risks may be identified and addressed. The platform may further identify, for example, a percentage of high risk lifts or total number of high risk lifts performed in a specified period of time.) D) a second processor, the second processor configured to: ([0214][0376]) i) receive the one or more session messages from the first processor; (in at least [0214] FIG. 4A shows a system in which the wearable device 190, described generally as a wearable device 4010, may be implemented. As shown, a worker 4000 may be provided with a wearable device 4010. The wearable device 4010 typically includes multiple communication interfaces, as discussed above. This allows the wearable device 4010 to connect to servers 310 either directly or through a cloud computing interface 4020, in order to upload and receive information, as well as additional sensors 4030, 4040, 4050 on the worker's body which may communicate with the wearable device 4010 and may be provided to keep the worker productive and safe. These additional sensors 4030, 4040, 4050 may be applied directly to the worker's body, as in the case of sensor 4040, or may be integrated into safety equipment, such as sensor 4030, integrated into a harness, and 4050, integrated into a kneepad. [0215] The multiple communication interfaces may provide an ability to communicate data in real time, including warnings and alerts, through the wearable device 4010, using long range communication methods like sub-GHz and cellular radio as well as short range communication methods, such as WiFi and Bluetooth. In some embodiments the wearable device 4010 may further provide a local wired port, such that sensors may be connected using, for example, a USB connection.) ii) compile the one or more session messages in order of the timestamp data; (in at least [0154] may evaluate aggregate or accumulated risk, in the form of a cumulative risk metric, and risk associated with individual activities in combination. Such a combination allows for the leveraging of risk based insights. As shown in the flowchart, an entity implementing the method, such as a server 310 or a wearable device 190, may receive a signal generated from dynamic activity of the wearable device over time (3000). The method may then evaluate the signal (3010) and determine if a first physical activity was initiated (3015) by identifying an initiation time for the physical activity performed by the worker wearing the device 190. The method then evaluates the signals further and calculates measurements of the worker wearing the device 190 for the time period during the first physical activity from the first signal segment for a time period following the initiation time (3020). [0183] Each individual signal segment is then recorded in the log (at 3150) in order to generate a log of physical activity performed by the worker associated with the wearable device 190, such that the log defines the category of physical activity, the activity risk metric, and the time for each signal segment. The log may record additional data, such as the location of the physical activity. In some embodiments, the log may include a complete record of raw data recorded at the wearable device 190. In addition to raw data, the log may further include any calculated angles or metrics evaluated by the wearable device, as well as any kinematic variables, temperature, air pressure, and height measurements and changes at the time of the associated signal segment. [0272] generate actionable visualizations by summarizing metrics recorded over the course of an evaluation period, or over an extended period of time, by providing charts indicating high risk times of days, weeks, or months, so that specific risks may be identified and addressed. The platform may further identify, for example, a percentage of high risk lifts or total number of high risk lifts performed in a specified period of time.) iii) create a plurality of time windows comprised of a pre-determined and sequential amount of session messages; (in at least [0127] All of these statistics may be monitored over windows of data which may be calculated based on elements of the signal, such as those detected above in steps 420 and 430. [0149] evaluates individual activities, the server will continue to receive data from the sensor devices 190 a, b. Accordingly, the server may then store (530) a record of the first lift in a memory associated with the server and return to step 400 and continue monitoring the sensor data to determine if the worker is performing additional lifting activities. The server typically continues to monitor the data for additional lifting motions over the course of an evaluation period. In some embodiments, once multiple lifts have occurred, the method calculates (540) a frequency associated with the lifting motions identified and incorporates (550) that value into the risk models in order to monitor and evaluate risks associated with repetitive lifts. Such frequency data may be used in the NIOSH model described above, for example, to reduce the maximum recommended weight for a repeated lifting activity based on repetitive stresses and associated risks. [0150] After the conclusion (560) of an evaluation period during which lifting motions are evaluated, the risk models may be used to evaluate (570) aggregate risk over the time period. In some embodiments a worker's shift may be divided into blocks of time, such as half hour blocks, for use as evaluation periods. In some embodiments, the evaluation period is instead the entirety of the worker's shift. [0163] The cumulative risk metric may be for a sliding window of time immediately prior to the calculation of the activity risk metric (at 3040) for a particular physical activity. Accordingly, prior to generating the alert (at 3080), which may be, for example, haptic feedback, the method may determine if the user has been performing high risk physical activities over the most recent window. Such a window may be, for example, a half hour, or it may be longer, such as daily or weekly. Alternatively, the window of time may vary in length depending on the situation. [0164] The cumulative risk metric may be, for example, a risk frequency metric. Accordingly, the metric may be a measure of the frequency with which the activity risk metric was above the activity risk threshold during the sliding window of time for the cumulative risk metric. The frequency threshold may be, for example, a specified frequency goal or an average number of high-risk postures over a full day. Accordingly, while the flowchart in FIG. 3C shows the cumulative metric being maintained (at 3060) based on the generated risk metric (at 3040), it may instead draw from the comparison (at 3050) to consider the frequency of the activity risk metric demonstrating a high risk. Similarly, it may draw directly from the excerpted segment (at 3030) or the signal data (at 3020) to determine a cumulative metric based on variables different from the activity risk metric. [0166] the cumulative risk threshold used may change over the course of the day or across several days. Accordingly, the threshold may be lowered, and a worker may be more likely to receive an alert, during a time of day when the worker is fatigued. [0168] a worker can be alerted to high risk activities during a time when they are above the threshold. The device may alert the user, such as by haptic feedback, initially when the cumulative risk metric crosses the cumulative risk threshold. This would notify the worker when their unit has entered vibration mode. If the cumulative risk metric returns below the cumulative risk threshold, the device 190 would stop alerting the user for every high risk physical activity. [0272] generate actionable visualizations by summarizing metrics recorded over the course of an evaluation period, or over an extended period of time, by providing charts indicating high risk times of days, weeks, or months, so that specific risks may be identified and addressed. The platform may further identify, for example, a percentage of high risk lifts or total number of high risk lifts performed in a specified period of time.) iv) compute a feature of at least one of the plurality of time windows, wherein the feature comprises at least a minimum value, a maximum value or a standard deviation; (in at least [0132] ergonomic risk models may be implemented as well, and may require extracting different values from the data. For example, if implementing the risk model developed by Marras et al using his Lumbar Motion Monitor, the data extracted from the signals may be: Average twisting velocity of the torso during the lift activity, computed in a way similar to the calculation of the asymmetry angle discussed above, except using angular velocity. Maximum moment on the lower back, which is computed by multiplying the maximum horizontal distance between the load and the worker's trunk and the weight of the object lifted. Maximum sagittal flexion of the torso, which is determined by extracting the offset bending angle of the lower back relative to a vertical axis (usually gravity). Maximum lateral velocity of the torso, which may be determined from the accelerometer gyroscope in the back sensor. Frequency of lifts specified in lifts per minute, which can be obtained from the frequency of lift detection. [0138] the risk models specified may be used to calculate a maximum recommended lifting weight based on a workers lifting technique. This is done by using the variables extracted from the signals in a risk model. For example, the NIOSH risk model may be used to calculate a recommended weight limit. Further, the model may be used to calculate a lifting index identifying a risk associated with any particular lifting action or task. Further, while the model is discussed in terms of lifts, such a model or a similar model may be used to evaluate other activities as well in order to determine a risk level for such activities. The model used may then provide numerical results, or those results may be classified in terms of low, medium, and high risk lifts. Similarly, underlying values for variables may be implemented directly in the models, or they may be mapped on to low, medium, or high values. [0142] determine a maximum recommended weight for any given lift (480). Where the risk model used supports a determination for a single point in time, the risk model may be implemented immediately following the detection of an initiation of a lifting activity at step 420. In such an embodiment, the information from the moment of time detected is immediately extracted and processed.) v) utilize a first pre-trained state classifier for determining a first state for at least one of the time windows; (in at least [0138] the risk models specified may be used to calculate a maximum recommended lifting weight based on a workers lifting technique. This is done by using the variables extracted from the signals in a risk model. For example, the NIOSH risk model may be used to calculate a recommended weight limit. Further, the model may be used to calculate a lifting index identifying a risk associated with any particular lifting action or task. Further, while the model is discussed in terms of lifts, such a model or a similar model may be used to evaluate other activities as well in order to determine a risk level for such activities. The model used may then provide numerical results, or those results may be classified in terms of low, medium, and high risk lifts. Similarly, underlying values for variables may be implemented directly in the models, or they may be mapped on to low, medium, or high values. [0139] Using the NIOSH risk model as an example, a recommended weight limit for a single lift may be calculated by simply determining each of the values discussed above, determining an appropriate multiplier used in the model (typically determined from a table associated with the model, or by calculating an appropriate ratio) and multiplying the relevant multipliers. Accordingly, the recommended weight limit may be determined from the equation RWL=LC*HM*VM*DM*AM*FM where LC is a constant multiplier for the formula, typically 51 lbs., and HM, VM, DM, AM, and FM are the multipliers associated with the calculated values of H, V, D, A, and F respectively. In some embodiments, an additional multiplier may be used to incorporate the duration of lifting tasks. While the NIOSH risk model is described, other risk models may be implemented as well. Further, by dividing an actual weight lifted by the recommended weight limit generated by the NIOSH model, a lifting index may be generated providing an evaluation of the risk associated with a specified lifting activity. [0141] While NIOSH and Marras models are described, other risk models may be utilized as well, such as Liberty Mutual® tables, RUBA, RULA, and others. For example, the signals from the sensor 190 may be used to estimate the compression at a specified vertebrae of the spine using a biomechanical model. That compression may then be compared to a maximum limit, such as the 770 lbs. prescribed by OSHA, in order to classify a lift as potentially high risk. [0150] After the conclusion (560) of an evaluation period during which lifting motions are evaluated, the risk models may be used to evaluate (570) aggregate risk over the time period. In some embodiments a worker's shift may be divided into blocks of time, such as half hour blocks, for use as evaluation periods. In some embodiments, the evaluation period is instead the entirety of the worker's shift. [0331] After the activity risk metric is generated (at 9150), the metric may be used to modify the risk score (at 9160) associated with the worker and the first category of physical activity. In this way, the risk score may be adjusted to reflect the risk associated with the particular worker performing the particular type of task. If the activity risk metric reflects a low risk performance of the physical activity by the worker, the risk score may be modified such that a larger payment is generated (at 9140) for future activities. Similarly, if the activity risk metric reflects a high risk performance of the physical activity, the risk score may be modified such that future payments are reduced.) vi) utilize a second pre-trained state classifier for determining a second state for at least one of the time windows; (in at least [0138] the risk models specified may be used to calculate a maximum recommended lifting weight based on a workers lifting technique. This is done by using the variables extracted from the signals in a risk model. For example, the NIOSH risk model may be used to calculate a recommended weight limit. Further, the model may be used to calculate a lifting index identifying a risk associated with any particular lifting action or task. Further, while the model is discussed in terms of lifts, such a model or a similar model may be used to evaluate other activities as well in order to determine a risk level for such activities. The model used may then provide numerical results, or those results may be classified in terms of low, medium, and high risk lifts. Similarly, underlying values for variables may be implemented directly in the models, or they may be mapped on to low, medium, or high values. [0139] Using the NIOSH risk model as an example, a recommended weight limit for a single lift may be calculated by simply determining each of the values discussed above, determining an appropriate multiplier used in the model (typically determined from a table associated with the model, or by calculating an appropriate ratio) and multiplying the relevant multipliers. Accordingly, the recommended weight limit may be determined from the equation RWL=LC*HM*VM*DM*AM*FM where LC is a constant multiplier for the formula, typically 51 lbs., and HM, VM, DM, AM, and FM are the multipliers associated with the calculated values of H, V, D, A, and F respectively. In some embodiments, an additional multiplier may be used to incorporate the duration of lifting tasks. While the NIOSH risk model is described, other risk models may be implemented as well. Further, by dividing an actual weight lifted by the recommended weight limit generated by the NIOSH model, a lifting index may be generated providing an evaluation of the risk associated with a specified lifting activity. [0141] While NIOSH and Marras models are described, other risk models may be utilized as well, such as Liberty Mutual® tables, RUBA, RULA, and others. For example, the signals from the sensor 190 may be used to estimate the compression at a specified vertebrae of the spine using a biomechanical model. That compression may then be compared to a maximum limit, such as the 770 lbs. prescribed by OSHA, in order to classify a lift as potentially high risk. [0150] After the conclusion (560) of an evaluation period during which lifting motions are evaluated, the risk models may be used to evaluate (570) aggregate risk over the time period. In some embodiments a worker's shift may be divided into blocks of time, such as half hour blocks, for use as evaluation periods. In some embodiments, the evaluation period is instead the entirety of the worker's shift. [0331] After the activity risk metric is generated (at 9150), the metric may be used to modify the risk score (at 9160) associated with the worker and the first category of physical activity. In this way, the risk score may be adjusted to reflect the risk associated with the particular worker performing the particular type of task. If the activity risk metric reflects a low risk performance of the physical activity by the worker, the risk score may be modified such that a larger payment is generated (at 9140) for future activities. Similarly, if the activity risk metric reflects a high risk performance of the physical activity, the risk score may be modified such that future payments are reduced.) vii) determine a total session time; (in at least [0150] After the conclusion (560) of an evaluation period during which lifting motions are evaluated, the risk models may be used to evaluate (570) aggregate risk over the time period. In some embodiments a worker's shift may be divided into blocks of time, such as half hour blocks, for use as evaluation periods. In some embodiments, the evaluation period is instead the entirety of the worker's shift. [0151] FIG. 3B is a plot illustrating high risk postures over time for a worker, and FIG. 3C is a flowchart illustrating an alternative method for monitoring safety. While the basic method discussed may provide an alert, such as a vibration or device display indicating a high risk physical activity or movement any time such a movement was performed, such an approach may result in a large number of alerts to a worker. Such a large number of alerts may be ignored, or may irritate the worker. Accordingly, a separate metric, described herein and mentioned briefly above, may be used to evaluate accumulated risk over a period of time, and that metric may be used to determine whether a worker should be alerted for each individual high risk physical activity. This may take the form of a running gauge over a time window. [0163] The cumulative risk metric may be for a sliding window of time immediately prior to the calculation of the activity risk metric (at 3040) for a particular physical activity. Accordingly, prior to generating the alert (at 3080), which may be, for example, haptic feedback, the method may determine if the user has been performing high risk physical activities over the most recent window. Such a window may be, for example, a half hour, or it may be longer, such as daily or weekly. Alternatively, the window of time may vary in length depending on the situation. [0164] The cumulative risk metric may be, for example, a risk frequency metric. Accordingly, the metric may be a measure of the frequency with which the activity risk metric was above the activity risk threshold during the sliding window of time for the cumulative risk metric. The frequency threshold may be, for example, a specified frequency goal or an average number of high-risk postures over a full day. [0179] an activity log may be used to determine a worker's schedule and shift scheduled activities to create optimal rest/work intervals. The system may use worker data to determine the effectiveness of their recovery periods, and thereby suggest schedule changes. The system may integrate with necessary systems at the facility to ensure that recovery schedules do not compromise business demands. Further, the system may incorporate worker preferences and company preferences in order to improve work/life balance.) viii) aggregate each of the time windows by each of the at least two states and compute for each of the at least two states a total state output value wherein the state output value is a function of said total session time; and (in at least [0138] the risk models specified may be used to calculate a maximum recommended lifting weight based on a workers lifting technique. This is done by using the variables extracted from the signals in a risk model. For example, the NIOSH risk model may be used to calculate a recommended weight limit. Further, the model may be used to calculate a lifting index identifying a risk associated with any particular lifting action or task. Further, while the model is discussed in terms of lifts, such a model or a similar model may be used to evaluate other activities as well in order to determine a risk level for such activities. The model used may then provide numerical results, or those results may be classified in terms of low, medium, and high risk lifts. Similarly, underlying values for variables may be implemented directly in the models, or they may be mapped on to low, medium, or high values. [0139] Using the NIOSH risk model as an example, a recommended weight limit for a single lift may be calculated by simply determining each of the values discussed above, determining an appropriate multiplier used in the model (typically determined from a table associated with the model, or by calculating an appropriate ratio) and multiplying the relevant multipliers. Accordingly, the recommended weight limit may be determined from the equation RWL=LC*HM*VM*DM*AM*FM where LC is a constant multiplier for the formula, typically 51 lbs., and HM, VM, DM, AM, and FM are the multipliers associated with the calculated values of H, V, D, A, and F respectively. In some embodiments, an additional multiplier may be used to incorporate the duration of lifting tasks. While the NIOSH risk model is described, other risk models may be implemented as well. Further, by dividing an actual weight lifted by the recommended weight limit generated by the NIOSH model, a lifting index may be generated providing an evaluation of the risk associated with a specified lifting activity. [0141] While NIOSH and Marras models are described, other risk models may be utilized as well, such as Liberty Mutual® tables, RUBA, RULA, and others. For example, the signals from the sensor 190 may be used to estimate the compression at a specified vertebrae of the spine using a biomechanical model. That compression may then be compared to a maximum limit, such as the 770 lbs. prescribed by OSHA, in order to classify a lift as potentially high risk. [0150] After the conclusion (560) of an evaluation period during which lifting motions are evaluated, the risk models may be used to evaluate (570) aggregate risk over the time period. In some embodiments a worker's shift may be divided into blocks of time, such as half hour blocks, for use as evaluation periods. In some embodiments, the evaluation period is instead the entirety of the worker's shift. [0151] FIG. 3B is a plot illustrating high risk postures over time for a worker, and FIG. 3C is a flowchart illustrating an alternative method for monitoring safety. While the basic method discussed may provide an alert, such as a vibration or device display indicating a high risk physical activity or movement any time such a movement was performed, such an approach may result in a large number of alerts to a worker. Such a large number of alerts may be ignored, or may irritate the worker. Accordingly, a separate metric, described herein and mentioned briefly above, may be used to evaluate accumulated risk over a period of time, and that metric may be used to determine whether a worker should be alerted for each individual high risk physical activity. This may take the form of a running gauge over a time window.) ix) output a job task summary comprised of at least two of the total state output values. (in at least [0151] FIG. 3B is a plot illustrating high risk postures over time for a worker, and FIG. 3C is a flowchart illustrating an alternative method for monitoring safety. While the basic method discussed may provide an alert, such as a vibration or device display indicating a high risk physical activity or movement any time such a movement was performed, such an approach may result in a large number of alerts to a worker. Such a large number of alerts may be ignored, or may irritate the worker. Accordingly, a separate metric, described herein and mentioned briefly above, may be used to evaluate accumulated risk over a period of time, and that metric may be used to determine whether a worker should be alerted for each individual high risk physical activity. This may take the form of a running gauge over a time window. [0272] a platform implementing the method may generate actionable visualizations by summarizing metrics recorded over the course of an evaluation period, or over an extended period of time, by providing charts indicating high risk times of days, weeks, or months, so that specific risks may be identified and addressed. The platform may further identify, for example, a percentage of high risk lifts or total number of high risk lifts performed in a specified period of time. [0273] Such an evaluation may be done in real-time by providing such feedback during a work shift. Alternatively, or in addition, the platform may provide (750) an end of day evaluation. Such an evaluation may, for example, demonstrate worsening posture over the course of the day indicating fatigue. In such a scenario, the platform may provide a recommendation (760) such as a scheduling change or a reorganization of tasks. For example, the platform may recommend lifting heavier objects earlier in a shift. [0274] Such an evaluation may be done in real-time by providing such feedback during a work shift. Alternatively, or in addition, the platform may provide (750) an end of day evaluation. Such an evaluation may, for example, demonstrate worsening posture over the course of the day indicating fatigue. In such a scenario, the platform may provide a recommendation (760) such as a scheduling change or a reorganization of tasks. For example, the platform may recommend lifting heavier objects earlier in a shift. [0275] Metrics relating to productivity of individual workers may be further developed, and productivity based metrics may be utilized to evaluate relationships between fatigue and productivity. Accordingly, the platform may provide estimates of return on investment for individual pieces of equipment that may both reduce injury risk and increase productivity. In some cases, a reduction in injury risk may lower productivity, while a requirement for a worker increasing productivity may increase the risk for that particular worker. [0330] An activity risk metric is then generated (9150) from a risk model based on the measurements of the wearer for the time period during the physical activity, the activity risk metric being indicative of a risk level of the execution of the physical activity by the wearer. [0331] After the activity risk metric is generated (at 9150), the metric may be used to modify the risk score (at 9160) associated with the worker and the first category of physical activity. In this way, the risk score may be adjusted to reflect the risk associated with the particular worker performing the particular type of task. If the activity risk metric reflects a low risk performance of the physical activity by the worker, the risk score may be modified such that a larger payment is generated (at 9140) for future activities. Similarly, if the activity risk metric reflects a high risk performance of the physical activity, the risk score may be modified such that future payments are reduced.) As per Claim 12, Elhawary teaches: The system of claim 11 wherein each of the sensor modules is configured to determine at least one of acceleration data, gyroscopic data, tilt data, location (GPS) data, environmental data, heart rate data, body temperature data, blood pressure data, quaternion, stretch, flex, or a combination thereof. (in at least [0089] FIG. 2A, each wearable device 190 may include a sensor array 200 including a 3-axis accelerometer 210, a 3-axis gyroscope 220, a 3-axis magnetometer 230, a temperature sensor 240, and an altitude sensor 250, such as a barometric pressure sensor. Each sensor device 190 may further include a communication module 260 which may include multiple communication interfaces. For example, each sensor device 190 may have a short range communication interface 270 for enabling communications between a first sensor device 190 a and a second sensor device 190 b worn by a single user. The short range communication interface 270 may further be used to receive signals from additional sensors or devices on the user's body, such as safety equipment, or from sensors or other transmitters in the user's immediate environment. The wearable device 190 may further contain a longer range communication interface 280 for connecting, for example, to a Wi-Fi or cellular network. Each wearable device 190 may further include a computation module 285, including a processor 290 and a memory 300. [0201] In addition to the identification of particular activities based on extraction of orientation and acceleration data from the sensor device 190, additional context may be provided for the data by sensors or communication protocols used to calculate a user's location within a facility or a distance from another object. For example, in an indoor facility, beacons may be distributed, and Wifi or Bluetooth signal strength or triangulation may be used to estimate the position of the invented device inside the facility. Similarly, in an outdoor environment, GPS can be used to estimate location. [0213] Productivity metrics may be developed and utilized based on frequency of detection of certain activities. Such data may be analyzed to search for relationships with other detected metrics. For example, productivity can be correlated to changes in dehydration as measured by sweat sensors, such as in the system discussed below in reference to FIG. 4B, or to times of the day, weather, or ambient or body temperature.) As per Claim 13, Elhawary teaches: The system of claim 11, wherein the session data comprises a body location for each of the one or more sensors on the garment. (in at least [0083] Each of the workers 110, 140, 172 would typically be wearing at least one sensor device, and in some embodiments, two sensor devices, 190 a, b for recording movement. Typically, where two sensors are provided, the sensors used may be a wrist sensor device 190 a, ideally located on the wrist or forearm of the dominant hand, and a back sensor device 190 b, ideally located approximately at the height of the L1 and L2 vertebrae, but other sensor device types may be implemented as well. The wrist sensor may incorporated into a wrist device, such as a bracelet or a wristwatch, and the back device may be incorporated into a chest strap, weight belt or back brace, for example. Where only one sensor device 190 is provided, it is typically applied to a worker 110, 140, 172 on or near the worker's hip. However, the device 190 may be applied elsewhere and the necessary dimensions and measurements may be extrapolated from data recorded from the sensor device 190. The sensor device 190 may take a variety of forms, and is referred to herein as any of a sensor, a device, or a sensor device.) As per Claim 14, Elhawary teaches: The system of claim 11, wherein the second processor is further configured to filter session messages. (in at least [0104] identifying the initiation of a lift may comprise only filtering of data to reduce noise and cancel any drift. Typically, filtering is applied, such as a band pass filter, to ensure that more resource intensive processing is applied only once a lifting activity is detected within the more minimally processed data. For example, drift in height sensor data and gyroscope data may be filtered to reduce noise prior to identifying a lifting activity, and then the filtered data may be utilized to detect the initiation of a lifting task with a reduced number of false positives. ) As per Claim 15, Elhawary teaches: The system of claim 11, wherein the job task summary quantifies the kinematic requirements of a job. (in at least [0167] the cumulative risk metric may be based on kinematic variables including at least one of back bending angle and cumulative trunk loading. For example, the cumulative risk metric may be based on a time integration of the kinematic variables over time. Accordingly, in such an embodiment, the metric is based on an integration of the back bending angle over time and an integration of the trunk loading window over time. The cumulative risk metric may be based on variables different than those on which the activity risk metric is based, or it may be based on the same set of variables. Accordingly, the activity risk metric may be based on a first physical model while the cumulative risk metric may be based on a different physical model. [0170] additional cumulative risk metrics may be maintained by the method or system described. Accordingly, a worker may be monitored for cumulative risk over the window discussed above, as well as a complete day and/or week. Other cumulative variables may include cumulative trunk loading, position and timing variables, and integrated kinematic variables, such as daily integrated back sagittal angle or velocity. [0275] productivity of individual workers may be further developed, and productivity based metrics may be utilized to evaluate relationships between fatigue and productivity. Accordingly, the platform may provide estimates of return on investment for individual pieces of equipment that may both reduce injury risk and increase productivity. In some cases, a reduction in injury risk may lower productivity, while a requirement for a worker increasing productivity may increase the risk for that particular worker. The platform described may determine an appropriate balance of increasing a worker's productivity while maintaining the risk metric below a specified threshold.) As per Claim 16, Elhawary teaches: The system of claim 11, wherein the system comprises two or more garments, each garment comprising one or more sensor modules, and the first processor is configured to store a session identifier that is different for each of two or more subjects. (in at least [0235] FIG. 4C shows an additional system in which the wearable device 190 may be implemented. As shown, the worker 4000 may similarly be provided with a wearable device 4010 which includes multiple communication interfaces, as in the system shown in FIG. 4B. However, in such an implementation, the short range communication interface 4100 provided may be used by a first worker 4000 a to communicate with additional workers 4000 b-e in order to bypass long range communication, or to pass a signal to different workers 4000 c within range of long range communication 4110 when the first worker 4000 a is out of such range. [0259] workers can receive individualized messages at their own devices 4010. This may be based on worker biomechanical data, such as specific advice to focus on reducing twists, for example. Messages may further advise taking breaks as a response to fatigue metrics. Messages can further relate to worker task assignments related to certain stations, machines, or locations. For example, “station number XY12” would allow a worker to confirm which station they are assigned to. Similarly, a machine or task may be assigned to a worker. The worker may then push a button or tap the wearable device to indicate task completion. [0364] Where a worker uses their badge to associate a wearable device with themselves, the ID must be a human readable or machine readable passive or active ID. The ID can be included in a workers employee access badge, phone, wallet, clothing, or the like. In such an embodiment, a worker association with a wearable device could be recorded at a server and in an appropriate database. This may be by way of the wearable device itself, or it may be by way of a kiosk associated with a docking location capable of reading the ID on the device as well as the employee ID. Data integrity in a large workplace is important, since data can be associated with any one of hundreds or thousands of workers.) As per Claim 17, Elhawary teaches: The system of claim 16, wherein the second processor is configured to compile the one or more session messages in order of the timestamp data and by the session identifier. (in at least [0151] FIG. 3B is a plot illustrating high risk postures over time for a worker, and FIG. 3C is a flowchart illustrating an alternative method for monitoring safety. While the basic method discussed may provide an alert, such as a vibration or device display indicating a high risk physical activity or movement any time such a movement was performed, such an approach may result in a large number of alerts to a worker. Such a large number of alerts may be ignored, or may irritate the worker. Accordingly, a separate metric, described herein and mentioned briefly above, may be used to evaluate accumulated risk over a period of time, and that metric may be used to determine whether a worker should be alerted for each individual high risk physical activity. This may take the form of a running gauge over a time window. [0154] evaluate aggregate or accumulated risk, in the form of a cumulative risk metric, and risk associated with individual activities in combination. Such a combination allows for the leveraging of risk based insights. As shown in the flowchart, an entity implementing the method, such as a server 310 or a wearable device 190, may receive a signal generated from dynamic activity of the wearable device over time (3000). The method may then evaluate the signal (3010) and determine if a first physical activity was initiated (3015) by identifying an initiation time for the physical activity performed by the worker wearing the device 190. The method then evaluates the signals further and calculates measurements of the worker wearing the device 190 for the time period during the first physical activity from the first signal segment for a time period following the initiation time (3020). [0207] the sensor device 190 may also be used to time stamp when a user comes into work, takes a break, or ends work by confirming the time period for which the user is within a work zone. Accordingly, a device trigger can be used to determine how many hours an employee has worked, and if they are allowed into the premises. Triggers can be based on a variety of activities, such as taking the device 190 out of its dock and returning it, putting the device 190 on and off of a belt, starting to walk after putting the device on, scanning an employee badge, or pressing a button or taking other action on the device 190 once a worker puts it on.) As per Claim 18, Elhawary teaches: The system of claim 11, wherein the first and second processors are the same. (in at least [0235] FIG. 4C shows an additional system in which the wearable device 190 may be implemented. As shown, the worker 4000 may similarly be provided with a wearable device 4010 which includes multiple communication interfaces, as in the system shown in FIG. 4B. However, in such an implementation, the short range communication interface 4100 provided may be used by a first worker 4000 a to communicate with additional workers 4000 b-e in order to bypass long range communication, or to pass a signal to different workers 4000 c within range of long range communication 4110 when the first worker 4000 a is out of such range.) As per Claim 19, Elhawary teaches: The system of claim 11, wherein the first or second processor calculates a joint angle of a subject. (in at least [0102] The server then evaluates (420) both signals to determine if any portion of the signal represents the initiation of a lifting activity. If a lifting activity is identified in the data, the server then further evaluates (430) both signals to identify an end point of the lifting activity. In some embodiments, this detection of an initiation of a lifting activity and an end point of the lifting activity is by way of a rules based approach directly using variables obtained from the sensor data, or based on variables detectable after only minimal signal processing. This rules based approach may include, for example, measuring the back angle with respect to the gravity plane and determining when it passes a threshold. This type of threshold may be static or variable, depending on other elements of the lift. Arm elevation angles may further be used to detect lifts above the shoulder [0167] the cumulative risk metric may be based on kinematic variables including at least one of back bending angle and cumulative trunk loading. For example, the cumulative risk metric may be based on a time integration of the kinematic variables over time. Accordingly, in such an embodiment, the metric is based on an integration of the back bending angle over time and an integration of the trunk loading window over time. The cumulative risk metric may be based on variables different than those on which the activity risk metric is based, or it may be based on the same set of variables. Accordingly, the activity risk metric may be based on a first physical model while the cumulative risk metric may be based on a different physical model.) As per Claim 20, Elhawary teaches: The system of claim 11, wherein job task summary further comprises a classification of stress or fatigue. (in at least [0149] While the method evaluates individual activities, the server will continue to receive data from the sensor devices 190 a, b. Accordingly, the server may then store (530) a record of the first lift in a memory associated with the server and return to step 400 and continue monitoring the sensor data to determine if the worker is performing additional lifting activities. The server typically continues to monitor the data for additional lifting motions over the course of an evaluation period. In some embodiments, once multiple lifts have occurred, the method calculates (540) a frequency associated with the lifting motions identified and incorporates (550) that value into the risk models in order to monitor and evaluate risks associated with repetitive lifts. Such frequency data may be used in the NIOSH model described above, for example, to reduce the maximum recommended weight for a repeated lifting activity based on repetitive stresses and associated risks. [0165] the cumulative risk metric may be a measure of rest periods between instances of the activity risk metric being above the activity risk threshold. This may allow the cumulative risk metric to consider cumulative rest time. Alternatively, the cumulative risk metric may be a measure of the overall number of physical activities performed during the sliding window of time, such that the system may determine whether a worker is likely to be fatigued. Being fatigued from a large number of physical activities may result in a worker being more susceptible to the risk associated with high risk individual physical activities.) As per Claim 1-10, substantially recite the subject matter of Claim 11-20 and are rejected based on the same reasoning and rationale. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to PO HAN (Max) LEE whose telephone number is (571) 272-3821. The examiner can normally be reached on Monday - Thursday, 9 AM-6:30 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Rutao Wu can be reached on (571) 272-6045. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /PO HAN LEE/Primary Examiner, Art Unit 3623
Read full office action

Prosecution Timeline

Sep 18, 2024
Application Filed
Feb 06, 2026
Non-Final Rejection — §101, §102 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602629
USING MACHINE LEARNING TO PREDICT FLEET MOVES IN HYDRAULIC FRACTURING OPERATIONS
2y 5m to grant Granted Apr 14, 2026
Patent 12548089
OPTIMIZATION OF HYBRID GROWING INFRASTRUCTURE FOR DIFFERENT WEATHER PROFILES AND MARKET CONDITIONS
2y 5m to grant Granted Feb 10, 2026
Patent 12548046
SYSTEM FOR ACCURATE PREDICTIONS USING A PREDICTIVE MODEL
2y 5m to grant Granted Feb 10, 2026
Patent 12547241
SYSTEMS AND METHODS FOR COMPUTER-IMPLEMENTED SURVEYS
2y 5m to grant Granted Feb 10, 2026
Patent 12361363
METHOD AND SYSTEM FOR PROFICIENCY IDENTIFICATION
2y 5m to grant Granted Jul 15, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
32%
Grant Probability
74%
With Interview (+41.2%)
3y 6m
Median Time to Grant
Low
PTA Risk
Based on 158 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month