Patents by Inventor Jonathan Jay Andrews

Jonathan Jay Andrews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9207730
    Abstract: An electronic device is configured to manage heat in the device using a multi level thermal management process. When the temperature of the device reaches a level that requires the device to take action to adjust its thermal behavior, a system level controller identifies a component in the device as being active and that can be controlled to adjust heat generation in the device. Once an active component is identified, a component level controller sets an activity limit for the identified active component that is at or above a minimum activity limit of the component and prevents the component from operating above this activity limit. Other embodiments are also described and claimed.
    Type: Grant
    Filed: June 2, 2011
    Date of Patent: December 8, 2015
    Assignee: Apple Inc.
    Inventor: Jonathan Jay Andrews
  • Patent number: 9063707
    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: June 23, 2015
    Assignee: Apple Inc.
    Inventors: Joshua de Cesare, Jonathan Jay Andrews
  • Patent number: 9015381
    Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: April 21, 2015
    Assignee: Apple Inc.
    Inventors: Mitch Adler, Jonathan Jay Andrews
  • Publication number: 20140129852
    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.
    Type: Application
    Filed: January 14, 2014
    Publication date: May 8, 2014
    Applicant: Apple Inc.
    Inventors: Joshua de Cesare, Jonathan Jay Andrews
  • Patent number: 8667308
    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: March 4, 2014
    Assignee: Apple Inc.
    Inventors: Joshua de Cesare, Jonathan Jay Andrews
  • Patent number: 8560820
    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: October 15, 2013
    Assignee: Apple Inc.
    Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
  • Publication number: 20120311357
    Abstract: An electronic device is configured to manage heat in the device using a multi level thermal management process. When the temperature of the device reaches a level that requires the device to take action to adjust its thermal behavior, a system level controller identifies a component in the device as being active and that can be controlled to adjust heat generation in the device. Once an active component is identified, a component level controller sets an activity limit for the identified active component that is at or above a minimum activity limit of the component and prevents the component from operating above this activity limit. Other embodiments are also described and claimed.
    Type: Application
    Filed: June 2, 2011
    Publication date: December 6, 2012
    Applicant: Apple Inc.
    Inventor: Jonathan Jay Andrews
  • Publication number: 20120166781
    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.
    Type: Application
    Filed: March 2, 2012
    Publication date: June 28, 2012
    Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
  • Publication number: 20120151106
    Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 14, 2012
    Inventors: Mitch Adler, Jonathan Jay Andrews
  • Patent number: 8150039
    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.
    Type: Grant
    Filed: April 15, 2008
    Date of Patent: April 3, 2012
    Assignee: Apple Inc.
    Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
  • Patent number: 8104027
    Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: January 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniel Owen, Jonathan Jay Andrews, Miles Philip Howson, David Haikney
  • Patent number: 8090767
    Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.
    Type: Grant
    Filed: January 7, 2008
    Date of Patent: January 3, 2012
    Assignee: Apple Inc.
    Inventors: Mitch Adler, Jonathan Jay Andrews
  • Publication number: 20110314305
    Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.
    Type: Application
    Filed: July 9, 2010
    Publication date: December 22, 2011
    Inventors: Joshua de Cesare, Jonathan Jay Andrews
  • Patent number: 7921413
    Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: April 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Daniel Owen, Jonathan Jay Andrews, Miles Philip Howson, David Haikney
  • Publication number: 20090295461
    Abstract: A process and apparatus for configuring one or more integrated circuits within a device in a manufacturing process is described. In an exemplary process, a device is manufactured by assembling a chip onto a board such as a printed circuit substrate and the chip is fused from power routed across the board to the chip. The power source for the fusing can be generated from the internal power supply on the board or received on a test point on the board itself or a connection interface (e.g. a USB interface) coupled to the board. In an exemplary apparatus, a device comprises a chip with a plurality of fuses that are used to configure the device and a board coupled to the chip, with the board capable of routing power from the board to the chip and the power is used to blow one or more of the plurality of fuses.
    Type: Application
    Filed: August 6, 2008
    Publication date: December 3, 2009
    Inventors: Joshua de Cesare, Michael Smith, Jonathan Jay Andrews, Alan Gilchrist, Hope Giles
  • Publication number: 20090259855
    Abstract: A method and apparatus for personalizing a software component to be executed in particular environment are described herein. According to an aspect of the invention, in response to an executable code image representing a software component to be installed in an electronic device, the executable code image is encrypted using an encryption key. The encryption key is then wrapped with a UID that uniquely identifies the electronic device, where the UID is embedded within a secure ROM of the electronic device. The wrapped encryption key and the encrypted executable code image are then encapsulated into a data object to be stored in a storage of the electronic device, such that when the electronic device is subsequently initialized for operation, the executable code image can only be recovered using the UID of the electronic device to retrieve a decryption key in order to decrypt the executable code image.
    Type: Application
    Filed: April 15, 2008
    Publication date: October 15, 2009
    Applicant: Apple Inc.
    Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael Smith
  • Publication number: 20090257595
    Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.
    Type: Application
    Filed: April 15, 2008
    Publication date: October 15, 2009
    Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
  • Publication number: 20090215398
    Abstract: At least certain embodiments of the disclosures relate to establishing communications between devices with a first connection. A second connection is established between the devices to transfer data between the devices and/or alter configurations of the devices. In one embodiment, a method includes establishing a first connection between a first device and a second device with a first networking standard and associated first network. The method further includes establishing a second connection between the first device and the second device with a second networking standard and associated second network based on the first connection providing information to at least one of the first and second devices regarding the second network. The method further includes transferring data between the first and second devices using the second networking standard. In one embodiment, the first networking standard is a Bluetooth networking standard and the second networking standard is a WiFi networking standard.
    Type: Application
    Filed: February 25, 2008
    Publication date: August 27, 2009
    Inventors: Mitchell D. Adler, Jonathan Jay Andrews
  • Publication number: 20090177783
    Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.
    Type: Application
    Filed: January 7, 2008
    Publication date: July 9, 2009
    Inventors: Mitch Adler, Jonathan Jay Andrews
  • Publication number: 20090007085
    Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.
    Type: Application
    Filed: May 28, 2008
    Publication date: January 1, 2009
    Applicant: TRANSITIVE LIMITED
    Inventors: Daniel OWEN, Jonathan Jay ANDREWS, Miles Philip HOWSON, David HAIKNEY