Patents by Inventor Jonathan Jay Andrews
Jonathan Jay Andrews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9207730Abstract: An electronic device is configured to manage heat in the device using a multi level thermal management process. When the temperature of the device reaches a level that requires the device to take action to adjust its thermal behavior, a system level controller identifies a component in the device as being active and that can be controlled to adjust heat generation in the device. Once an active component is identified, a component level controller sets an activity limit for the identified active component that is at or above a minimum activity limit of the component and prevents the component from operating above this activity limit. Other embodiments are also described and claimed.Type: GrantFiled: June 2, 2011Date of Patent: December 8, 2015Assignee: Apple Inc.Inventor: Jonathan Jay Andrews
-
Patent number: 9063707Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.Type: GrantFiled: January 14, 2014Date of Patent: June 23, 2015Assignee: Apple Inc.Inventors: Joshua de Cesare, Jonathan Jay Andrews
-
Patent number: 9015381Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.Type: GrantFiled: December 19, 2011Date of Patent: April 21, 2015Assignee: Apple Inc.Inventors: Mitch Adler, Jonathan Jay Andrews
-
Publication number: 20140129852Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.Type: ApplicationFiled: January 14, 2014Publication date: May 8, 2014Applicant: Apple Inc.Inventors: Joshua de Cesare, Jonathan Jay Andrews
-
Patent number: 8667308Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.Type: GrantFiled: July 9, 2010Date of Patent: March 4, 2014Assignee: Apple Inc.Inventors: Joshua de Cesare, Jonathan Jay Andrews
-
Patent number: 8560820Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: GrantFiled: March 2, 2012Date of Patent: October 15, 2013Assignee: Apple Inc.Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Publication number: 20120311357Abstract: An electronic device is configured to manage heat in the device using a multi level thermal management process. When the temperature of the device reaches a level that requires the device to take action to adjust its thermal behavior, a system level controller identifies a component in the device as being active and that can be controlled to adjust heat generation in the device. Once an active component is identified, a component level controller sets an activity limit for the identified active component that is at or above a minimum activity limit of the component and prevents the component from operating above this activity limit. Other embodiments are also described and claimed.Type: ApplicationFiled: June 2, 2011Publication date: December 6, 2012Applicant: Apple Inc.Inventor: Jonathan Jay Andrews
-
Publication number: 20120166781Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: ApplicationFiled: March 2, 2012Publication date: June 28, 2012Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Publication number: 20120151106Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.Type: ApplicationFiled: December 19, 2011Publication date: June 14, 2012Inventors: Mitch Adler, Jonathan Jay Andrews
-
Patent number: 8150039Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: GrantFiled: April 15, 2008Date of Patent: April 3, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Patent number: 8104027Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.Type: GrantFiled: May 28, 2008Date of Patent: January 24, 2012Assignee: International Business Machines CorporationInventors: Daniel Owen, Jonathan Jay Andrews, Miles Philip Howson, David Haikney
-
Patent number: 8090767Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.Type: GrantFiled: January 7, 2008Date of Patent: January 3, 2012Assignee: Apple Inc.Inventors: Mitch Adler, Jonathan Jay Andrews
-
Publication number: 20110314305Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.Type: ApplicationFiled: July 9, 2010Publication date: December 22, 2011Inventors: Joshua de Cesare, Jonathan Jay Andrews
-
Patent number: 7921413Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.Type: GrantFiled: November 6, 2006Date of Patent: April 5, 2011Assignee: International Business Machines CorporationInventors: Daniel Owen, Jonathan Jay Andrews, Miles Philip Howson, David Haikney
-
Publication number: 20090295461Abstract: A process and apparatus for configuring one or more integrated circuits within a device in a manufacturing process is described. In an exemplary process, a device is manufactured by assembling a chip onto a board such as a printed circuit substrate and the chip is fused from power routed across the board to the chip. The power source for the fusing can be generated from the internal power supply on the board or received on a test point on the board itself or a connection interface (e.g. a USB interface) coupled to the board. In an exemplary apparatus, a device comprises a chip with a plurality of fuses that are used to configure the device and a board coupled to the chip, with the board capable of routing power from the board to the chip and the power is used to blow one or more of the plurality of fuses.Type: ApplicationFiled: August 6, 2008Publication date: December 3, 2009Inventors: Joshua de Cesare, Michael Smith, Jonathan Jay Andrews, Alan Gilchrist, Hope Giles
-
Publication number: 20090259855Abstract: A method and apparatus for personalizing a software component to be executed in particular environment are described herein. According to an aspect of the invention, in response to an executable code image representing a software component to be installed in an electronic device, the executable code image is encrypted using an encryption key. The encryption key is then wrapped with a UID that uniquely identifies the electronic device, where the UID is embedded within a secure ROM of the electronic device. The wrapped encryption key and the encrypted executable code image are then encapsulated into a data object to be stored in a storage of the electronic device, such that when the electronic device is subsequently initialized for operation, the executable code image can only be recovered using the UID of the electronic device to retrieve a decryption key in order to decrypt the executable code image.Type: ApplicationFiled: April 15, 2008Publication date: October 15, 2009Applicant: Apple Inc.Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael Smith
-
Publication number: 20090257595Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: ApplicationFiled: April 15, 2008Publication date: October 15, 2009Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Publication number: 20090215398Abstract: At least certain embodiments of the disclosures relate to establishing communications between devices with a first connection. A second connection is established between the devices to transfer data between the devices and/or alter configurations of the devices. In one embodiment, a method includes establishing a first connection between a first device and a second device with a first networking standard and associated first network. The method further includes establishing a second connection between the first device and the second device with a second networking standard and associated second network based on the first connection providing information to at least one of the first and second devices regarding the second network. The method further includes transferring data between the first and second devices using the second networking standard. In one embodiment, the first networking standard is a Bluetooth networking standard and the second networking standard is a WiFi networking standard.Type: ApplicationFiled: February 25, 2008Publication date: August 27, 2009Inventors: Mitchell D. Adler, Jonathan Jay Andrews
-
Publication number: 20090177783Abstract: A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.Type: ApplicationFiled: January 7, 2008Publication date: July 9, 2009Inventors: Mitch Adler, Jonathan Jay Andrews
-
Publication number: 20090007085Abstract: An improved architecture for a program code conversion apparatus and method for generating intermediate representations for program code conversion. The program code conversion apparatus determines which types of IR nodes to generate in an intermediate representation (IR) of subject code (10) to be translated. Depending upon the particular subject and target computing environments involved in the conversion, the program code conversion apparatus utilizes either base nodes, complex nodes, polymorphic nodes, and architecture specific nodes, or some combination thereof, in generating the intermediate representation.Type: ApplicationFiled: May 28, 2008Publication date: January 1, 2009Applicant: TRANSITIVE LIMITEDInventors: Daniel OWEN, Jonathan Jay ANDREWS, Miles Philip HOWSON, David HAIKNEY