Patents by Inventor Joshua Phillips

Joshua Phillips has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160289355
    Abstract: A method for preparing a functionalized polymer, the method comprising the steps of (i) preparing a halocarbon-activated nitrogen heterocycle containing a functional group, (ii) preparing a reactive polymer, and (iii) reacting the reactive polymer with the halocarbon-activated nitrogen heterocycle containing a functional group.
    Type: Application
    Filed: April 1, 2016
    Publication date: October 6, 2016
    Inventors: Joshua Phillip ABELL, Steven LUO
  • Publication number: 20160289354
    Abstract: A method for preparing a functionalized polymer, the method comprising the steps of (i) preparing a halosilane-activated nitrogen heterocycle containing a functional group, (ii) preparing a reactive polymer, and (iii) reacting the reactive polymer with the halosilane-activated nitrogen heterocycle containing a functional group.
    Type: Application
    Filed: April 1, 2016
    Publication date: October 6, 2016
    Inventors: Joshua Phillip ABELL, Steven LUO
  • Publication number: 20160162164
    Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 9, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
  • Publication number: 20160077987
    Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred WI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.
    Type: Application
    Filed: September 28, 2015
    Publication date: March 17, 2016
    Inventors: Derek R. Kumar, Joshua Phillips de Cesare
  • Patent number: 9256349
    Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: February 9, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
  • Patent number: 9208113
    Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred IPI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: December 8, 2015
    Assignee: Apple Inc.
    Inventors: Derek R. Kumar, Joshua Phillips de Cesare
  • Publication number: 20150336254
    Abstract: A framing hammer including an automatic feeding magazine supported within the hammerhead by guide rails with a self-loading magazine. Through the center of the upper portion of the hammer handle lies the self-loading reciprocating magazine. The top end of the magazine actuates due to the force of the impact of the tool through its natural operation. The magazine is inclined at 21° relative to the handle and is spaced in the center of the handle from the rear of the nail driving face. Structure is provided for individually driving a nail from a magazine contained row of commercially available 21° collated nails toward the rearward facing end of the hammerhead. Upon impact the tool dispenses and sets a nail up to a 1½? into the work surface, upon disengagement the tool reciprocates to resets to its resting position whereupon the tool is ready to repeat the action.
    Type: Application
    Filed: May 26, 2014
    Publication date: November 26, 2015
    Inventors: Jeremy Charles Stetson, Joshua Phillip May
  • Patent number: 8897552
    Abstract: Disclosed herein are representative embodiments of tools and techniques for setting color settings of an operating system using one or more photographs. According to one exemplary technique, a photograph is received, and one or more pixel weights for one or more pixels of the photograph are determined. Also, using at least one of the one or more pixel weights, at least one dominant color of the photograph is determined. Additionally, using the at least one dominant color, at least one color setting of an operating system is set.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: November 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Joshua Phillips, Simon Baker
  • Publication number: 20140201411
    Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred IPI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.
    Type: Application
    Filed: January 15, 2013
    Publication date: July 17, 2014
    Applicant: Apple Inc.
    Inventors: Derek R. Kumar, Joshua Phillips de Cesare
  • Patent number: 8762439
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating random data at an early stage in a boot process. A system practicing the method performs, by a processor based on a first clock, a group of reads of a counter running on a second clock to yield entropy words. In order to produce words with entropy, the system introduces a progressively increasing delay between each of the group of reads of the counter. The system generates entropy words by filling the buffer with successive reads of the least significant bit of the counter and then generates random data by applying a hash algorithm to the entropy words stored in the buffer.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: June 24, 2014
    Assignee: Apple Inc.
    Inventors: Joshua Phillips de Cesare, Michael John Smith
  • Patent number: 8681976
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: March 25, 2014
    Assignee: Apple Inc.
    Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
  • Publication number: 20140037200
    Abstract: Disclosed herein are representative embodiments of tools and techniques for setting color settings of an operating system using one or more photographs. According to one exemplary technique, a photograph is received, and one or more pixel weights for one or more pixels of the photograph are determined. Also, using at least one of the one or more pixel weights, at least one dominant color of the photograph is determined. Additionally, using the at least one dominant color, at least one color setting of an operating system is set.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 6, 2014
    Applicant: Microsoft Corporation
    Inventors: Joshua Phillips, Simon Baker
  • Publication number: 20130305187
    Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.
    Type: Application
    Filed: May 9, 2012
    Publication date: November 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
  • Publication number: 20120288089
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.
    Type: Application
    Filed: May 12, 2011
    Publication date: November 15, 2012
    Applicant: Apple Inc.
    Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
  • Publication number: 20120265795
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating random data at an early stage in a boot process. A system practicing the method performs, by a processor based on a first clock, a group of reads of a counter running on a second clock to yield entropy words. In order to produce words with entropy, the system introduces a progressively increasing delay between each of the group of reads of the counter. The system generates entropy words by filling the buffer with successive reads of the least significant bit of the counter and then generates random data by applying a hash algorithm to the entropy words stored in the buffer.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Applicant: Apple Inc.
    Inventors: Joshua Phillips de Cesare, Michael John Smith
  • Publication number: 20120254139
    Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.
    Type: Application
    Filed: June 15, 2012
    Publication date: October 4, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George
  • Patent number: 8224799
    Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: July 17, 2012
    Assignee: Microsoft Corporation
    Inventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George
  • Publication number: 20100318975
    Abstract: A method and/or computer program that incorporates isolation principles of separate address spaces and enforces the principles with a compiler and supporting runtime through a language-based model is disclosed. This approach significantly lowers the required overhead and retains the beneficial qualities of the scalable, isolated model. The model is implemented in a programming language where memory-based state is partitioned into a plurality of domains where the variables inside of a domain are isolated from external components. Agents are introduced inside of the domain and act on behalf of clients outside of the domain. The agents communicate with their clients via message-passing to enforce the isolation of the domain state. The domain-based isolation addresses the partitioning of memory-based state without the introduction of separate processes. Domains can also be used in conjunction with a distributed model either within a single computing device or between computing devices.
    Type: Application
    Filed: June 10, 2009
    Publication date: December 16, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Niklas Gustafsson, Artur Laksberg, Joshua Phillips
  • Publication number: 20100274937
    Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.
    Type: Application
    Filed: April 22, 2009
    Publication date: October 28, 2010
    Applicant: Microsoft Corporation
    Inventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George