Patents by Inventor Joshua Phillips
Joshua Phillips has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160289355Abstract: A method for preparing a functionalized polymer, the method comprising the steps of (i) preparing a halocarbon-activated nitrogen heterocycle containing a functional group, (ii) preparing a reactive polymer, and (iii) reacting the reactive polymer with the halocarbon-activated nitrogen heterocycle containing a functional group.Type: ApplicationFiled: April 1, 2016Publication date: October 6, 2016Inventors: Joshua Phillip ABELL, Steven LUO
-
Publication number: 20160289354Abstract: A method for preparing a functionalized polymer, the method comprising the steps of (i) preparing a halosilane-activated nitrogen heterocycle containing a functional group, (ii) preparing a reactive polymer, and (iii) reacting the reactive polymer with the halosilane-activated nitrogen heterocycle containing a functional group.Type: ApplicationFiled: April 1, 2016Publication date: October 6, 2016Inventors: Joshua Phillip ABELL, Steven LUO
-
Publication number: 20160162164Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.Type: ApplicationFiled: December 28, 2015Publication date: June 9, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
-
Publication number: 20160077987Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred WI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.Type: ApplicationFiled: September 28, 2015Publication date: March 17, 2016Inventors: Derek R. Kumar, Joshua Phillips de Cesare
-
Patent number: 9256349Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.Type: GrantFiled: May 9, 2012Date of Patent: February 9, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
-
Patent number: 9208113Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred IPI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.Type: GrantFiled: January 15, 2013Date of Patent: December 8, 2015Assignee: Apple Inc.Inventors: Derek R. Kumar, Joshua Phillips de Cesare
-
Publication number: 20150336254Abstract: A framing hammer including an automatic feeding magazine supported within the hammerhead by guide rails with a self-loading magazine. Through the center of the upper portion of the hammer handle lies the self-loading reciprocating magazine. The top end of the magazine actuates due to the force of the impact of the tool through its natural operation. The magazine is inclined at 21° relative to the handle and is spaced in the center of the handle from the rear of the nail driving face. Structure is provided for individually driving a nail from a magazine contained row of commercially available 21° collated nails toward the rearward facing end of the hammerhead. Upon impact the tool dispenses and sets a nail up to a 1½? into the work surface, upon disengagement the tool reciprocates to resets to its resting position whereupon the tool is ready to repeat the action.Type: ApplicationFiled: May 26, 2014Publication date: November 26, 2015Inventors: Jeremy Charles Stetson, Joshua Phillip May
-
Patent number: 8897552Abstract: Disclosed herein are representative embodiments of tools and techniques for setting color settings of an operating system using one or more photographs. According to one exemplary technique, a photograph is received, and one or more pixel weights for one or more pixels of the photograph are determined. Also, using at least one of the one or more pixel weights, at least one dominant color of the photograph is determined. Additionally, using the at least one dominant color, at least one color setting of an operating system is set.Type: GrantFiled: August 1, 2012Date of Patent: November 25, 2014Assignee: Microsoft CorporationInventors: Joshua Phillips, Simon Baker
-
Publication number: 20140201411Abstract: A data processing system includes, in one embodiment, at least a first processor and a second processor and an interrupt controller, and the system provides a deferred inter-processor interrupt (IPI) that can be used to wake up the second processor from a low power sleep state. The deferred IPI is, in one embodiment, delayed by a timer in the interrupt controller, and the deferred IPI can be cancelled by the first processor if the first processor becomes available to execute a thread that was made runnable by an interrupt which triggered the deferred IPI.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: Apple Inc.Inventors: Derek R. Kumar, Joshua Phillips de Cesare
-
Patent number: 8762439Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating random data at an early stage in a boot process. A system practicing the method performs, by a processor based on a first clock, a group of reads of a counter running on a second clock to yield entropy words. In order to produce words with entropy, the system introduces a progressively increasing delay between each of the group of reads of the counter. The system generates entropy words by filling the buffer with successive reads of the least significant bit of the counter and then generates random data by applying a hash algorithm to the entropy words stored in the buffer.Type: GrantFiled: April 14, 2011Date of Patent: June 24, 2014Assignee: Apple Inc.Inventors: Joshua Phillips de Cesare, Michael John Smith
-
Patent number: 8681976Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.Type: GrantFiled: May 12, 2011Date of Patent: March 25, 2014Assignee: Apple Inc.Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
-
Publication number: 20140037200Abstract: Disclosed herein are representative embodiments of tools and techniques for setting color settings of an operating system using one or more photographs. According to one exemplary technique, a photograph is received, and one or more pixel weights for one or more pixels of the photograph are determined. Also, using at least one of the one or more pixel weights, at least one dominant color of the photograph is determined. Additionally, using the at least one dominant color, at least one color setting of an operating system is set.Type: ApplicationFiled: August 1, 2012Publication date: February 6, 2014Applicant: Microsoft CorporationInventors: Joshua Phillips, Simon Baker
-
Publication number: 20130305187Abstract: Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with the icon itself. A user interaction with an icon can cause an icon resizing mode to be entered. Additional user interaction with the icon can then cause the icon to be resized. The display in which an icon is located can be rearranged as a result of the icon being resized.Type: ApplicationFiled: May 9, 2012Publication date: November 14, 2013Applicant: Microsoft CorporationInventors: Joshua Phillips, Christopher A. Glein, Rhon Manlapaz
-
Publication number: 20120288089Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.Type: ApplicationFiled: May 12, 2011Publication date: November 15, 2012Applicant: Apple Inc.Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
-
Publication number: 20120265795Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating random data at an early stage in a boot process. A system practicing the method performs, by a processor based on a first clock, a group of reads of a counter running on a second clock to yield entropy words. In order to produce words with entropy, the system introduces a progressively increasing delay between each of the group of reads of the counter. The system generates entropy words by filling the buffer with successive reads of the least significant bit of the counter and then generates random data by applying a hash algorithm to the entropy words stored in the buffer.Type: ApplicationFiled: April 14, 2011Publication date: October 18, 2012Applicant: Apple Inc.Inventors: Joshua Phillips de Cesare, Michael John Smith
-
Publication number: 20120254139Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.Type: ApplicationFiled: June 15, 2012Publication date: October 4, 2012Applicant: MICROSOFT CORPORATIONInventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George
-
Patent number: 8224799Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.Type: GrantFiled: April 22, 2009Date of Patent: July 17, 2012Assignee: Microsoft CorporationInventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George
-
Publication number: 20100318975Abstract: A method and/or computer program that incorporates isolation principles of separate address spaces and enforces the principles with a compiler and supporting runtime through a language-based model is disclosed. This approach significantly lowers the required overhead and retains the beneficial qualities of the scalable, isolated model. The model is implemented in a programming language where memory-based state is partitioned into a plurality of domains where the variables inside of a domain are isolated from external components. Agents are introduced inside of the domain and act on behalf of clients outside of the domain. The agents communicate with their clients via message-passing to enforce the isolation of the domain state. The domain-based isolation addresses the partitioning of memory-based state without the introduction of separate processes. Domains can also be used in conjunction with a distributed model either within a single computing device or between computing devices.Type: ApplicationFiled: June 10, 2009Publication date: December 16, 2010Applicant: MICROSOFT CORPORATIONInventors: Niklas Gustafsson, Artur Laksberg, Joshua Phillips
-
Publication number: 20100274937Abstract: A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.Type: ApplicationFiled: April 22, 2009Publication date: October 28, 2010Applicant: Microsoft CorporationInventors: Chunyan Song, Joshua Phillips, John Duffy, Tim Harris, Stephen H. Toub, Boby George