Patents by Inventor Adrian Chandley

Adrian Chandley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060101459
    Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
    Type: Application
    Filed: November 30, 2004
    Publication date: May 11, 2006
    Applicant: Microsoft Corporation
    Inventors: Dale Crosier, Aditha Adams, Taryn Beck, Adrian Chandley, Pasquale DeMaio, Steven Kaneko, Carl Ledbetter, Scott Manchester, Benjamin Nick, Thomas Phillips, William Westerinen
  • Publication number: 20060101293
    Abstract: Described is a method and system for power management of mobile computer displays, in which areas of the screen are selectively controlled to consume less power than other areas. For example, a foreground window having focus may receive normal brightness, while background areas are dimmed. To this end, the pixels of selected areas are controlled to vary color depth, resolution, refresh rate, brightness and/or the on/off state for any part of the display. Power settings for parts of the display not corresponding to a focused window can be gradually reduced over time. Power policy may determine which areas are given reduced power, and external mechanisms provide information useful in the determination, such as when the user last interacted with a window, where the mouse is hovering, explicit user instructions as to how to power manage a window, and sensors that detect where the user is likely to want more power.
    Type: Application
    Filed: November 10, 2004
    Publication date: May 11, 2006
    Applicant: Microsoft Corporation
    Inventors: Adrian Chandley, Christopher Schoppa, Clark Nicholson
  • Publication number: 20060082817
    Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
    Type: Application
    Filed: November 30, 2004
    Publication date: April 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Dale Crosier, Aditha Adams, Taryn Beck, Adrian Chandley, Pasquale DeMaio, Steven Kaneko, Carl Ledbetter, Scott Manchester, Benjamin Nick, Thomas Phillips, William Westerinen
  • Publication number: 20060041937
    Abstract: A system and method for enabling a network device to resume network activities in a secure manner on a communication network when network activities are generally blocked by protective security measures implemented by network security modules is presented. During its periodic update request, a network security module blocking the network activities of the network device requests updated security measures from an administrator-configurable security service. The security service determines whether the network security module/network device may receive a relaxed set of security measures that, when implemented by the network security module, enable the network device to resume some network activities. If the security service determines that the network security module/network device may receive a relaxed set of security measures, the relaxed set of security measures are returned to and implemented on the network security module, thereby enabling the network device to resume some network activities.
    Type: Application
    Filed: August 20, 2004
    Publication date: February 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Adrian Chandley, Thomas Phillips, William Westerinen
  • Publication number: 20060031201
    Abstract: A secure memory device and method for obtaining and securely storing information relating to a life moment is disclosed. In the method, a parameter is received and inputted in a search heuristic. A search is made for the information according to the search heuristic and, upon finding the information, metadata is appended to the information. The information and metadata is then stored in a secure memory location. The secure memory location has a housing fabricated to withstand a predetermined stress, a detachable connection to a computer and a memory that stores the information and protects it from unauthorized deletion. In some embodiments, the stored information may be selectively deleted in a safe and controlled manner.
    Type: Application
    Filed: August 6, 2004
    Publication date: February 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Aditha Adams, Adrian Chandley, Carl Ledbetter, Dale Crosier, Pasquale DeMaio, Steven Kaneko, Taryn Beck
  • Publication number: 20060007051
    Abstract: A method and system for auxiliary display of information for a computing device. An auxiliary display is integrated with a computing system to provide an area where notifications can be peripherally presented off-screen. Whenever a background task sends a notification to the main display of the system, the notification may be redirected to appear instead on the auxiliary display. A user may then glance at the notification appearing on the auxiliary display to be informed of the message without interruption from the current task onscreen. Any type of information may be presented on the auxiliary display including incoming communications, meeting reminders, system alerts, and information from Internet subscription services. The auxiliary display may be placed on the central processor chassis or on the monitor border along with LED indicator lights to provide simple peripheral-vision notification. By pressing a button, a user may obtain additional detailed follow-up information.
    Type: Application
    Filed: May 5, 2003
    Publication date: January 12, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Eric Bear, Chad Magendanz, Aditha Adams, Carl Ledbetter, Steve Kaneko, Chris Schoppa, Adrian Chandley, William Westerinen, Dale Crosier, Robert Plank
  • Publication number: 20050243021
    Abstract: Described is an architecture by which application programs can provide data to auxiliary display devices of essentially any type for display to a user. A defined application layer (e.g., accessed via interfaces) allows programs to provide data to a service that controls the output of data to an auxiliary display device, and returns navigational data to the application upon appropriate user interaction with the device via actuators. Enumeration allows applications to discover the capabilities of a device, while arbitration determines which application has input-output rights to the device. The architecture further provides a protocol layer including pluggable protocol proxies that allow various types of displays to serve as an auxiliary display. This platform-like model allows program developers the ability provide programs that leverage auxiliary displays when available, and provides display manufacturers the ability to provide displays with extensible capabilities.
    Type: Application
    Filed: May 3, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Juan Perez, Curt Steeb, Matthew Rhoten, Andrew Fuller, Christopher Schoppa, Adrian Chandley
  • Publication number: 20050246563
    Abstract: A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
    Type: Application
    Filed: April 28, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Adrian Chandley, Chad Magendanz, Christopher Schoppa, Dale Crosier, Jason Anderson, Juan Perez, Kenneth Stufflebeam, Pasquale DeMaio, Steven Kaneko, William Westerinen
  • Publication number: 20050237270
    Abstract: A method for modifying the operation of a device responsive to the detection of a remote device is provided. In the method, the remote device is detected, and communications with the remote device are established responsive to the detection of the remote device. A determination is made as to whether a feature of the device is affected by the establishment of communications with the remote device, and an action with respect to the feature of the device is initiated.
    Type: Application
    Filed: April 23, 2004
    Publication date: October 27, 2005
    Applicant: Microsoft Corporation
    Inventors: Aditha Adams, Adrian Chandley, Carl Ledbetter, Dale Crosier, Justin Maguire, Pasquale DeMaio, Taryn Beck
  • Publication number: 20050182949
    Abstract: A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.
    Type: Application
    Filed: June 29, 2004
    Publication date: August 18, 2005
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen
  • Publication number: 20050182986
    Abstract: Systems and methods for reducing the size of a power supply in a computing device by monitoring activities to maintain the load on the power supply below a predetermined threshold. Through a set of software drivers, various components are placed into low power states in order to reduce the load on the power supply. The methods allow manufacturers to utilize smaller power supplies that are better fitted for the actual operating conditions of the computing device, rather than a large power supply designed for worst case conditions.
    Type: Application
    Filed: February 13, 2004
    Publication date: August 18, 2005
    Inventors: Jason Anderson, Adrian Chandley
  • Publication number: 20050182967
    Abstract: A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network.
    Type: Application
    Filed: June 29, 2004
    Publication date: August 18, 2005
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen
  • Publication number: 20050073389
    Abstract: Systems and methods for remotely shutting down or preventing operation of device via a wireless network infrastructure are provided. The device may be disabled using a defined command the device receives on a wide area network, such as a SPOT network or wireless carrier network. In various embodiments, the device responds to pre-defined command(s) and operation is disabled locally. Override codes may be used to locally re-enable the device. In a “keep alive” embodiment, the device operates as long as it continues to receive “keep alive” messages from the intended environment.
    Type: Application
    Filed: October 1, 2003
    Publication date: April 7, 2005
    Inventor: Adrian Chandley
  • Publication number: 20050013103
    Abstract: An multipurpose docking apparatus for mobile or other computers for operation both with and without an installable mobile computer is presented. The multipurpose docking station includes a port for insertion of a handheld or other mobile computer or computer code. Without the mobile computer installed, the multipurpose docking apparatus is functional as a remote display or terminal for a personal computer. When the mobile computer is installed into the installation port, the combination is functional as a fully accessible computing system with the ability to communicate with other computers, peripherals and network interfaces.
    Type: Application
    Filed: July 17, 2003
    Publication date: January 20, 2005
    Inventor: Adrian Chandley
  • Publication number: 20050003761
    Abstract: A communications device, such as a cellphone, functions as a peripheral for a processor, such as a laptop computer. The cellphone and the laptop are directly coupled via a communications link that is not the cellular network. Audio, still images, video data, and/or user interaction options are provided to the cellphone by the laptop via the communications link. The audio data is rendered by the cellphone via the cellphone's speakers or by a headset. The still image or video data is rendered by a display on the cellphone. User interaction prompts are rendered by a display, audio, or tactile feedback on the cellphone. The user input/responses are made through the keypad or other input method (e.g. wheel) and are provided back to the processor. The communications link is a Bluetooth compatible link. Utilizing the cellphone to render video data preserves the life of the batteries in the laptop.
    Type: Application
    Filed: July 1, 2003
    Publication date: January 6, 2005
    Inventor: Adrian Chandley
  • Publication number: 20040225892
    Abstract: A system and method for improved activation of a personal computer and/or other processing devices is provided. Power and security states are combined and further reduced to three activation states which may be operated by a single secure device. The system may include any number of activation states for operating the computer using only the single secure device. The secure access device handles both security and power management by authenticating physical access to the computer and the identity of the user. For this purpose, a device containing a biometric reader may be integrated with a smart card and the biometric identification used as an authentication code to secure the smartcard. The secure access device may be inserted into a locking mechanism used by the user to transition between activation states.
    Type: Application
    Filed: May 5, 2003
    Publication date: November 11, 2004
    Inventors: Eric Gould Bear, Chad Magendanz, Aditha May Adams, Carl Ledbetter, Steve Kaneko, Chris Schoppa, Adrian Chandley, William J. Westerinen
  • Publication number: 20040225901
    Abstract: A method and system for auxiliary processing of information for a computing device. By simplifying the user managed power states to On and Standby, the computing device preserves its execution context by default when the machine is powered down. As a result, the computing device is made available for use even when it appears to be powered down. The computer hardware and software is capable of responding immediately to network or communication activity, user input, and other events. While the computer is in Standby, it is alert and able to handle background tasks that do not require user interaction. Activities such as answering phone calls, handling voice mail, displaying new e-mail, record voice messages, browsing the Internet, recording TV shows and so forth occur without the user having to turn on the computer.
    Type: Application
    Filed: May 5, 2003
    Publication date: November 11, 2004
    Inventors: Eric Gould Bear, Chad Magendanz, Aditha May Adams, Carl Ledbetter, Steve Kaneko, Chris Schoppa, Adrian Chandley, William J. Westerinen