Patents by Inventor Anthony Schwartz
Anthony Schwartz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180136709Abstract: A computing device has an energy storage device system with one or more energy storage devices. The computing device can be connected to various different power resources (e.g., power sources and/or power profiles) to charge the energy storage device(s). Various different criteria are used to determine which one or more of the power resources to use at any given time to charge the energy storage device(s). The criteria can include physical characteristics of the computing device, characteristics of the energy storage devices and/or the computing device that change while the computing device operates, and estimated or predicted usage of the computing device. These criteria are evaluated during operation of the computing device, and the appropriate power resources to charge the energy storage device(s) at any given time based on these criteria are determined.Type: ApplicationFiled: November 16, 2016Publication date: May 17, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Aniruddha Jayant Jahagirdar, Ranveer Chandra, James Anthony Schwartz, JR., Paresh Maisuria, Matthew Holle, M. Nashaat Soliman, Aacer Hatem Daken
-
Publication number: 20180136704Abstract: A computing device has an energy storage device system with multiple energy storage devices. Various different criteria are used to determine which one or more of the multiple energy storage devices to discharge at any given time to provide power to the computing device. The criteria can include characteristics of the energy storage devices as well as hardware and/or physical characteristics of the computing device, characteristics of the energy storage devices and/or the computing device that change while the computing device operates, and predicted behavior or usage of the computing device. These criteria are evaluated during operation of the computing device, and the appropriate energy storage device(s) from which to draw power at any given time based on these criteria are determined.Type: ApplicationFiled: November 16, 2016Publication date: May 17, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Aniruddha Jayant Jahagirdar, Ranveer Chandra, Anirudh Badam, James Anthony Schwartz, JR., Paresh Maisuria, Matthew Holle, M. Nashaat Soliman, Murtuza S. Naguthanawala
-
Publication number: 20180136708Abstract: A computing device has an energy storage device system with multiple energy storage devices. Various different criteria are used to determine which one or more of the multiple energy storage devices to charge at any given time to provide power to the computing device. The criteria can include characteristics of the energy storage devices and/or the computing device that change while the computing device operates, and estimated or predicted usage of the computing device. These criteria are evaluated during operation of the computing device, and the appropriate energy storage device(s) to charge at any given time based on these criteria are determined.Type: ApplicationFiled: November 16, 2016Publication date: May 17, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Aniruddha Jayant Jahagirdar, Ranveer Chandra, Anirudh Badam, James Anthony Schwartz, JR., Paresh Maisuria, Matthew Holle, M. Nashaat Soliman, Tapan Ansel
-
Publication number: 20180095517Abstract: An operating system of a computing device determines an importance of the threads running on the computing device, such as assigning the importance of the threads as critical or non-critical. The operating system determines when there are no threads having at least a threshold importance (e.g., no critical threads), and forces one or more components of the computing device into a forced idle state in response to determining that there are no threads having at least the threshold importance. The forced idle state of a device component is a low power state, such as a state in which program instructions are not executed, so the computing device is forced into a forced idle state that reduces power usage in the computing device despite there being threads (e.g., non-critical threads) to be executed.Type: ApplicationFiled: October 3, 2016Publication date: April 5, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Abhishek Sagar, Paresh Maisuria, James Anthony Schwartz, JR., M. Nashaat Soliman
-
Patent number: 9489236Abstract: Among other things, one or more techniques and/or systems are provided for application prioritization. For example, an operating system of a computing device may contemporaneously host one or more applications, which may compete for computing resources, such as CPU cycles, I/O operations, memory access, and/or network bandwidth. Accordingly, an application (e.g., a background task or service) may be placed within a de-prioritized operating mode during launch and/or during execution, which may result in the application receiving a relatively lower priority when competing with applications placed within a standard operating mode for access to computing resources. In this way, an application placed within a standard operating mode (e.g.Type: GrantFiled: October 31, 2012Date of Patent: November 8, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Arun U. Kishan, Hari Pulapaka, James Anthony Schwartz, Jr., Alex Bendetov
-
Patent number: 9318884Abstract: This disclosure relates generally to removing wire insulation. In an embodiment, a system for heating and removal of wire insulation includes a power supply configured to receive input power and to provide a high frequency power output to an induction coil. The induction coil is to be coupled to the power supply and dimensioned to receive an insulated wire therethrough. The induction coil is also to produce a field based upon the high frequency power output to heat the wire by induction and to condition insulation disposed on an outer surface of the wire for removal.Type: GrantFiled: March 28, 2012Date of Patent: April 19, 2016Assignee: ILLINOIS TOOL WORKS INC.Inventors: Mark Andrew Ulrich, Michael Allen Sammons, Ryan Jerome Lindeman, Nicholas James Dessart, Brian Anthony Schwartz, Warren Edward Herwig
-
Publication number: 20140123151Abstract: Among other things, one or more techniques and/or systems are provided for application prioritization. For example, an operating system of a computing device may contemporaneously host one or more applications, which may compete for computing resources, such as CPU cycles, I/O operations, memory access, and/or network bandwidth. Accordingly, an application (e.g., a background task or service) may be placed within a de-prioritized operating mode during launch and/or during execution, which may result in the application receiving a relatively lower priority when competing with applications placed within a standard operating mode for access to computing resources. In this way, an application placed within a standard operating mode (e.g.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: Microsoft CorporationInventors: Arun U. Kishan, Hari Pulapaka, James Anthony Schwartz, JR., Alex Bendetov
-
Publication number: 20120248093Abstract: This disclosure relates generally to removing wire insulation. In an embodiment, a system for heating and removal of wire insulation includes a power supply configured to receive input power and to provide a high frequency power output to an induction coil. The induction coil is to be coupled to the power supply and dimensioned to receive an insulated wire therethrough. The induction coil is also to produce a field based upon the high frequency power output to heat the wire by induction and to condition insulation disposed on an outer surface of the wire for removal.Type: ApplicationFiled: March 28, 2012Publication date: October 4, 2012Applicant: ILLINOIS TOOL WORKS INC.Inventors: Mark Andrew Ulrich, Michael Allen Sammons, Ryan Jerome Lindeman, Nicholas James Dessart, Brian Anthony Schwartz, Warren Edward Herwig
-
Systems and methods for updating a secure boot process on a computer with a hardware security module
Patent number: 8028172Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: GrantFiled: January 14, 2005Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz -
Patent number: 7725703Abstract: In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated and the result can be placed in a PCR. The PCRs may then be compared. If they do not, access to the an important secret for system operation can be revoked. Also, a first secret may be accessible only when a first plurality of PCR values are extant, while a second secret is accessible only after one or more of the first plurality of PCR values has been replaced with a new value, thereby necessarily revoking further access to the first secret in order to grant access to the second secret.Type: GrantFiled: January 7, 2005Date of Patent: May 25, 2010Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D Ray, Jonathan Schwartz
-
Publication number: 20100004304Abstract: It is now recognized that chronic inflammation is an important risk factor for the development of cancer. The proinflammatory cytokine IL-6 is implicated in cancer because it is important for the activation of STAT, a key regulator of cancer growth, survival, metastasis, immune evasion and angiogenesis. Increased IL-6 and Stat-3 exists in vitro in pancreatic cancer, malignant melanoma, papillary thyroid cancer, breast cancer, colon cancer, and prostate cancer cells with high basal expression of Toll-like receptor 3 (TLR3) and Wnt5a. IL6/STAT3 activation, mediated by overexpressed TLR3 signaling, appears important in the tumor growth process, it may increase Wnt5a signaling, and be associated with increased cellular growth and migration.Type: ApplicationFiled: October 1, 2008Publication date: January 7, 2010Inventors: Leonard D. Kohn, Douglas J. Goetz, Kelly D. McCall, Anthony Schwartz, Frank Schwartz, Ramiro Malgor, Glorglo Napolitano, Cesidio Giullant
-
Patent number: 7565553Abstract: Systems and methods for controlling access to data on a computer with a secure boot process can provide a highly efficient mechanism for preventing future access to encrypted digital resources. This may be advantageous in a range of scenarios, for example where a computer is sold and assurance is desired that no stray private data remains on the hard disk. Data resources, for example all data associated with one or more particular hard disk partitions, may be encrypted. The decryption key may be available through a secure boot process. By erasing, altering, or otherwise disabling a secret, such as a decryption key or a process that obtains a decryption key, the data formerly accessible using such secret becomes inaccessible.Type: GrantFiled: January 14, 2005Date of Patent: July 21, 2009Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
-
Patent number: 7506380Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: GrantFiled: January 14, 2005Date of Patent: March 17, 2009Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
-
Patent number: 5726158Abstract: The invention concerns pharmaceutically useful trifluoromethyl ketone substituted di-, tri- and tetra-peptide derivatives of the formulae Ia, Ib, Ic set out hereinafter, and salts thereof, which are inhibitors of human leukocyte elastase. Also described herein are pharmaceutical compositions containing a peptide derivative and processes and intermediates for use in the manufacture of the peptide derivatives.Type: GrantFiled: June 6, 1995Date of Patent: March 10, 1998Assignee: Zeneca Inc.Inventors: Philip Duke Edwards, John Anthony Schwartz, Mark Morris Stein, Diane Amy Trainor, Richard Alan Wildonger