Patents by Inventor Christopher Schoppa

Christopher Schoppa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060085086
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Application
    Filed: November 4, 2004
    Publication date: April 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
  • Publication number: 20060085639
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Application
    Filed: November 3, 2004
    Publication date: April 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
  • Publication number: 20060085527
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Application
    Filed: November 4, 2004
    Publication date: April 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
  • Publication number: 20050262302
    Abstract: Described is a mechanism for receiving new data at an auxiliary device associated with a main computer system, and processing that new data within the auxiliary device firmware to take some action. The receipt and processing of the data is independent of whether the main computer system is in a powered-up state (online) or powered-down state (offline). A cache that maintains the user application data for offline navigation may be updated with new data, either to change existing data in the cache or add a new navigation path. The received data can be processed to perform other actions, depending on the context of that data as determined by auxiliary processing.
    Type: Application
    Filed: May 3, 2004
    Publication date: November 24, 2005
    Applicant: Microsoft Corporation
    Inventors: Andrew Fuller, Matthew Rhoten, Christopher Schoppa, Curt Steeb, Juan Perez, Seiya Ohta, Niels van Dongen
  • Publication number: 20050243019
    Abstract: Described is a mechanism by which application programs (or plug-ins) and an auxiliary service adjust the output and/or data available for output on an auxiliary device based on changes detected in the current context of the auxiliary display. Context sensors detect and report changes in context, whereby some action is taken with respect to what information is displayed or can be displayed on the auxiliary display device. Examples of context data that can change include the physical location of the display, detected movement or motion data, presence of a particular user or others, power state, network connectivity status, privacy status and so forth. The auxiliary device can have context as to its position relative to the main display. Information sensitivity levels may be used to specify whether an application program's data can be displayed, based on the perceived sensitivity of the information and the user's current context.
    Type: Application
    Filed: May 3, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Andrew Fuller, Matthew Rhoten, Juan Perez, Christopher Schoppa, Curt Steeb, Niels Dongen
  • Publication number: 20050243021
    Abstract: Described is an architecture by which application programs can provide data to auxiliary display devices of essentially any type for display to a user. A defined application layer (e.g., accessed via interfaces) allows programs to provide data to a service that controls the output of data to an auxiliary display device, and returns navigational data to the application upon appropriate user interaction with the device via actuators. Enumeration allows applications to discover the capabilities of a device, while arbitration determines which application has input-output rights to the device. The architecture further provides a protocol layer including pluggable protocol proxies that allow various types of displays to serve as an auxiliary display. This platform-like model allows program developers the ability provide programs that leverage auxiliary displays when available, and provides display manufacturers the ability to provide displays with extensible capabilities.
    Type: Application
    Filed: May 3, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Juan Perez, Curt Steeb, Matthew Rhoten, Andrew Fuller, Christopher Schoppa, Adrian Chandley
  • Publication number: 20050246563
    Abstract: A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
    Type: Application
    Filed: April 28, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Adrian Chandley, Chad Magendanz, Christopher Schoppa, Dale Crosier, Jason Anderson, Juan Perez, Kenneth Stufflebeam, Pasquale DeMaio, Steven Kaneko, William Westerinen
  • Publication number: 20050182949
    Abstract: A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.
    Type: Application
    Filed: June 29, 2004
    Publication date: August 18, 2005
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen
  • Publication number: 20050182967
    Abstract: A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network.
    Type: Application
    Filed: June 29, 2004
    Publication date: August 18, 2005
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen