Patents by Inventor Clifton Scott

Clifton Scott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9641987
    Abstract: To ensure that multicasts from access points sent in response to periodic beacons reach a variety of listening clients that may have longer sleep intervals than an interval between beacons, this disclosure describes systems, methods, and apparatus for multicasting bursts of frames where a burst number is selected so as to be equal to or greater than a range of common sleep intervals. Further, where multicast frames are re-multicast according to known protocols, the repeated bursts can be offset from the re-multicast start time suggested by the protocol, in order to increase a likelihood that clients with especially long sleep intervals receive the multicast frame.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: May 2, 2017
    Assignee: Qualcomm Connected Experiences, Inc.
    Inventors: Ashutosh Aggarwal, Matthew Daniel Smith, Aaron Michael Pulliam, Clifton Scott
  • Publication number: 20150341758
    Abstract: To ensure that multicasts from access points sent in response to periodic beacons reach a variety of listening clients that may have longer sleep intervals than an interval between beacons, this disclosure describes systems, methods, and apparatus for multicasting bursts of frames where a burst number is selected so as to be equal to or greater than a range of common sleep intervals. Further, where multicast frames are re-multicast according to known protocols, the repeated bursts can be offset from the re-multicast start time suggested by the protocol, in order to increase a likelihood that clients with especially long sleep intervals receive the multicast frame.
    Type: Application
    Filed: April 28, 2015
    Publication date: November 26, 2015
    Inventors: Ashutosh Aggarwal, Matthew Daniel Smith, Aaron Michael Pulliam, Clifton Scott
  • Patent number: 8213971
    Abstract: A method and system for remote activation of computer based applications uses Simple Message Service (SMS) messages to inform a remote computer that an application should be activated. The SMS message may be sent by a cell phone or from a computer. The remote computer receives the SMS message, parses the message to determine the application to be started, and starts the indicated application. If the remote computer is turned off, the SMS message can be received by an SMS receiver within a modem which can be configured to start the computer so the application can be activated.
    Type: Grant
    Filed: April 27, 2009
    Date of Patent: July 3, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Scott A. Papineau, Stephen A. Sprigg, Clifton Scott, James R. Pyers, Mahesh Moorthy, Theodore C. Walker
  • Publication number: 20100273450
    Abstract: A method and system for remote activation of computer based applications uses Simple Message Service (SMS) messages to inform a remote computer that an application should be activated. The SMS message may be sent by a cell phone or from a computer. The remote computer receives the SMS message, parses the message to determine the application to be started, and starts the indicated application. If the remote computer is turned off, the SMS message can be received by an SMS receiver within a modem which can be configured to start the computer so the application can be activated.
    Type: Application
    Filed: April 27, 2009
    Publication date: October 28, 2010
    Inventors: Scott A. Papineau, Stephen A. Sprigg, Clifton Scott, James R. Pyers, Mahesh Moorthy, Theodore C. Walker
  • Publication number: 20090312062
    Abstract: Systems and methods provide an attention grabbing display when the function mapped to a soft key and the associated soft key label has changed. Animation is used to draw a user's attention to the soft key label change, thereby alerting the user to the changed function mapped to the soft keys.
    Type: Application
    Filed: June 16, 2008
    Publication date: December 17, 2009
    Inventors: Samuel Jacob HORODEZKY, Clifton SCOTT, Kam-Cheong Anthony TSOI
  • Publication number: 20060293029
    Abstract: Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
    Type: Application
    Filed: May 19, 2006
    Publication date: December 28, 2006
    Inventors: Sanjay Jha, Behrooz Abdi, Clifton Scott, Kenny Fok, Eric Chung Yip, Tia Cassett
  • Publication number: 20060278694
    Abstract: Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
    Type: Application
    Filed: May 15, 2006
    Publication date: December 14, 2006
    Inventors: Sanjay Jha, Behrooz Abdi, Clifton Scott, Kenny Fok, Tia Cassett, Jihyun Hwang
  • Publication number: 20060280150
    Abstract: Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
    Type: Application
    Filed: December 15, 2005
    Publication date: December 14, 2006
    Inventors: Sanjay Jha, Behrooz Abdi, Clifton Scott, Kenny Fok, Tia Cassett, Jihyun Hwang
  • Publication number: 20050108467
    Abstract: The disclosed embodiments provide for a system and method for storing data in a flash memory device that has a code bank and a data bank. The method includes writing data to the data bank under control of a flash driver in the code bank when sufficient space is expected to exist in the data bank. Otherwise, the method includes writing data to the code bank under control of a flash driver in a storage device that is external to the flash memory device.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Inventors: Clifton Scott, John Gatti, Laxmi Rayapudi