Patents by Inventor Jonathan M. Zweig
Jonathan M. Zweig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190147143Abstract: Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and methods provide an encrypted copy of a digital content unit to a first user and transcript the encrypted copy to generate the legitimate copy to a second user. The encrypted copy is encrypted with a first encrypt key that may be associated with the first user and the legitimate copy is encrypted with a second encrypt key that may be associated with the second user.Type: ApplicationFiled: October 11, 2018Publication date: May 16, 2019Inventors: Jonathan M. Zweig, James H. Woodyatt
-
Patent number: 10102351Abstract: Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and methods provide an encrypted copy of a digital content unit to a first user and transcript the encrypted copy to generate the legitimate copy to a second user. The encrypted copy is encrypted with a first encrypt key that may be associated with the first user and the legitimate copy is encrypted with a second encrypt key that may be associated with the second user.Type: GrantFiled: October 18, 2006Date of Patent: October 16, 2018Assignee: APPLE INC.Inventors: Jonathan M. Zweig, James H. Woodyatt
-
Publication number: 20170054257Abstract: Methods, systems, and apparatus for selectively communicating data and audio over a limited-size audio plug. A host device determines whether an audio accessory or a data communicating accessory is plugged therein via a signal, or lack thereof, communicated to the host device via the audio plug of the accessory. The host device then either communicates audio or data over the audio plug contacts that are typically used only for audio communication based on whether its connected to an audio accessory or data communicating accessory. An audio plug may also include a split-ring contact where multiple, independent contacts are formed in place of a single tip, ring, or sleeve contact. The split-ring contact may be used for communicating audio and/or data.Type: ApplicationFiled: August 31, 2016Publication date: February 23, 2017Applicant: APPLE INC.Inventors: Cesar Lozano Villarreal, Ruenjou Lu, Mahmoud R. Amini, Jonathan M. Zweig, David C. Breece, III
-
Patent number: 9436761Abstract: Methods, systems, and apparatus for selectively communicating data and audio over a limited-size audio plug. A host device determines whether an audio accessory or a data communicating accessory is plugged therein via a signal, or lack thereof, communicated to the host device via the audio plug of the accessory. The host device then either communicates audio or data over the audio plug contacts that are typically used only for audio communication based on whether its connected to an audio accessory or data communicating accessory. An audio plug may also include a split-ring contact where multiple, independent contacts are formed in place of a single tip, ring, or sleeve contact. The split-ring contact may be used for communicating audio and/or data.Type: GrantFiled: March 15, 2013Date of Patent: September 6, 2016Assignee: Apple Inc.Inventors: Cesar Lozano Villarreal, Ruenjou Lu, Mahmoud R. Amini, Jonathan M. Zweig, David C. Breece, III
-
Patent number: 8934624Abstract: Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and methods provide an encrypted copy of a digital content unit to a first user and transcript the encrypted copy to generate the legitimate copy to a second user. The encrypted copy is encrypted with a first encrypt key that may be associated with the first user and the legitimate copy is encrypted with a second encrypt key that may be associated with the second user.Type: GrantFiled: December 27, 2011Date of Patent: January 13, 2015Assignee: Apple Inc.Inventors: Jonathan M. Zweig, James H. Woodyatt
-
Publication number: 20140277643Abstract: Methods, systems, and apparatus for selectively communicating data and audio over a limited-size audio plug. A host device determines whether an audio accessory or a data communicating accessory is plugged therein via a signal, or lack thereof, communicated to the host device via the audio plug of the accessory. The host device then either communicates audio or data over the audio plug contacts that are typically used only for audio communication based on whether its connected to an audio accessory or data communicating accessory. An audio plug may also include a split-ring contact where multiple, independent contacts are formed in place of a single tip, ring, or sleeve contact. The split-ring contact may be used for communicating audio and/or data.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Apple Inc.Inventors: Cesar Lozano Villarreal, Ruenjou Lu, Mahmoud R. Amini, Jonathan M. Zweig, David C. Breece, III
-
Publication number: 20120275592Abstract: Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and methods provide an encrypted copy of a digital content unit to a first user and transcript the encrypted copy to generate the legitimate copy to a second user. The encrypted copy is encrypted with a first encrypt key that may be associated with the first user and the legitimate copy is encrypted with a second encrypt key that may be associated with the second user.Type: ApplicationFiled: December 27, 2011Publication date: November 1, 2012Applicant: Apple Inc.Inventors: Jonathan M. Zweig, James H. Woodyatt
-
Patent number: 8086535Abstract: Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and methods provide an encrypted copy of a digital content unit to a first user and transcript the encrypted copy to generate the legitimate copy to a second user. The encrypted copy is encrypted with a first encrypt key that may be associated with the first user and the legitimate copy is encrypted with a second encrypt key that may be associated with the second user.Type: GrantFiled: April 4, 2006Date of Patent: December 27, 2011Assignee: Apple Inc.Inventors: Jonathan M. Zweig, James H. Woodyatt
-
Patent number: 7366103Abstract: A communication protocol that provides load balancing and/or test pattern information between devices is described. A first embodiment of the protocol provides such information via a data frame that is transmitted a definitive time after a special DTIM beacon is transmitted. This protocol provides full compliance with IEEE 802.11. The second embodiment of the protocol modifies the 802.11 beacon data structure with additional information elements.Type: GrantFiled: December 28, 2000Date of Patent: April 29, 2008Assignee: Nortel Networks LimitedInventors: Darwin A. Engwer, Jonathan M. Zweig
-
Patent number: 7339892Abstract: In a wireless network system having a wired backbone network, one or more access points (APs), and one or more wireless units (WUs), a technique wherein an AP automatically determines a factor indicative of the error(s) occurring in the transmissions of one or more data packets to associated WUs, and automatically adjust the fragmentation threshold in accordance with the transmission error factor. The AP adjusts the fragmentation threshold in a manner that the data throughput is increased. Since the AP automatically and periodically gauges the wireless medium for RF interference that can cause data transmission errors, the fragmentation threshold can be dynamically adjusted to respond to changes in the wireless medium, such as when a microwave oven is turned on, and/or when a Blue Tooth device is traversing the wireless medium, etc. This is much more effective than having a system administrator periodically gauge the wireless medium for the purpose of selecting the appropriate fragmentation threshold.Type: GrantFiled: December 28, 2000Date of Patent: March 4, 2008Assignee: Nortel Networks LimitedInventors: Darwin A. Engwer, Jonathan M. Zweig
-
Patent number: 7308279Abstract: Briefly, in one embodiment, a method for enhancing aggregate data throughput for a number of wireless devices. First, a signal having a first level of effective isotropic radiated power is transmitted by a first wireless electronic device. In the event that a response to the signal is received by the first wireless electronic device, the level of effective isotropic radiated power is reduced to a second level of effective isotropic radiated power. In another embodiment, the aggregate amount of data throughput may be enhanced by monitoring a level of effective isotropic radiated power associated with at least one beacon produced by the first wireless electronic device on a first communication channel. The level of effective isotropic radiated power of the beacon is then reduced if the monitored level is greater than a predetermined power level threshold.Type: GrantFiled: December 28, 2000Date of Patent: December 11, 2007Assignee: Nortel Networks LimitedInventor: Jonathan M. Zweig
-
Patent number: 7280495Abstract: A protocol for acknowledging receipt of a multicast or broadcast frame by a wireless unit is described. One embodiment, an Eavesdrop Unicast frame is created for use in a wireless network operated in accordance with IEEE 802.11. The Eavesdrop Unicast frame allows the targeted wireless unit to transmit acknowledgement (ACK) frame but is configured so that other wireless units can scan and obtain information therefrom. Another embodiment is similar in configuration to the Eavesdrop Unicast frame but is fully compliant with IEEE 802.11. Therein, a multicast or broadcast frame is transmitted but one wireless unit is configured to acknowledge receipt of the multicast or broadcast frame. The acknowledgement is accomplished through transmission of a data frame. Yet another embodiment is the transmission of broadcast or multicast frames into corresponding unicast frames.Type: GrantFiled: December 28, 2000Date of Patent: October 9, 2007Assignee: Nortel Networks LimitedInventors: Jonathan M. Zweig, Darwin A. Engwer
-
Patent number: 7154854Abstract: In a wireless network system comprising a wired backbone network, an access point, and one or more associated wireless unit data coupled to the access point by way of a wireless transmission medium, a method of enabling fragmentation of data packet above a fragmentation threshold in one or more wireless units, comprising transmitting a message to the one or more wireless unit having a first control data that causes the one or more wireless units to implement fragmentation threshold in transmitting data packets to the access point. The message is preferably a multicast data packet intended for the one or more associated wireless units. The message may further include a specified fragmentation to be used, and also another control signal for enabling request to send (RTS) and clear to send (CTS) transmission by the one or more wireless units.Type: GrantFiled: December 28, 2000Date of Patent: December 26, 2006Assignee: Nortel Networks LimitedInventors: Jonathan M. Zweig, Darwin A. Engwer
-
Patent number: 7082114Abstract: In a wireless network system having a wired backbone network with two or more sub-networks, each having one or more access points for communicating with wireless units via a wireless transmission medium, a system, apparatus and method for a wireless unit to determine whether a candidate access point is on a different sub-network than its current access point. If the wireless unit determines that the candidate access point is on a different sub-network, then the wireless unit releases its current network protocol address which was valid for the current sub-network, and obtains a new network protocol address valid for the new sub-network. This is accomplished by the candidate access point transmitting a multicast packet that includes the network protocol address of the access point and the subnet mask of the sub-network which the access point is on. By receiving this multicast packet, the wireless unit can determine if the candidate access point is on a different sub-network than its current sub-network.Type: GrantFiled: December 28, 2000Date of Patent: July 25, 2006Assignee: Nortel Networks LimitedInventors: Darwin A. Engwer, Jonathan M. Zweig, Paul McDaid
-
Patent number: 7049937Abstract: Apparatus for use with a cable for interconnecting electronic devices is described. The apparatus includes an indicator for identifying a characteristic of the cable, and includes a mechanism operable to cause the indicator to identify the characteristic of the cable. The indicator can be for example an LED and can be used to identify the location of an end of the cable. The mechanism can be a pushbutton located at the other end of the cable. The LED is illuminated when the pushbutton is activated. A signal generator is responsive to the pushbutton and provides a signal to the LED to cause the LED to illuminate. The signal generator can be implemented with a DMTF encoder.Type: GrantFiled: June 11, 2002Date of Patent: May 23, 2006Assignee: Nortel Networks LimitedInventors: Jonathan M. Zweig, Joseph M. Allem
-
Patent number: 7039190Abstract: In one embodiment, an authentication method features the generation of an initialization vector at a first electronic device and the determination at the first electronic device whether the initialization vector falls within a first group of initialization vectors. The first group includes a plurality of initialization vectors solely used in connection with an authentication sequence. Information is encrypted using in part the initialization vector for return to a second electronic device if the initialization vector falls within the first group.Type: GrantFiled: December 28, 2000Date of Patent: May 2, 2006Assignee: Nortel Networks LimitedInventors: Darwin A. Engwer, Jonathan M. Zweig
-
Publication number: 20030193895Abstract: A communication protocol that provides load balancing and/or test pattern information between devices is described. A first embodiment of the protocol provides such information via a data frame that is transmitted a definitive time after a special DTIM beacon is transmitted. This protocol provides full compliance with IEEE 802.11. The second embodiment of the protocol modifies the 802.11 beacon data structure with additional information elements.Type: ApplicationFiled: December 28, 2000Publication date: October 16, 2003Inventors: Darwin A. Engwer, Jonathan M. Zweig
-
Patent number: 5987062Abstract: A wireless local area network allows roaming of a mobile unit to allow it to serially associate with a number of access points of the network fixed backbone. This roaming is supported by an improved measurement of communications link quality, which includes calculating a mean error free length of a test pattern broadcast by each access point and received by a mobile unit. The test pattern is a digital data message. Thus an accurate measurement of link quality is provided which allows a mobile unit to determine whether it should change its association to another access point having improved communications link quality. Further, a load balancing process is provided to balance the communications load amongst a variety of access points, by allowing mobile units also to switch their association with access points in accordance with a current total data rate at any given access point and also considering the number of currently high data rate mobile units associated with a particular access point at any one time.Type: GrantFiled: December 15, 1995Date of Patent: November 16, 1999Assignee: Netwave Technologies, Inc.Inventors: Darwin A. Engwer, Ken Clements, Jonathan M. Zweig, Daniel S. Perrin
-
Patent number: 5444781Abstract: A method and apparatus for decryption using cache storage wherein imported ciphertext is decrypted to produce unencrypted plaintext data. As a communication sequence containing an initialization vector and a block of ciphertext is imported, the initialization vector is applied to a cache and to a decoder. The initialization vector is then compared with other initialization vectors stored in the cache to determine whether the specific initialization vector has previously been received and stored. If the specific initialization vector is found to be stored in the cache, then the PN sequence associated with that initialization vector is written to the decoder, and the stored PN sequence is used to decode the imported ciphertext.If a determination is made that the initialization vector has not been previously received, then the read cache signal instructs the multiplexer to connect the PN generator to the decoder, and the initialization vector is used to generate a new PN sequence.Type: GrantFiled: June 6, 1994Date of Patent: August 22, 1995Assignee: Apple Computer Inc.Inventors: Kerry E. Lynn, Jonathan M. Zweig, Richard W. Mincher
-
Patent number: 5345508Abstract: A digital encryption structure allows the varying of the computational overhead by selectively reusing, according to the desired level of security, a pseudorandom encoding sequence at the transmitter end and by storing and reusing pseudorandom decoding sequences, associated with one or more transmitters at the receiver end. A public initialization vector is combined with a secret key to produce a deterministic sequence from a pseudorandom number generator. This pseudorandom sequence in turn, is used to convert plaintext to ciphertext. The sequence may be selectively reused by storing the sequence to a transmitter memory cache and iteratively reading the sequence from memory according to a counter which controls the level of security of the encryption system. The ciphertext is decrypted on the receiver end by invertibly combining the ciphertext with the same pseudorandom sequence used by the transmitter to originally encode the plaintext.Type: GrantFiled: August 23, 1993Date of Patent: September 6, 1994Assignee: Apple Computer, Inc.Inventors: Kerry E. Lynn, Jonathan M. Zweig, Richard W. Mincher