Patents by Inventor Joshua de Cesare
Joshua de Cesare has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130326239Abstract: A power management system, in one embodiment, determines a thermal status (e.g. a temperature or a calculation of power consumption) of at least a portion of a data processing system, and based on that status, thermal credits are calculated and then used to determine a voltage dithering pattern and a voltage boost pattern.Type: ApplicationFiled: May 31, 2012Publication date: December 5, 2013Inventors: Jonathan Andrews, Joshua de Cesare
-
Publication number: 20130283076Abstract: Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions.Type: ApplicationFiled: June 18, 2013Publication date: October 24, 2013Inventors: Joshua De Cesare, Bernard Joseph Semeria, Michael Smith
-
Patent number: 8560820Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: GrantFiled: March 2, 2012Date of Patent: October 15, 2013Assignee: Apple Inc.Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Patent number: 8473764Abstract: Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions.Type: GrantFiled: February 24, 2012Date of Patent: June 25, 2013Assignee: Apple Inc.Inventors: Joshua de Cesare, Bernard Semeria, Michael Smith
-
Publication number: 20130081124Abstract: A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key.Type: ApplicationFiled: September 15, 2012Publication date: March 28, 2013Applicant: Apple IncInventors: Joshua de Cesare, Michael Smith, Dallas Blake De Atley, John Andrew Wright
-
Publication number: 20130036298Abstract: A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.Type: ApplicationFiled: August 3, 2012Publication date: February 7, 2013Applicant: APPLE INC.Inventors: Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright
-
Publication number: 20130024677Abstract: A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image.Type: ApplicationFiled: July 25, 2012Publication date: January 24, 2013Inventors: Michael Smith, Joshua de Cesare, Dallas Blake De Atley, John Andrew Wright
-
Publication number: 20120278597Abstract: A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image.Type: ApplicationFiled: July 5, 2012Publication date: November 1, 2012Inventors: Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Jerry Hauck, Jeffrey Bush
-
Patent number: 8291480Abstract: A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key.Type: GrantFiled: January 7, 2007Date of Patent: October 16, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Michael Smith, Dallas Blake De Atley, John Andrew Wright
-
Patent number: 8254568Abstract: A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image.Type: GrantFiled: January 7, 2007Date of Patent: August 28, 2012Assignee: Apple Inc.Inventors: Michael Smith, Joshua de Cesare, Dallas Blake De Atley, John Andrew Wright
-
Patent number: 8239688Abstract: A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.Type: GrantFiled: January 7, 2007Date of Patent: August 7, 2012Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright
-
Patent number: 8230412Abstract: A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image.Type: GrantFiled: August 31, 2007Date of Patent: July 24, 2012Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Jerry Hauck, Jeffrey Bush
-
Patent number: 8230124Abstract: Data processing systems which operate in different modes, including a mode which supports providing an output of images through a port on the systems. In one embodiment, a data processing system includes a processing system, a cellular telephone transceiver, and a port which is configured to provide, as an output from the handheld data processing system, data representing movie video images. Methods and machine readable media are also described.Type: GrantFiled: July 22, 2011Date of Patent: July 24, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Keith Cox, Kenneth C. Dyke
-
Publication number: 20120185712Abstract: Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions.Type: ApplicationFiled: February 24, 2012Publication date: July 19, 2012Inventors: Joshua de Cesare, Bernard Semeria, Michael Smith
-
Publication number: 20120166781Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: ApplicationFiled: March 2, 2012Publication date: June 28, 2012Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Patent number: 8196153Abstract: Techniques for associating device drivers via a device tree are described herein. In one embodiment, a device tree having a hierarchical structure is maintained by a kernel of an operating system. The device tree includes device nodes corresponding to devices installed in a computer, including a first node and a second node. An auxiliary driver identifier is encoded within the first node for identifying a second device driver associated with the second node. The auxiliary driver identifier is used by a first device driver associated with the first node to invoke the second device driver to perform a predetermined operation on a device associated with the first node. Other methods and apparatuses are also described.Type: GrantFiled: January 7, 2007Date of Patent: June 5, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Simon Douglas, Alexei Elias Kosut
-
Patent number: 8150039Abstract: A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component.Type: GrantFiled: April 15, 2008Date of Patent: April 3, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Dallas Blake De Atley, Jonathan Jay Andrews, Michael John Smith
-
Patent number: 8145928Abstract: Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions.Type: GrantFiled: March 3, 2011Date of Patent: March 27, 2012Assignee: Apple Inc.Inventors: Joshua de Cesare, Bernard Semeria, Michael Smith
-
Publication number: 20110314305Abstract: A request for a high voltage mode is received and a high voltage timer is started in response to determining that a remaining amount of high voltage credits exceeds a voltage switch threshold value. A switch to the high voltage mode is made in response to the request. A low voltage mode is switched to in response to an indication. The request may be received from an application running on a data processing system. If the indication is that the high voltage timer has expired, a low voltage timer is started in response to switching to low voltage mode. If the high voltage request is still active when the low voltage timer expires, a switch back to high voltage mode occurs and a new high voltage timer is started.Type: ApplicationFiled: July 9, 2010Publication date: December 22, 2011Inventors: Joshua de Cesare, Jonathan Jay Andrews
-
Publication number: 20110283023Abstract: Data processing systems which operate in different modes, including a mode which supports providing an output of images through a port on the systems. In one embodiment, a data processing system includes a processing system, a cellular telephone transceiver, and a port which is configured to provide, as an output from the handheld data processing system, data representing movie video images. Methods and machine readable media are also described.Type: ApplicationFiled: July 22, 2011Publication date: November 17, 2011Inventors: Joshua de Cesare, Keith Cox, Kenneth C. Dyke