Patents by Inventor Matthew Scott Klahn
Matthew Scott Klahn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10187430Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.Type: GrantFiled: June 7, 2013Date of Patent: January 22, 2019Assignee: Apple Inc.Inventors: Amit K. Vyas, Joshua V. Graessley, John Iarocci, Darren Litzinger, Andrew C. Lam, Ray Ling Chang, Steven Douglas Parker, Justin Wood, Matthew Scott Klahn, Daniel B. Pollack
-
Patent number: 9603086Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.Type: GrantFiled: January 24, 2014Date of Patent: March 21, 2017Assignee: Apple Inc.Inventors: Andrew C. Lam, Ray Ling Chang, Steven Douglas Parker, Amit K. Vyas, Joshua V. Graessley, John Iarocci, Darren Litzinger, Justin Wood, Matthew Scott Klahn, Daniel B. Pollack
-
Patent number: 9535152Abstract: In some implementations, radio access technology (RAT) signals can be monitored and used to synchronize an internal clock of a mobile device to a network system clock without registering the mobile device to the network. In some implementations, a RAT processor can be configured to receive RAT signals and to prevent transmission of RAT signals. In some implementations, the internal clock can be associated with a GNSS processor and can be used to calculate a location of the mobile device. In some implementations, a RAT processor that is configured for a particular radio access technology can be configured to monitor signals associated with another radio access technology when synchronizing the internal clock. In some implementations, the RAT processor can monitor signals in response to a power event. The power event can be associated with powering a display of the mobile device.Type: GrantFiled: March 7, 2013Date of Patent: January 3, 2017Assignee: Apple Inc.Inventors: Robert Mayor, Matthew Scott Klahn, Longda Xing, Jinghua Ling, Jason Shi, Arun G. Mathias
-
Patent number: 9363754Abstract: Computer-implemented methods, computer-readable media, and computer systems for managing power consumption in mobile devices are described. A mobile computer system executes a first computer application configured to receive data from a server system over a network, and a second computer application configured to periodically search for a connection to the network at a first time interval. In response to executing the second computer application, the mobile computer system determines that a strength of the connection is below a threshold strength. In response to determining that the strength of the connection is below the threshold strength, the computer system executes the first computer application to delay requesting data from the server system until the connection to the network is detected.Type: GrantFiled: September 28, 2012Date of Patent: June 7, 2016Assignee: Apple Inc.Inventors: Daniel B. Pollack, Justin Wood, Ray L. Chang, Amit K. Vyas, Steve Parker, Matthew Scott Klahn
-
Publication number: 20140365673Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.Type: ApplicationFiled: June 7, 2013Publication date: December 11, 2014Inventors: Amit K. Vyas, Joshua V. Graessley, John Iarocci, Darren Litzinger, Andrew C. Lam, Ray Ling Chang, Steven Douglas Parker, Justin Wood, Matthew Scott Klahn, Daniel B. Pollack
-
Publication number: 20140365642Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.Type: ApplicationFiled: January 24, 2014Publication date: December 11, 2014Inventors: Andrew C. Lam, Ray Ling Chang, Steven Douglas Parker, Amit K. Vyas, Joshua V. Graessley, John Iarocci, Darren Litzinger, Justin Wood, Matthew Scott Klahn, Daniel B. Pollack
-
Publication number: 20140052774Abstract: Computer-implemented methods, computer-readable media, and computer systems for managing power consumption in mobile devices are described. A mobile computer system executes a first computer application configured to receive data from a server system over a network, and a second computer application configured to periodically search for a connection to the network at a first time interval. In response to executing the second computer application, the mobile computer system determines that a strength of the connection is below a threshold strength. In response to determining that the strength of the connection is below the threshold strength, the mobile computer system executes the first computer application to delay requesting data from the server system until the connection to the network is detected.Type: ApplicationFiled: September 28, 2012Publication date: February 20, 2014Applicant: Apple Inc.Inventors: Daniel B. Pollack, Justin Wood, Ray L. Chang, Amit K. Vyas, Steve Parker, Matthew Scott Klahn
-
Publication number: 20130328724Abstract: In some implementations, radio access technology (RAT) signals can be monitored and used to synchronize an internal clock of a mobile device to a network system clock without registering the mobile device to the network. In some implementations, a RAT processor can be configured to receive RAT signals and to prevent transmission of RAT signals. In some implementations, the internal clock can be associated with a GNSS processor and can be used to calculate a location of the mobile device. In some implementations, a RAT processor that is configured for a particular radio access technology can be configured to monitor signals associated with another radio access technology when synchronizing the internal clock. In some implementations, the RAT processor can monitor signals in response to a power event. The power event can be associated with powering a display of the mobile device.Type: ApplicationFiled: March 7, 2013Publication date: December 12, 2013Applicant: APPLE INC.Inventors: Robert Mayor, Matthew Scott Klahn, Longda Xing, Jinghua Ling, Jason Shi, Arun G. Mathias