Patents by Inventor Mitchell Adler
Mitchell Adler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11913967Abstract: In variants, the method for determining dispensing volume for a liquid handler 110 can include: dispensing a droplet using the liquid hander no, sampling a set of measurements of the droplet, determining the droplet volume based on the set of measurements, and/or any other suitable steps. In variants, the system 100 can include: the liquid handler 110, a droplet vessel 130, a measurement system 150, and/or any other suitable components.Type: GrantFiled: July 24, 2023Date of Patent: February 27, 2024Assignee: Spaero Inc.Inventors: Dimitris Papageorgiou, Mitchell Adler
-
Publication number: 20240033944Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.Type: ApplicationFiled: October 13, 2023Publication date: February 1, 2024Inventor: Mitchell Adler
-
Publication number: 20240033943Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.Type: ApplicationFiled: October 13, 2023Publication date: February 1, 2024Inventor: Mitchell Adler
-
Publication number: 20240027486Abstract: In variants, the method for determining dispensing volume for a liquid handler 110 can include: dispensing a droplet using the liquid hander 110, sampling a set of measurements of the droplet, determining the droplet volume based on the set of measurements, and/or any other suitable steps. In variants, the system 100 can include: the liquid handler 110, a droplet vessel 130, a measurement system 150, and/or any other suitable components.Type: ApplicationFiled: July 24, 2023Publication date: January 25, 2024Inventors: Dimitris Papageorgiou, Mitchell Adler
-
Patent number: 11850729Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.Type: GrantFiled: February 17, 2023Date of Patent: December 26, 2023Assignee: Spaero Inc.Inventor: Mitchell Adler
-
Publication number: 20230271331Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.Type: ApplicationFiled: February 17, 2023Publication date: August 31, 2023Inventor: Mitchell Adler
-
Publication number: 20170277886Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.Type: ApplicationFiled: June 1, 2017Publication date: September 28, 2017Inventors: DALLAS DE ATLEY, HEIKO PANTHER, MITCHELL ADLER, SIMON COOPER, MICHAEL BROUWER, MATT REDA
-
Patent number: 9754099Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: GrantFiled: December 27, 2015Date of Patent: September 5, 2017Assignee: Apple Inc.Inventors: Jonathan J. Rubinstein, Anthony M. Fadell, Jesse Lee Dorogusker, Mitchell Adler, John Wesley Archibald
-
Patent number: 9672350Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.Type: GrantFiled: March 4, 2009Date of Patent: June 6, 2017Assignee: Apple Inc.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20160110536Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: ApplicationFiled: December 27, 2015Publication date: April 21, 2016Applicant: Apple Inc.Inventors: Jonathan J. Rubinstein, Anthony M. Fadell, Jesse Lee Dorogusker, Mitchell Adler, John Wesley Archibald
-
Patent number: 9069908Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: GrantFiled: March 9, 2010Date of Patent: June 30, 2015Assignee: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Publication number: 20140317303Abstract: An application can be launched in response to a launch request from an accessory. For example, the mobile computing device can determine whether it is in a state that allows launching of an application and/or can determine whether the application or application type requested in the launch command is available for launching. In response to the request, and if the mobile computing device is capable, the mobile computing device can launch the application. The mobile computing device can also send a positive acknowledgment message to the accessory indicating that the application may be launched. An open communication session message may also be sent to the accessory. In response thereto the accessory can open a communication session and interoperate with the application.Type: ApplicationFiled: June 30, 2014Publication date: October 23, 2014Applicant: APPLE INC.Inventors: Shyam S. Toprani, Paul Holden, Emily Clark Schubert, Thomas Alsina, Scott Forstall, Lawrence G. Bolton, Nitin Ganatra, Mitchell Adler, Jesse Lee Dorogusker
-
Patent number: 8775652Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: GrantFiled: September 30, 2011Date of Patent: July 8, 2014Assignee: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Patent number: 8763079Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: GrantFiled: December 4, 2008Date of Patent: June 24, 2014Assignee: Apple Inc.Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
-
Patent number: 8700789Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: GrantFiled: March 9, 2010Date of Patent: April 15, 2014Assignee: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Patent number: 8639733Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: GrantFiled: March 9, 2010Date of Patent: January 28, 2014Assignee: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Shyam Toprani, John Ananny, Peter Langenfeld, Scott Krueger
-
Patent number: 8554924Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: GrantFiled: March 9, 2010Date of Patent: October 8, 2013Assignee: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker, Shyam Toprani, John Ananny
-
Patent number: 8161567Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: GrantFiled: September 30, 2010Date of Patent: April 17, 2012Assignee: Apple Inc.Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
-
Publication number: 20120023199Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: ApplicationFiled: September 30, 2011Publication date: January 26, 2012Applicant: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Publication number: 20110255996Abstract: A valve system for controlling a flow of a fluid is provided that includes a port including a valve seat, and a ball adapted to cooperate with the valve seat to seal the port. The valve system also includes an arrangement for magnetically positioning the ball on the valve seat. A method for operating a pump is provided that includes releasing a piston causing the piston to return to an unactuated position to increase the interior volume forcing fluid in a reservoir to move into the piston body through a port due to a pressure differential between the interior volume and the reservoir. The method also includes sealing the port with a ball after the piston returns to an unactuated position and the pressure differential falls below a threshold by magnetically attracting the ball to a valve seat of the port.Type: ApplicationFiled: April 19, 2011Publication date: October 20, 2011Inventors: JAMES WICKSTEAD, MICHAEL H. BARNETT, COLEMAN L. MUNCH, MITCHELL A. ADLER