Patents by Inventor Mitchell Adler

Mitchell Adler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11913967
    Abstract: In variants, the method for determining dispensing volume for a liquid handler 110 can include: dispensing a droplet using the liquid hander no, sampling a set of measurements of the droplet, determining the droplet volume based on the set of measurements, and/or any other suitable steps. In variants, the system 100 can include: the liquid handler 110, a droplet vessel 130, a measurement system 150, and/or any other suitable components.
    Type: Grant
    Filed: July 24, 2023
    Date of Patent: February 27, 2024
    Assignee: Spaero Inc.
    Inventors: Dimitris Papageorgiou, Mitchell Adler
  • Publication number: 20240033944
    Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.
    Type: Application
    Filed: October 13, 2023
    Publication date: February 1, 2024
    Inventor: Mitchell Adler
  • Publication number: 20240033943
    Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.
    Type: Application
    Filed: October 13, 2023
    Publication date: February 1, 2024
    Inventor: Mitchell Adler
  • Publication number: 20240027486
    Abstract: In variants, the method for determining dispensing volume for a liquid handler 110 can include: dispensing a droplet using the liquid hander 110, sampling a set of measurements of the droplet, determining the droplet volume based on the set of measurements, and/or any other suitable steps. In variants, the system 100 can include: the liquid handler 110, a droplet vessel 130, a measurement system 150, and/or any other suitable components.
    Type: Application
    Filed: July 24, 2023
    Publication date: January 25, 2024
    Inventors: Dimitris Papageorgiou, Mitchell Adler
  • Patent number: 11850729
    Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.
    Type: Grant
    Filed: February 17, 2023
    Date of Patent: December 26, 2023
    Assignee: Spaero Inc.
    Inventor: Mitchell Adler
  • Publication number: 20230271331
    Abstract: In variants, a method for automated experimentation can include: determining experimental constraints, constructing a computational representation of the experiment, optimizing the computational representation subject to the experimental constraints, determining instructions for a laboratory robot based on the optimized computational representation, and/or any other suitable steps.
    Type: Application
    Filed: February 17, 2023
    Publication date: August 31, 2023
    Inventor: Mitchell Adler
  • Publication number: 20170277886
    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.
    Type: Application
    Filed: June 1, 2017
    Publication date: September 28, 2017
    Inventors: DALLAS DE ATLEY, HEIKO PANTHER, MITCHELL ADLER, SIMON COOPER, MICHAEL BROUWER, MATT REDA
  • Patent number: 9754099
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Grant
    Filed: December 27, 2015
    Date of Patent: September 5, 2017
    Assignee: Apple Inc.
    Inventors: Jonathan J. Rubinstein, Anthony M. Fadell, Jesse Lee Dorogusker, Mitchell Adler, John Wesley Archibald
  • Patent number: 9672350
    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.
    Type: Grant
    Filed: March 4, 2009
    Date of Patent: June 6, 2017
    Assignee: Apple Inc.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20160110536
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Application
    Filed: December 27, 2015
    Publication date: April 21, 2016
    Applicant: Apple Inc.
    Inventors: Jonathan J. Rubinstein, Anthony M. Fadell, Jesse Lee Dorogusker, Mitchell Adler, John Wesley Archibald
  • Patent number: 9069908
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: June 30, 2015
    Assignee: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Publication number: 20140317303
    Abstract: An application can be launched in response to a launch request from an accessory. For example, the mobile computing device can determine whether it is in a state that allows launching of an application and/or can determine whether the application or application type requested in the launch command is available for launching. In response to the request, and if the mobile computing device is capable, the mobile computing device can launch the application. The mobile computing device can also send a positive acknowledgment message to the accessory indicating that the application may be launched. An open communication session message may also be sent to the accessory. In response thereto the accessory can open a communication session and interoperate with the application.
    Type: Application
    Filed: June 30, 2014
    Publication date: October 23, 2014
    Applicant: APPLE INC.
    Inventors: Shyam S. Toprani, Paul Holden, Emily Clark Schubert, Thomas Alsina, Scott Forstall, Lawrence G. Bolton, Nitin Ganatra, Mitchell Adler, Jesse Lee Dorogusker
  • Patent number: 8775652
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: July 8, 2014
    Assignee: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Patent number: 8763079
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: June 24, 2014
    Assignee: Apple Inc.
    Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
  • Patent number: 8700789
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: April 15, 2014
    Assignee: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Patent number: 8639733
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: January 28, 2014
    Assignee: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Shyam Toprani, John Ananny, Peter Langenfeld, Scott Krueger
  • Patent number: 8554924
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: October 8, 2013
    Assignee: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker, Shyam Toprani, John Ananny
  • Patent number: 8161567
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: April 17, 2012
    Assignee: Apple Inc.
    Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
  • Publication number: 20120023199
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Application
    Filed: September 30, 2011
    Publication date: January 26, 2012
    Applicant: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Publication number: 20110255996
    Abstract: A valve system for controlling a flow of a fluid is provided that includes a port including a valve seat, and a ball adapted to cooperate with the valve seat to seal the port. The valve system also includes an arrangement for magnetically positioning the ball on the valve seat. A method for operating a pump is provided that includes releasing a piston causing the piston to return to an unactuated position to increase the interior volume forcing fluid in a reservoir to move into the piston body through a port due to a pressure differential between the interior volume and the reservoir. The method also includes sealing the port with a ball after the piston returns to an unactuated position and the pressure differential falls below a threshold by magnetically attracting the ball to a valve seat of the port.
    Type: Application
    Filed: April 19, 2011
    Publication date: October 20, 2011
    Inventors: JAMES WICKSTEAD, MICHAEL H. BARNETT, COLEMAN L. MUNCH, MITCHELL A. ADLER