Patents by Inventor Scott R. Shell
Scott R. Shell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7017155Abstract: Installing software using the configuration manager so that the rollback and security features of the configuration manager may be used during the installation process. A mobile computing device accesses files that are to be installed on the mobile computing device, and well as computer-executable instructions that define how the files are to be installed on the mobile computing device. The configuration manager then causes the computer-executable instructions to be executed (e.g., using configuration service providers), and causes a mirroring rollback document to be constructed. If the installation fails, the installation process is reversed by executing the rollback document. The configuration manager may also be used to implement security when executing the installation instructions by checking to determine whether or not execution of each installation instruction is authorized.Type: GrantFiled: January 31, 2005Date of Patent: March 21, 2006Assignee: Microsoft CorporationInventors: Igor B. Peev, Scott R. Shell, Kevin J. Savage, Hung M. Dang, Nicholas M. Hofmeister
-
Patent number: 6993760Abstract: Installing software using the configuration manager so that the rollback and security features of the configuration manager may be used during the installation process. A mobile computing device accesses files that are to be installed on the mobile computing device, and well as computer-executable instructions that define how the files are to be installed on the mobile computing device. The configuration manager then causes the computer-executable instructions to be executed (e.g., using configuration service providers), and causes a mirroring rollback document to be constructed. If the installation fails, the installation process is reversed by executing the rollback document. The configuration manager may also be used to implement security when executing the installation instructions by checking to determine whether or not execution of each installation instruction is authorized.Type: GrantFiled: December 5, 2001Date of Patent: January 31, 2006Assignee: Microsoft CorporationInventors: Igor B. Peev, Scott R. Shell, Kevin J. Savage, Hung M. Dang, Nicholas M. Hofmeister
-
Patent number: 6918115Abstract: A system and method is disclosed for synchronizing certain periodic activities and/or processes in a computer system or device. The synchronization allows more efficient use of the computer system's or device's processing capabilities, and may result in conservation of electrical power. In one example embodiment, a periodic scheduler is implemented to periodically verify the continued existence of critical processes operating in the computer system or device. Corrective, or other appropriate, action may be taken in the event of a failure of a critical process. A schedule list, which may be a linked list, may be used to track the periodic processes that are to occur. Upon registration of a critical process, the schedule list may be modified to synchronize the new periodic process with the existing schedule list.Type: GrantFiled: February 16, 2001Date of Patent: July 12, 2005Assignee: Microsoft CorporationInventors: Garrett R. Vargas, Scott R. Shell, Matthew W. Taylor
-
Patent number: 6826762Abstract: A Radio Interface Layer (RIL) is disclosed. The RIL comprises an API set which provides a level of abstraction between the radio on a cell phone and the software of the cell phone. The API set of RIL is roughly based on the GSM AT interface as defined in GSM specifications 07.05 and 07.07. The API set provides access to functionality contained within a cellular telephone, such as a GSM or CDMA compatible telephone. These APIs allow applications running on an operating system in the cellular telephone to issue commands without knowledge of the underlying radio structure of the cellular telephone and specific knowledge of the GSM-type commands. For example, these APIs allow the applications to access to phonebook entries, restrict access to data and functionality using passwords, access file and message storage, and perform many other functions. The RIL is divided into a hardware-independent proxy layer, called by various software components, and a driver layer that is hardware-specific.Type: GrantFiled: February 16, 2001Date of Patent: November 30, 2004Assignee: Microsoft CorporationInventors: Scott R. Shell, Roman Sherman, Alan W. Shen
-
Patent number: 6826416Abstract: A cellular telephone clock is automatically set to correlate to a timestamp contained in a Short Messaging Service (SMS) status report. Accordingly, an exemplary cell phone clock can be properly set any time the cell phone receives a status report. By setting the cell phone device time to correlate to the world time, the exemplary cell phone clock can be automatically set, without requiring any action by the user and without requiring a special time set control message. When the cell phone transmits an SMS message, the cell phone stores the device time corresponding to the time that the message was sent (DTS). When a status report is received, the exemplary cell phone stores the device time corresponding to the time that the status report was received (DTR). Additionally, the cell phone stores the world time that is included in the status report by the SMSC that handled the message (WT).Type: GrantFiled: February 16, 2001Date of Patent: November 30, 2004Assignee: Microsoft CorporationInventors: David Anson, Alan W. Shen, Scott R. Shell, Roman Sherman
-
Publication number: 20040224668Abstract: Increasing the level of automation when establishing and managing network connections. A connection manager operates between system level APIs and application programs, providing a level of abstraction. When a user wishes to access a remote resource included in destination network, the user simply identifies the remote resource and the connection manager performs the underlying operations. The connection manager relieves users from having to know detailed information about the remote resource and the destination network. When the connection manager receives a request to access a remote resource, connection manager may utilize extensible decision logic to identify a most appropriate connection method for connecting to a destination network. Such decision logic may include comparing prioritized connection requests to local resources available in a local computing device, as well as, comparing connection parameters associated with connection methods.Type: ApplicationFiled: February 1, 2002Publication date: November 11, 2004Inventors: Scott R. Shell, Andrew R. Raffman
-
Publication number: 20040072595Abstract: A cellular telephone clock is automatically set to correlate to a timestamp contained in a Short Messaging Service (SMS) status report. Accordingly, an exemplary cell phone clock can be properly set any time the cell phone receives a status report. By setting the cell phone device time to correlate to the world time, the exemplary cell phone clock can be automatically set, without requiring any action by the user and without requiring a special time set control message. When the cell phone transmits an SMS message, the cell phone stores the device time corresponding to the time that the message was sent (DTS). When a status report is received, the exemplary cell phone stores the device time corresponding to the time that the status report was received (DTR). Additionally, the cell phone stores the world time that is included in the status report by the SMSC that handled the message (WT).Type: ApplicationFiled: February 16, 2001Publication date: April 15, 2004Inventors: David Anson, Alan W. Shen, Scott R. Shell, Roman Sherman
-
Patent number: 6651111Abstract: The present invention provides for a virtual serial port (VSP) situated between a serial port in a mobile electronic device, applications that require a serial port connection handle, and other applications that require command-mode access to the serial port. Data-communication applications (e.g. web browsing, e-mail, etc.) connect to the serial port through the VSP. The VSP creates a virtual connection handle that is returned to the application. Command-mode requests (e.g., short messaging requests) are received by the hardware abstraction layer, translated into command-mode messages (e.g., AT commands) and placed in a queue. The VSP multiplexes the serial port between the currently-open data communication session (data-mode) and command-mode messages by periodically suspending the currently-open connection and processing one or more command-mode messages that are in the queue. A buffer continually stores incoming data while the data communication session is suspended.Type: GrantFiled: February 16, 2001Date of Patent: November 18, 2003Assignee: Microsoft CorporationInventors: Roman Sherman, Scott R. Shell
-
Publication number: 20030121033Abstract: Installing software using the configuration manager so that the rollback and security features of the configuration manager may be used during the installation process. A mobile computing device accesses files that are to be installed on the mobile computing device, and well as computer-executable instructions that define how the files are to be installed on the mobile computing device. The configuration manager then causes the computer-executable instructions to be executed (e.g., using configuration service providers), and causes a mirroring rollback document to be constructed. If the installation fails, the installation process is reversed by executing the rollback document. The configuration manager may also be used to implement security when executing the installation instructions by checking to determine whether or not execution of each installation instruction is authorized.Type: ApplicationFiled: December 5, 2001Publication date: June 26, 2003Inventors: Igor B. Peev, Scott R. Shell, Kevin J. Savage, Hung M. Dang, Nicholas M. Hofmeister
-
Publication number: 20030108039Abstract: Described is a provisioning system for receiving configuration changes to and queries of settings on a mobile device. One implementation includes a router component and a configuration manager component. The router component is responsible for receiving messages delivered to the mobile device and parsing the messages into requests for information. The messages may be delivered in document format, such as in the extensible Markup Language (XML) format. The requests may take the form of a request to respond with existing configuration settings, or to set certain configuration settings on the mobile device. The router component is also responsible for authenticating and decrypting the messages. Once properly authenticated and decrypted, the router component passes the message to the configuration manager component. The configuration manager component is responsible for determining what configuration settings are affected by the message and for processing the requests within the message.Type: ApplicationFiled: June 29, 2001Publication date: June 12, 2003Applicant: Microsoft CorporationInventors: Scott R. Shell, Lee M. Butler
-
Publication number: 20030018764Abstract: Described is a provisioning system for receiving configuration changes to and queries of settings on a mobile device. One implementation includes a router component and a configuration manager component. The router component is responsible for receiving messages delivered to the mobile device and parsing the messages into requests for information. The messages may be delivered in document format, such as in the eXtensible Markup Language (XML) format. The requests may take the form of a request to respond with existing configuration settings. The configuration manager component is responsible for determining what configuration settings are affected by the message and for processing the requests within the message. For example, the configuration manager component may process a request to query a configuration setting by retrieving the requested information from a hardware register or a software registry.Type: ApplicationFiled: June 29, 2001Publication date: January 23, 2003Applicant: Microsoft CorporationInventors: Scott R. Shell, Igor B. Peev, Yuhang Zhu
-
Publication number: 20020184288Abstract: A system and method is disclosed for synchronizing certain periodic activities and/or processes in a computer system or device. The synchronization allows more efficient use of the computer system's or device's processing capabilities, and may result in conservation of electrical power. In one example embodiment, a periodic scheduler is implemented to periodically verify the continued existence of critical processes operating in the computer system or device. Corrective, or other appropriate, action may be taken in the event of a failure of a critical process. A schedule list, which may be a linked list, may be used to track the periodic processes that are to occur. Upon registration of a critical process, the schedule list may be modified to synchronize the new periodic process with the existing schedule list.Type: ApplicationFiled: February 16, 2001Publication date: December 5, 2002Inventors: Garrett R. Vargas, Scott R. Shell, Matthew W. Taylor
-
Publication number: 20020184407Abstract: A Radio Interface Layer (RIL) is disclosed. The RIL comprises an API set which provides a level of abstraction between the radio on a cell phone and the software of the cell phone. The API set of RIL is roughly based on the GSM AT interface as defined in GSM specifications 07.05 and 07.07. The API set provides access to functionality contained within a cellular telephone, such as a GSM or CDMA compatible telephone. These APIs allow applications running on an operating system in the cellular telephone to issue commands without knowledge of the underlying radio structure of the cellular telephone and specific knowledge of the GSM-type commands. For example, these APIs allow the applications to access to phonebook entries, restrict access to data and functionality using passwords, access file and message storage, and perform many other functions. The RIL is divided into a hardware-independent proxy layer, called by various software components, and a driver layer that is hardware-specific.Type: ApplicationFiled: February 16, 2001Publication date: December 5, 2002Inventors: Scott R. Shell, Roman Sherman, Alan W. Shen
-
Publication number: 20020147853Abstract: The present invention provides for a virtual serial port (VSP) situated between a serial port in a mobile electronic device, applications that require a serial port connection handle, and other applications that require command-mode access to the serial port. Data-communication applications (e.g. web browsing, e-mail, etc.) connect to the serial port through the VSP. The VSP creates a virtual connection handle that is returned to the application. Command-mode requests (e.g., short messaging requests) are received by the hardware abstraction layer, translated into command-mode messages (e.g., AT commands) and placed in a queue. The VSP multiplexes the serial port between the currently-open data communication session (data-mode) and command-mode messages by periodically suspending the currently-open connection and processing one or more command-mode messages that are in the queue. A buffer continually stores incoming data while the data communication session is suspended.Type: ApplicationFiled: February 16, 2001Publication date: October 10, 2002Applicant: Microsoft CorporationInventors: Roman Sherman, Scott R. Shell
-
Publication number: 20020144151Abstract: Described is a system and method for assigning security credentials to particular components within a mobile device, and for ensuring that only configuration messages having sufficient access privilege to those components are allowed access, based on the security credentials. The security credentials or “roles” describe which settings a particular configuration message has authority to modify or query. Access is disallowed to settings for which a message does not have adequate security credentials.Type: ApplicationFiled: April 27, 2001Publication date: October 3, 2002Applicant: Microsoft CorporationInventors: Scott R. Shell, Lee M. Butler
-
Patent number: 6339780Abstract: Described herein is a portable computer having a limited display area. An Internet or other hypermedia browser executes on the portable computer to load and display content in a content viewing area. During times when the browser is loading content, the browser displays a temporary, animated graphic element over the content viewing area. The graphic element is removed after the content is loaded, allowing unobstructed viewing of the loaded content.Type: GrantFiled: May 6, 1997Date of Patent: January 15, 2002Assignee: Microsoft CorporationInventors: Scott R. Shell, Kevin Timothy Shields, Anthony Kitowitz
-
Patent number: 5949418Abstract: A portable computing device has a processor and a touch-sensitive display. The display includes a touch-sensitive area superimposed on a viewing area, whereby the touch-sensitive area extends beyond the viewing area to form a border outside of the viewing area but within the touch-sensitive area. The handheld computing device has an operating system which executes on the processor to provide a graphical user interface environment capable of presenting a graphical window and a program taskbar within the viewing area. The program taskbar presents a program icon representing a program that is active within the graphical window. The operating system is configured to minimize the graphical window to remove the graphical window from the viewing area or to enlarge the graphical window to restore the graphical window in the viewing area in response to contacting the program icon.Type: GrantFiled: May 6, 1997Date of Patent: September 7, 1999Assignee: Microsoft CorporationInventors: Kevin Timothy Shields, Anthony Kitowicz, Daniel Boone, Scott R. Shell