Patents by Inventor William Westerinen
William Westerinen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060139069Abstract: A system and method for maintaining persistent data during an unexpected power loss uses a memory controller and a supplemental power source. An entity running on the computer, for example, an application program, a utility, the operating system or other entity, may identify data for preservation using an application program interface. The application program interface may be provided by the memory controller. A sensor determines when an unexpected power loss has occurred and signals the memory controller. Using power from the supplemental power source, i.e. a battery or capacitor, the memory controller copies the identified data to a non-volatile memory. The memory controller may set a flag to indicate that preserved data is available for later recovery.Type: ApplicationFiled: December 22, 2004Publication date: June 29, 2006Applicant: MICROSOFT CORPORATIONInventors: Alexander Frank, Mark Light, William Westerinen
-
Publication number: 20060123258Abstract: A mechanism is provided for a personal computer to preserve user and system state data in the event of an AC power failure when the computer is in a standby state. When the AC power failure occurs, a switchover circuit connects a rechargeable energy storage medium, such as a rechargeable battery, to the power supply of the computer for powering components of computer, and the computer is awaken. A critical battery alarm is then issued to trigger the operating system of the computer to perform a transition into a hibernation state, during which the state data of the computer are persistently stored. The energy storage medium is disconnected from the power supply after the computer system has entered hibernation.Type: ApplicationFiled: January 30, 2006Publication date: June 8, 2006Applicant: Microsoft CorporationInventors: William Westerinen, Jason Anderson, Allen Marshall, Tony Pierce
-
Publication number: 20060121854Abstract: Described is a system and method for transporting interference-related control data and other information between nodes in a wireless network, using a control channel that is distinct from a content channel used to transport content. The control channel may be a different channel in the same unlicensed band as the content channel, a channel in a different unlicensed band, or a channel in a licensed band, and thereby not subject to the same interference-related problems that the unlicensed content channel may experience. As a result, management information for adjusting the content channel's communication parameters may still be communicated between the nodes, whereby mitigation actions may occur. For example, the content channel may be changed to another frequency, compression may be implemented or varied, and/or the data transfer rate may be varied. The control data can also be used to change the control channel's communication parameters.Type: ApplicationFiled: December 3, 2004Publication date: June 8, 2006Applicant: Microsoft CorporationInventors: Abhishek Abhishek, Craig Mundie, Poovanpilli Madhavan, Victoria Poncini, William Westerinen, Paramvir Bahl
-
Publication number: 20060101459Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.Type: ApplicationFiled: November 30, 2004Publication date: May 11, 2006Applicant: Microsoft CorporationInventors: Dale Crosier, Aditha Adams, Taryn Beck, Adrian Chandley, Pasquale DeMaio, Steven Kaneko, Carl Ledbetter, Scott Manchester, Benjamin Nick, Thomas Phillips, William Westerinen
-
Publication number: 20060101456Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.Type: ApplicationFiled: October 18, 2004Publication date: May 11, 2006Applicant: Microsoft CorporationInventors: Dale Crosier, Aditha Adams, Taryn Beck, Adrian Chandley, Pasquale DeMaio, Steven Kaneko, Carl Ledbetter, Scott Manchester, Benjamin Nick, Thomas Phillips, William Westerinen
-
Publication number: 20060082817Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.Type: ApplicationFiled: November 30, 2004Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Dale Crosier, Aditha Adams, Taryn Beck, Adrian Chandley, Pasquale DeMaio, Steven Kaneko, Carl Ledbetter, Scott Manchester, Benjamin Nick, Thomas Phillips, William Westerinen
-
Publication number: 20060085638Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.Type: ApplicationFiled: October 15, 2004Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
-
Publication number: 20060085086Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.Type: ApplicationFiled: November 4, 2004Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
-
Publication number: 20060085527Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.Type: ApplicationFiled: November 4, 2004Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
-
Publication number: 20060085639Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.Type: ApplicationFiled: November 3, 2004Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Thomas Phillips, Christopher Schoppa, William Westerinen, Mark Myers
-
Publication number: 20060069870Abstract: A method of preventing data loss in a data storage system includes supplying write data to a high speed volatile write buffer and supplying electrical power from an energy storage device upon detection of a primary power loss event. The backup electrical power is supplied to the write buffer and nonvolatile cache. Under backup power, the write data is transferred into the nonvolatile cache and the backup power is removed. Upon regaining main power, a data presence indication triggers a transfer of the write data from the nonvolatile cache to the long term storage media. The method may be implemented for a system to protect it from inadvertent power losses or it may implemented in a system where the long term storage device is power cycled to save power. The energy storage device is not necessarily needed in the power cycled system unless power failure protection is also desired.Type: ApplicationFiled: September 24, 2004Publication date: March 30, 2006Applicant: Microsoft CorporationInventors: Clark Nicholson, William Westerinen
-
Publication number: 20060041937Abstract: A system and method for enabling a network device to resume network activities in a secure manner on a communication network when network activities are generally blocked by protective security measures implemented by network security modules is presented. During its periodic update request, a network security module blocking the network activities of the network device requests updated security measures from an administrator-configurable security service. The security service determines whether the network security module/network device may receive a relaxed set of security measures that, when implemented by the network security module, enable the network device to resume some network activities. If the security service determines that the network security module/network device may receive a relaxed set of security measures, the relaxed set of security measures are returned to and implemented on the network security module, thereby enabling the network device to resume some network activities.Type: ApplicationFiled: August 20, 2004Publication date: February 23, 2006Applicant: Microsoft CorporationInventors: Adrian Chandley, Thomas Phillips, William Westerinen
-
Publication number: 20060007051Abstract: A method and system for auxiliary display of information for a computing device. An auxiliary display is integrated with a computing system to provide an area where notifications can be peripherally presented off-screen. Whenever a background task sends a notification to the main display of the system, the notification may be redirected to appear instead on the auxiliary display. A user may then glance at the notification appearing on the auxiliary display to be informed of the message without interruption from the current task onscreen. Any type of information may be presented on the auxiliary display including incoming communications, meeting reminders, system alerts, and information from Internet subscription services. The auxiliary display may be placed on the central processor chassis or on the monitor border along with LED indicator lights to provide simple peripheral-vision notification. By pressing a button, a user may obtain additional detailed follow-up information.Type: ApplicationFiled: May 5, 2003Publication date: January 12, 2006Applicant: MICROSOFT CORPORATIONInventors: Eric Bear, Chad Magendanz, Aditha Adams, Carl Ledbetter, Steve Kaneko, Chris Schoppa, Adrian Chandley, William Westerinen, Dale Crosier, Robert Plank
-
Publication number: 20050246563Abstract: A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.Type: ApplicationFiled: April 28, 2004Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Adrian Chandley, Chad Magendanz, Christopher Schoppa, Dale Crosier, Jason Anderson, Juan Perez, Kenneth Stufflebeam, Pasquale DeMaio, Steven Kaneko, William Westerinen
-
Publication number: 20050246487Abstract: In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory.Type: ApplicationFiled: May 3, 2004Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Cenk Ergan, Clark Nicholson, Dan Teodosiu, Dean DeWhitt, Emily Hill, Hanumantha Kodavalla, Michael Zwilling, John Parchem, Michael Fortin, Nathan Obr, Rajeev Nagar, Surenda Verma, Therron Powell, William Westerinen, Mark Zbikowski, Patrick Stemen
-
Publication number: 20050190536Abstract: The present invention is directed to systems and methods for providing a computing system have a base unit and an expansion unit. The base unit has a fixed configuration and includes a CPU, a power supply, a removable media drive and expansion slots. The expansion unit has a power supply, removable media drive, and expansion slots. Additional components are added to the expansion unit in order to maintain stability in the base unit and the expansion unit is connected to the base unit by a high speed external connection. This configuration provides for an expansion path for the computing system that maintains overall stability of the base unit.Type: ApplicationFiled: February 26, 2004Publication date: September 1, 2005Inventors: Jason Anderson, William Westerinen, Kenneth Stufflebeam
-
Publication number: 20050182949Abstract: A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.Type: ApplicationFiled: June 29, 2004Publication date: August 18, 2005Applicant: Microsoft CorporationInventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen
-
Publication number: 20050182612Abstract: Systems and methods for producing a simulated off condition in a computing device using a set of software drivers that interact with a system service and the device BIOS. The computing device includes system components such as a power supply, processors and fans that are put into a low power state upon receiving a signal to power off the device. This provides the appearance to users that the computing device is off. The system components, however, remain enabled to run applications when the computing device is in the simulated off condition. If necessary, the device can be returned to a fully on condition to process applications that require the system components to be brought out of the low power state to execute.Type: ApplicationFiled: May 3, 2004Publication date: August 18, 2005Applicant: Microsoft CorporationInventors: Jason Anderson, William Westerinen, Tony Pierce, Allen Marshall, Peter Viscarola
-
Publication number: 20050182978Abstract: Systems and methods for producing a simulated off condition in a computing device. The computing device includes system components such as a power supply, processors and fans that are put into a low power state upon receiving a signal to power off the device. This provides the appearance to users that the computing device is off. The system components, however, remain enabled to run applications when the computing device is in the simulated off condition. If necessary, the device can be returned to a fully on condition to process applications that require the system components to be brought out of the low power state to execute.Type: ApplicationFiled: February 17, 2004Publication date: August 18, 2005Inventors: Jason Anderson, William Westerinen, Tony Pierce, Allen Marshall
-
Publication number: 20050182967Abstract: A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network.Type: ApplicationFiled: June 29, 2004Publication date: August 18, 2005Applicant: Microsoft CorporationInventors: Thomas Phillips, Alexander Frank, Adrian Chandley, Christopher Schoppa, William Westerinen