1
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja: System and method for wiping encrypted data on a device having file-level content protection. Apple, Womble Carlyle Sandridge & Rice, April 30, 2013: US08433901 (31 worldwide citation)

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and re ...


2
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, Kenneth Buffalo McNeil, David Rahardja: System and method for backing up and restoring files encrypted with file-level content protection. Apple, Womble Carlyle Sandridge & Rice, April 2, 2013: US08412934 (29 worldwide citation)

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating a backup, backing up encrypted data, and restoring backed up encrypted data. The method for initiating a backup includes sending a backup secret to a backup device having an encrypted file system ...


3
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, John Andrew Wright, Vrajesh Rajesh Bhavsar, Lucia Elena Ballard, Michael Lambertus Hubertus Brouwer, Conrad Sauerwald, Mitchell David Adler, Eric Brandon Tamura, David Rahardja, Carsten Guenther: System and method for file-level data protection. Apple, Womble Carlyle Sandridge & Rice, August 13, 2013: US08510552 (27 worldwide citation)

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encrypt ...


4
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja: System and method for wiping encrypted data on a device having file-level content protection. Apple, Womble Carlyle Sandridge & Rice, June 17, 2014: US08756419 (25 worldwide citation)

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and re ...


5
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja: System and method for wiping encrypted data on a device having file-level content protection. Apple, Downey Brand, January 12, 2016: US09237016 (24 worldwide citation)

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and re ...


6
Gordie Freedman, David Rahardja: Mobile device management. Apple, Womble Carlyle Sandridge & Rice, June 25, 2013: US08473743 (12 worldwide citation)

Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to r ...


7
Mark W Whittemore, Michael D Santos, Todd R Fernandez, Christopher G Skogen, Jussi Pekka Mantere, David Rahardja: Configuring computing devices using a bootstrap configuration. Apple, DLA Piper, October 11, 2016: US09467334 (1 worldwide citation)

In the described embodiments, a device configuration file is used to set configuration settings on a computing device during a configuration operation (e.g., an initial configuration or a re-configuration of the computing device). The device configuration file is retrieved from a location where the ...


8
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy Jr, Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja: System and method for wiping encrypted data on a device having file-level content protection. Apple, Dickinson Wright RLLP, July 17, 2018: US10025597

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and re ...


9
Gordie Freedman, David Rahardja: Mobile device management. Apple, Downey Brand, October 31, 2017: US09807600

Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to r ...


10
David Rahardja, Hernan R Eguiluz, Miguel S Sanchez Sandoval, Stan Jirman: Asset streaming. Apple, Blakely Sokoloff Taylor & Zafman, August 25, 2015: US09118642

A device streams assets to network-based storage, and servers administering the network-based storage operate to notify other authorized devices that the assets are available to download, including initiating the download of assets automatically or in response to user input. With streaming enabled o ...