1
Mitchell D Adler, Curtis C Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G YĆ©pez, Stan Jirman, Nitin Ganatra: Secure device configuration profiles. Apple, Blakely Sokoloff Taylor & Zafman, June 26, 2012: US08208900 (25 worldwide citation)

A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configurat ...


2
Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright: Securely recovering a computing device. Apple, Blakely Sokoloff Taylor & Zafman, August 7, 2012: US08239688 (6 worldwide citation)

A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint e ...


3
Dallas Blake de Atley, Joshua de Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright: Securely recovering a computing device. Apple, Downey Brand, May 10, 2016: US09336394 (2 worldwide citation)

A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint e ...


4
Dallas Blake De Atley, Joshua De Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright: Securely recovering a computing device. Apple, Downey Brand, June 13, 2017: US09680648 (1 worldwide citation)

A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint e ...


5
Dallas Blake De Atley, Joshua De Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright: Securely recovering a computing device. Apple, Dickinson Wright RLLP, November 27, 2018: US10142104

A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint e ...


6
Dallas Blake De Atley, Joshua de Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright: Securely Recovering a Computing Device. Apple Computer Blakely, July 10, 2008: US20080168275-A1

A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint e ...


7
Mitchell D Adler, Curtis C Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G Yepez, Stan Jirman, Nitin Ganatra: Secure device configuration profiles. Apple Bstz, Blakely Sokoloff Taylor & Zafman, September 10, 2009: US20090227274-A1

A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configurat ...