11
Michael Lambertus Hubertus Brouwer, Mitchell David Adler: System and method for content protection based on a combination of a user PIN and a device specific identifier. Apple, Downey Brand, March 6, 2018: US09912476

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encrypt ...


12
Jerry Hauck, Jeffrey Bush, Michael Lambertus Hubertus Brouwer, Daryl Mun Kid Low: Service provider activation with subscriber identity module policy. Apple, Sterne Kessler Goldstein & Fox PLLC, February 14, 2017: US09572014

Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket en ...


13
Conrad Sauerwald, Vrajesh Rajesh Bhavsar, Kenneth Buffalo McNeil, Thomas Brogan Duffy, Michael Lambertus Hubertus Brouwer, Matthew John Byom, Mitchell David Adler, Eric Brandon Tamura: System and method for wireless data protection. Apple, Blakely Sokoloff Taylor & Zafman, July 26, 2016: US09401898

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted ...


14
Conrad Sauerwald, Vrajesh Rajesh Bhavsar, Kenneth Buffalo McNeil, Thomas Brogan Duffy Jr, Michael Lambertus Hubertus Brouwer, Matthew John Byom, Mitchell David Adler, Eric Brandon Tamura: System and method for wireless data protection. Apple, Blakely Sokoloff Taylor & Zafman, November 7, 2017: US09813389

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted ...


15
Michael Lambertus Hubertus Brouwer: Braking control method and system for a vehicle. FARADAY & FUTURE, Lee & Hayes PLLC, September 18, 2018: US10076962

A braking control method and system are disclosed. According to certain embodiments, the method may include determining a target deceleration. The method may also include decelerating the vehicle by regenerative braking. The method may further include, when determining that an actual deceleration by ...


16

17
Mitchell D Adler, Michael Lambertus Hubertus Brouwer, Conrad Sauerwald: Trust exception management. Apple Bstz, Blakely Sokoloff Taylor & Zafman, September 10, 2009: US20090228986-A1

A machine implemented method includes storing a first data representing a prior exception to a first trust failure (e.g., expired certificate). The prior exception may be stored as part of establishing a first communication with a data processing system (e.g., a handheld device). The first communica ...


18
Mitchell D Adler, Curtis C Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G Yepez, Stan Jirman, Nitin Ganatra: Secure device configuration profiles. Apple Bstz, Blakely Sokoloff Taylor & Zafman, September 10, 2009: US20090227274-A1

A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configurat ...


19
Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy JR, John Andrew Wright, Vrajesh Rajesh Bhavsar, Lucia Elena Ballard, Michael Lambertus Hubertus Brouwer, Conrad Sauerwald, Mitchell David Adler, Eric Brandon Tamura, David Rahardja, Carsten Guenther: System and method for file-level data protection. Apple, October 13, 2011: US20110252234-A1

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encrypt ...


20
Michael Lambertus Hubertus Brouwer, Mitchell David Adler: System and method for content protection based on a combination of a user pin and a device specific identifier. Apple, October 13, 2011: US20110252243-A1

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encrypt ...