1
Mitchell D Adler, Curtis C Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G YĆ©pez, Stan Jirman, Nitin Ganatra: Secure device configuration profiles. Apple, Blakely Sokoloff Taylor & Zafman, June 26, 2012: US08208900 (25 worldwide citation)

A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configurat ...


2
Michael Lambertus Hubertus Brouwer, Mitchell D Adler, Gordon J Freedman: Incremental secure backup and restore of user settings and data. Apple, Blakely Sokoloff Taylor & Zafman, June 26, 2012: US08209540 (17 worldwide citation)

A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to the manifest. The data processing device then transforms and encrypts the new and modified files, updates the manifest, signs the manifest an ...


3
R Stephen Polzin, Fabrice L Gautier, Mitchell D Adler, Conrad Sauerwald, Michael L H Brouwer: Key management using security enclave processor. Apple, Lawrence J Merkel, Meyertons Hood Kivlin Kowert & Goetzel P C, October 28, 2014: US08873747 (8 worldwide citation)

An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP ma ...


4
R Stephen Polzin, Fabrice L Gautier, Mitchell D Adler, Timothy R Paaske, Michael J Smith: Security enclave processor boot control. Apple, Meyertons Hood Kivlin Kowert & Goetzel P C, Lawrence J Merkel, June 2, 2015: US09047471 (7 worldwide citation)

An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP ma ...


5
Michael Brouwer, Dallas B De Atley, Mitchell D Adler: Conflict resolution for keychain syncing. Apple, Adeli, July 7, 2015: US09077759 (5 worldwide citation)

Some embodiments provide a program that synchronizes a keychain stored on a device with a set of other devices. The keychain includes a set of keychain items. The program receives (1) a list of keychain items for updating the keychain stored on the device and (2) data representing the keychain items ...


6
Michael Brouwer, Dallas B De Atley, Mitchell D Adler: Keychain syncing. Apple, Adeli, November 24, 2015: US09197700 (3 worldwide citation)

Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled ...


7
Dallas B De Atley, Jerrold V Hauck, Mitchell D Adler: Secure escrow service. Apple, Adeli, August 11, 2015: US09106411 (3 worldwide citation)

A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The me ...


8
Michael Brouwer, Dallas B De Atley, Mitchell D Adler: Data protection for keychain syncing. Apple, Adeli, September 1, 2015: US09124637 (2 worldwide citation)

Some embodiments provide a program that provides data protection for a device when synchronizing a set of keychains stored on the device with a set of other devices. The program receives keychain data for synchronizing the set of keychains stored on the device with the set of other devices. The keyc ...


9
Timothy R Paaske, Mitchell D Adler, Conrad Sauerwald, Fabrice L Gautier, Shu Yi Yu: Secure public key acceleration. Apple, Meyertons Hood Kivlin Kowert & Goetzel P C, Lawrence J Merkel, January 17, 2017: US09547778 (2 worldwide citation)

In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing th ...


10
Dallas B De Atley, Jerrold V Hauck, Mitchell D Adler: Secure escrow service. Apple, Adeli, October 4, 2016: US09460313 (2 worldwide citation)

A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The me ...