Patents by Inventor David p. Remahl
David p. Remahl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240103840Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: ApplicationFiled: November 21, 2023Publication date: March 28, 2024Applicant: Apple Inc.Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Patent number: 11861350Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: GrantFiled: October 6, 2021Date of Patent: January 2, 2024Assignee: Apple Inc.Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Publication number: 20230393888Abstract: A kernel of an operating system receives a request from a parent process (e.g., an exec or spawn system call) to launch a child process that executes a binary. The kernel identifies a process-specific launch constraint, which is a precondition for launching the child process. The kernel evaluates the constraint, which can match against any type of system state or variable, including the process's location on disk, protection on disk, and how the process is to be launched. The kernel can then determine whether to launch the child process, thus permitting the child process to be scheduled for execution by the operating system. Launch constraints can be used both for a child process to impose preconditions on the parent process, and vice versa. Launch constraints can be included in the launch request, embedded in the binary, or located elsewhere, such as in a trust cache in kernel memory.Type: ApplicationFiled: June 1, 2023Publication date: December 7, 2023Inventors: David P. Remahl, Kyle C. Brogle, Robert J. Kendall-Kuppe, Pavlo Malynin, Geoffrey McCormack
-
Patent number: 11671250Abstract: Migration of a pairing of wearable device to a new companion electronic device is disclosed. In one embodiment, pairing migration is performed by syncing and verifying a migration key in the wearable and new companion device. Pairing migration includes moving settings and pairing data of the wearable to the new companion device in response to detecting the wearable is associated with the migration key, wherein the migration key establishes a validation of trust of the wearable relative to the companion device. The settings and pairing data can include configuration and protected data and one or more keys to establish a trust relationship between the wearable and new companion device. The settings and pairing data can also include device data such that the wearable can be discoverable by the new companion device.Type: GrantFiled: April 27, 2018Date of Patent: June 6, 2023Assignee: APPLE INC.Inventors: David C. Donley, Per Love Hornquist Astrand, Chen Ganir, Craig P. Dooley, James C. Grandy, Julien A. Poumailloux, Tyler D. Hawkins, David S. Wilser, David P. Remahl
-
Publication number: 20220043647Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: ApplicationFiled: October 6, 2021Publication date: February 10, 2022Applicant: Apple Inc.Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Publication number: 20210400019Abstract: The subject disclosure provides systems and methods for application-specific network data filtering. Application-specific network data filtering may be performed by a sandboxed process prior to providing the network data to an application to which the network data is directed. Any malicious or otherwise potentially harmful data that is included in the network data may be removed by the application-specific network data filter or may be allowed to corrupt the application specific network data filtering operations within the sandbox, thereby preventing the malicious or harmful data from affecting the application or other portions of an electronic device. In one or more implementations, a first process such as an application-specific network data filtering process may request allocation of memory for the first process from second process, such as an application, that is separate from a memory manager of the electronic device.Type: ApplicationFiled: June 21, 2021Publication date: December 23, 2021Inventors: Ivan KRSTIC, Damien P. SORRESSO, David P REMAHL, Elliot C. LISKIN, Justin S. HOGG, Kevin J. LINDEMAN, Lucia E. BALLARD, Nicholas J. CIRCOSTA, Richard J. COOPER, Ryan A. WILLIAMS, Steven C. VITTITOE, Zachariah J. RIGGLE, Patrick R. METCALFE, Andrew T. WHITEHEAD
-
Patent number: 11176021Abstract: Improved messaging applications are described that use a first set of software to test rendering of a message, and if the test is successful the message is allowed to be presented. In one embodiment, a first set of software can attempt to test the renderability of a message and if the test is successful, the message can be stored in a message database. In one embodiment, the first set of software operates in a separate sandbox from a sandbox for a messaging application which displays the message. The first set of software can operate in a first process which is different than a process in which the messaging application runs.Type: GrantFiled: May 29, 2019Date of Patent: November 16, 2021Assignee: APPLE INC.Inventors: Eugene Bistolas, Ryan Nielsen, Pierre J. De Filippis, David P. Remahl, Cristina Formaini, Pierre-Olivier J. Martel, Lilynaz Hashemi, Stephen Lottermoser
-
Patent number: 11144297Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: GrantFiled: September 28, 2018Date of Patent: October 12, 2021Assignee: Apple Inc.Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Patent number: 11017109Abstract: Embodiments described herein provide techniques to limit programmatic access to privacy related user data and system resources for applications that execute outside of a sandbox or other restricted operating environment while enabling a user to grant additional access to those applications via prompts presented to the user via a graphical interface. In a further embodiment, techniques are applied to limit the frequency in which a user is prompted by learning the types of files or resources to which a user is likely to permit or deny access.Type: GrantFiled: May 6, 2019Date of Patent: May 25, 2021Assignee: Apple Inc.Inventors: Kelly B. Yancey, Richard J. Cooper, Richard L. Hagy, Pierre-Olivier Martel, David P. Remahl, Jonathan A. Zdziarski
-
Publication number: 20190370154Abstract: Improved messaging applications are described that use a first set of software to test rendering of a message, and if the test is successful the message is allowed to be presented. In one embodiment, a first set of software can attempt to test the renderability of a message and if the test is successful, the message can be stored in a message database. In one embodiment, the first set of software operates in a separate sandbox from a sandbox for a messaging application which displays the message. The first set of software can operate in a first process which is different than a process in which the messaging application runs.Type: ApplicationFiled: May 29, 2019Publication date: December 5, 2019Inventors: Eugene Bistolas, Ryan Nielsen, Pierre J. De Filippis, David P. Remahl, Cristina Formaini, Pierre-Olivier J. Martel, Lilynaz Hashemi, Stephen Lottermoser
-
Publication number: 20190227784Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.Type: ApplicationFiled: September 28, 2018Publication date: July 25, 2019Inventors: Dallas B. De Atley, Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl, Kelsey J. Skillman, Edward E. Thomas
-
Publication number: 20180352435Abstract: Migration of a pairing of wearable device to a new companion electronic device is disclosed. In one embodiment, pairing migration is performed by syncing and verifying a migration key in the wearable and new companion device. Pairing migration includes moving settings and pairing data of the wearable to the new companion device in response to detecting the wearable is associated with the migration key, wherein the migration key establishes a validation of trust of the wearable relative to the companion device. The settings and pairing data can include configuration and protected data and one or more keys to establish a trust relationship between the wearable and new companion device. The settings and pairing data can also include device data such that the wearable can be discoverable by the new companion device.Type: ApplicationFiled: April 27, 2018Publication date: December 6, 2018Inventors: David C. Donley, Per Love Hornquist Astrand, Chen Ganir, Craig P. Dooley, James C. Grandy, Julien A. Poumailloux, Tyler D. Hawkins, David S. Wilser, David P. Remahl
-
Patent number: 9870166Abstract: Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the protected cache using a UUID that is cryptographically derived from the image data. Any process with access to the UUID may retrieve the image data. Because the UUID is uniquely derived from the actual data of the generated file, a process will only be able to retrieve image data that could have been generated by a process associated with the user account, or from a process associated with a user account that could have generated the image data, or that otherwise has a record of the image data.Type: GrantFiled: September 15, 2014Date of Patent: January 16, 2018Assignee: Apple Inc.Inventors: David A. Carter, Keith Stattenfield, David P. Remahl, Jr., Christopher S. Linn
-
Patent number: 9674151Abstract: Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from online distribution system and additionally request invitational content from invitational content providers. Separating users' demographic data from a device-specific identifier in favor of uniquely generated identifiers and using the client device to enforce the substation of uniquely generated identifiers in favor of a device identifier, thereby using the client device to serve as a proxy in creating a firewall to exclude system partners from access to a device identifier.Type: GrantFiled: May 10, 2016Date of Patent: June 6, 2017Assignee: Apple Inc.Inventors: William Bedford Turner, David P. Remahl
-
Publication number: 20160255053Abstract: Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from online distribution system and additionally request invitational content from invitational content providers. Separating users' demographic data from a device-specific identifier in favor of uniquely generated identifiers and using the client device to enforce the substation of uniquely generated identifiers in favor of a device identifier, thereby using the client device to serve as a proxy in creating a firewall to exclude system partners from access to a device identifier.Type: ApplicationFiled: May 10, 2016Publication date: September 1, 2016Inventors: William Bedford Turner, David P. Remahl
-
Patent number: 9363238Abstract: Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from online distribution system and additionally request invitational content from invitational content providers. Separating users' demographic data from a device-specific identifier in favor of uniquely generated identifiers and using the client device to enforce the substation of uniquely generated identifiers in favor of a device identifier, thereby using the client device to serve as a proxy in creating a firewall to exclude system partners from access to a device identifier.Type: GrantFiled: June 4, 2012Date of Patent: June 7, 2016Assignee: Apple Inc.Inventors: William Bedford Turner, David P. Remahl
-
Publication number: 20160077758Abstract: Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the protected cache using a UUID that is cryptographically derived from the image data. Any process with access to the UUID may retrieve the image data. Because the UUID is uniquely derived from the actual data of the generated file, a process will only be able to retrieve image data that could have been generated by a process associated with the user account, or from a process associated with a user account that could have generated the image data, or that otherwise has a record of the image data.Type: ApplicationFiled: September 15, 2014Publication date: March 17, 2016Inventors: David A. Carter, Keith Stattenfield, David P. Remahl, JR., Christopher S. Linn
-
Publication number: 20130326007Abstract: Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from online distribution system and additionally request invitational content from invitational content providers. Separating users' demographic data from a device-specific identifier in favor of uniquely generated identifiers and using the client device to enforce the substation of uniquely generated identifiers in favor of a device identifier, thereby using the client device to serve as a proxy in creating a firewall to exclude system partners from access to a device identifier.Type: ApplicationFiled: June 4, 2012Publication date: December 5, 2013Applicant: Apple Inc.Inventors: William Bedford Turner, David p. Remahl