Patents by Inventor Mitchell D. Adler

Mitchell D. Adler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8725918
    Abstract: In an embodiment, a host computing device includes an internal display and also includes a connector to connect to an external display. A cable is provided to connect to the connector and to connect to the external display. The cable includes video processing capabilities. For example, the cable may include a memory configured to store a frame buffer. The frame buffer may store a frame of video data for further processing by the video processing device in the cable. The video processing device may manipulate the frame in a variety of ways, e.g. scaling, rotating, gamma correction, dither correction, etc.
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: May 13, 2014
    Assignee: Apple Inc.
    Inventors: Anup K. Sharma, Scott P. Krueger, James M. Hollabaugh, Roberto G. Yepez, Mitchell D. Adler, Brijesh Tripathi, Jeffrey J. Terlizzi
  • Patent number: 8700819
    Abstract: A communication link between a host device and a client device can be suspended based on a suspend request or notification provided by the client device. The suspend request can be transmitted by a client device to a host device if the client device determines that suspension is appropriate, and can be sent in response to receiving a polling request from the host device. After receiving a suspend request, the host device can initiate an operation to suspend the communication link between the devices.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: April 15, 2014
    Assignee: Apple Inc.
    Inventors: Anand Dalal, Haining Zhang, Mitchell D. Adler
  • Publication number: 20140093084
    Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.
    Type: Application
    Filed: February 14, 2013
    Publication date: April 3, 2014
    Applicant: APPLE INC.
    Inventors: Dallas B. De Atley, Jerrold V. Hauck, Mitchell D. Adler
  • Publication number: 20140089650
    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.
    Type: Application
    Filed: September 25, 2012
    Publication date: March 27, 2014
    Applicant: APPLE INC.
    Inventors: R. Stephen Polzin, Fabrice L. Gautier, Mitchell D. Adler, Timothy R. Paaske, Michael J. Smith
  • Publication number: 20140086406
    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.
    Type: Application
    Filed: September 25, 2012
    Publication date: March 27, 2014
    Applicant: APPLE INC.
    Inventors: R. Stephen Polzin, Fabrice L. Gautier, Mitchell D. Adler, Conrad Sauerwald, Michael L.H. Brouwer
  • Patent number: 8671279
    Abstract: Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: March 11, 2014
    Assignee: Apple Inc.
    Inventors: Michael Lambertus Hubertus Brouwer, Mitchell D. Adler, Gordon J. Freedman
  • Publication number: 20130227631
    Abstract: In an embodiment, a host computing device includes an internal display and also includes a connector to connect to an external display. A cable is provided to connect to the connector and to connect to the external display. The cable includes video processing capabilities. For example, the cable may include a memory configured to store a frame buffer. The frame buffer may store a frame of video data for further processing by the video processing device in the cable. The video processing device may manipulate the frame in a variety of ways, e.g. scaling, rotating, gamma correction, dither correction, etc.
    Type: Application
    Filed: June 12, 2012
    Publication date: August 29, 2013
    Inventors: Anup K. Sharma, Scott P. Krueger, James M. Hollabaugh, Roberto G. Yepez, Mitchell D. Adler, Brijesh Tripathi, Jeffrey J. Terlizzi, Terry L. Tikalsky
  • Publication number: 20130035065
    Abstract: A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating.
    Type: Application
    Filed: June 20, 2012
    Publication date: February 7, 2013
    Inventors: Mitchell D. Adler, Curtis C. Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G. Yépez, Stan Jirman, Nitin Ganatra
  • Publication number: 20120260099
    Abstract: Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
    Type: Application
    Filed: June 19, 2012
    Publication date: October 11, 2012
    Inventors: Michael Lambertus Hubertus Brouwer, Mitchell D. Adler, Gordon J. Freedman
  • Publication number: 20120233361
    Abstract: A communication link between a host device and a client device can be suspended based on a suspend request or notification provided by the client device. The suspend request can be transmitted by a client device to a host device if the client device determines that suspension is appropriate, and can be sent in response to receiving a polling request from the host device. After receiving a suspend request, the host device can initiate an operation to suspend the communication link between the devices.
    Type: Application
    Filed: March 9, 2011
    Publication date: September 13, 2012
    Applicant: Apple Inc.
    Inventors: Anand Dalal, Haining Zhang, Mitchell D. Adler
  • Patent number: 8208900
    Abstract: A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: June 26, 2012
    Assignee: Apple Inc.
    Inventors: Mitchell D. Adler, Curtis C. Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G. Yépez, Stan Jirman, Nitin Ganatra
  • Patent number: 8209540
    Abstract: A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to the manifest. The data processing device then transforms and encrypts the new and modified files, updates the manifest, signs the manifest and sends the encrypted files along with the signed manifest to a host data processing system for backup.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: June 26, 2012
    Assignee: Apple Inc.
    Inventors: Michael Lambertus Hubertus Brouwer, Mitchell D. Adler, Gordon J. Freedman
  • Publication number: 20100309815
    Abstract: Embodiments of the invention perform a preliminary scan for information automatically transmitted by available wireless access points. The information transmitted by access points (e.g., identity information) and information derived from the transmission (e.g., signal strength) is used to prioritize the available wireless access points before direct scanning takes place.
    Type: Application
    Filed: August 13, 2009
    Publication date: December 9, 2010
    Inventors: ROBERTO GABRIEL Yepez, Mitchell D. Adler, Charles Francis Dominquez
  • Publication number: 20090228986
    Abstract: A machine implemented method includes storing a first data representing a prior exception to a first trust failure (e.g., expired certificate). The prior exception may be stored as part of establishing a first communication with a data processing system (e.g., a handheld device). The first communication may not be trustworthy. The method may determine, as part of establishing a second communication with the data processing system, that a second trust failure has occurred. The second trust failure (e.g., revoked certificate) indicates that the second communication may not be trustworthy. The method may determine whether the prior exception applies to the second trust failure. If the prior exception does not apply, the data processing system determines, automatically, whether to create a new exception for the second trust failure.
    Type: Application
    Filed: December 31, 2008
    Publication date: September 10, 2009
    Inventors: MITCHELL D. ADLER, Michael Lambertus Hubertus Brouwer, Conrad Sauerwald
  • Publication number: 20090227274
    Abstract: A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating.
    Type: Application
    Filed: December 31, 2008
    Publication date: September 10, 2009
    Inventors: MITCHELL D. ADLER, Curtis C. Galloway, Christophe Allie, Conrad Sauerwald, Dallas Blake De Atley, Dieter Siegmund, Matthew Reda, Michael Lambertus Hubertus Brouwer, Roberto G. Yepez, Stan Jirman, Nitin Ganatra
  • Publication number: 20090215398
    Abstract: At least certain embodiments of the disclosures relate to establishing communications between devices with a first connection. A second connection is established between the devices to transfer data between the devices and/or alter configurations of the devices. In one embodiment, a method includes establishing a first connection between a first device and a second device with a first networking standard and associated first network. The method further includes establishing a second connection between the first device and the second device with a second networking standard and associated second network based on the first connection providing information to at least one of the first and second devices regarding the second network. The method further includes transferring data between the first and second devices using the second networking standard. In one embodiment, the first networking standard is a Bluetooth networking standard and the second networking standard is a WiFi networking standard.
    Type: Application
    Filed: February 25, 2008
    Publication date: August 27, 2009
    Inventors: Mitchell D. Adler, Jonathan Jay Andrews
  • Publication number: 20090006640
    Abstract: Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Inventors: MICHAEL LAMBERTUS HUBERTUS BROUWER, Mitchell D. Adler, Gordon J. Freedman