Patents by Inventor Love Hornquist Astrand

Love Hornquist Astrand has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11847099
    Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: December 19, 2023
    Assignee: Apple Inc.
    Inventors: Per Love Hornquist Astrand, Van Hong, Nihar Sharma, Xixi Lu, Steven A. Myers, Michelle D. Linington, Yannick L. Sierra
  • Publication number: 20230396439
    Abstract: A device may include accessing first public key associated with a first user identifier for the first electronic device and a second public key associated with a second user identifier for a second electronic device. The device can generate a first random number and a first commitment using a hash function and the first random number; transmit a first message to the second electronic device via a channel between the first and second electronic devices. The device can receive a message from the second electronic device via the channel including include a second random number generated by the second electronic device. The device can extract a code via the hash function using the first public key, the second public key, the first random number, and the second random number. The device can present the code on a user interface for verification. The user interface can receive confirmation of the verification.
    Type: Application
    Filed: April 6, 2023
    Publication date: December 7, 2023
    Applicant: APPLE INC.
    Inventors: Cristina L. Formaini, Bailey E. Basile, Per Love Hornquist Astrand, Yannick L. Sierra, Erik D. Strahm, Benton C. Case
  • Patent number: 11671250
    Abstract: Migration of a pairing of wearable device to a new companion electronic device is disclosed. In one embodiment, pairing migration is performed by syncing and verifying a migration key in the wearable and new companion device. Pairing migration includes moving settings and pairing data of the wearable to the new companion device in response to detecting the wearable is associated with the migration key, wherein the migration key establishes a validation of trust of the wearable relative to the companion device. The settings and pairing data can include configuration and protected data and one or more keys to establish a trust relationship between the wearable and new companion device. The settings and pairing data can also include device data such that the wearable can be discoverable by the new companion device.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: June 6, 2023
    Assignee: APPLE INC.
    Inventors: David C. Donley, Per Love Hornquist Astrand, Chen Ganir, Craig P. Dooley, James C. Grandy, Julien A. Poumailloux, Tyler D. Hawkins, David S. Wilser, David P. Remahl
  • Patent number: 11528129
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: December 13, 2022
    Assignee: Apple Inc.
    Inventors: Per Love Hornquist Astrand, Benjamin I. Williamson, Keaton F. Mowery, Mitchell D. Adler, Michelle A. Auricchio, Luke T. Hiesterman
  • Patent number: 11461165
    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
    Type: Grant
    Filed: October 7, 2020
    Date of Patent: October 4, 2022
    Assignee: Apple Inc.
    Inventors: Bob Bradley, Per Love Hornquist Astrand
  • Publication number: 20220083511
    Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
    Type: Application
    Filed: November 22, 2021
    Publication date: March 17, 2022
    Inventors: Per Love HORNQUIST ASTRAND, Van HONG, Nihar SHARMA, Xixi LU, Steven A. MYERS, Michelle D. LININGTON, Yannick L. SIERRA
  • Patent number: 11188477
    Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: November 30, 2021
    Assignee: Apple Inc.
    Inventors: Julien Oster, Thomas G. Holland, Bernard J. Semeria, Jason A. Harmening, Pierre-Olivier J. Martel, Gregory D. Hughes, P. Love Hornquist Astrand, Jacques Fortier, Ryan P. Nielson, Simon P. Cooper
  • Patent number: 11182349
    Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: November 23, 2021
    Assignee: Apple Inc.
    Inventors: Per Love Hornquist Astrand, Van Hong, Nihar Sharma, Xixi Lu, Steven A. Myers, Michelle D. Linington, Yannick L. Sierra
  • Patent number: 11063748
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: July 13, 2021
    Assignee: Apple Inc.
    Inventors: Per Love Hornquist Astrand, Benjamin I. Williamson, Keaton F. Mowery, Mitchell D. Adler, Michelle A. Auricchio, Luke T. Hiesterman
  • Patent number: 11025412
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: June 1, 2021
    Assignee: Apple Inc.
    Inventors: Per Love Hornquist Astrand, Benjamin I. Williamson, Keaton F. Mowery, Mitchell D. Adler, Michelle A. Auricchio, Luke T. Hiesterman
  • Publication number: 20210103491
    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
    Type: Application
    Filed: October 7, 2020
    Publication date: April 8, 2021
    Inventors: Bob BRADLEY, Per Love HORNQUIST ASTRAND
  • Patent number: 10802904
    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: October 13, 2020
    Assignee: Apple Inc.
    Inventors: Bob Bradley, Per Love Hornquist Astrand
  • Patent number: 10776502
    Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.
    Type: Grant
    Filed: June 11, 2017
    Date of Patent: September 15, 2020
    Assignee: Apple Inc.
    Inventors: Lei Wei, Yannick L. Sierra, Per Love Hornquist Astrand
  • Publication number: 20200081847
    Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.
    Type: Application
    Filed: September 9, 2019
    Publication date: March 12, 2020
    Inventors: Julien Oster, Thomas G. Holland, Bernard J. Semeria, Jason A. Harmening, Pierre-Olivier J. Martel, Gregory D. Hughes, P. Love Hornquist Astrand, Jacques Fortier, Ryan P. Nielson, Simon P. Cooper
  • Publication number: 20190286614
    Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
    Type: Application
    Filed: May 31, 2019
    Publication date: September 19, 2019
    Inventors: Per Love HORNQUIST ASTRAND, Benjamin I. WILLIAMSON, Keaton F. MOWERY, Mitchell D. ADLER, Michelle A. AURICCHIO, Luke T. HIESTERMAN
  • Publication number: 20180352030
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Application
    Filed: June 1, 2018
    Publication date: December 6, 2018
    Inventors: Per Love HORNQUIST ASTRAND, Benjamin I. WILLIAMSON, Keaton F. MOWERY, Mitchell D. ADLER, Michelle A. AURICCHIO, Luke T. HIESTERMAN
  • Publication number: 20180352435
    Abstract: Migration of a pairing of wearable device to a new companion electronic device is disclosed. In one embodiment, pairing migration is performed by syncing and verifying a migration key in the wearable and new companion device. Pairing migration includes moving settings and pairing data of the wearable to the new companion device in response to detecting the wearable is associated with the migration key, wherein the migration key establishes a validation of trust of the wearable relative to the companion device. The settings and pairing data can include configuration and protected data and one or more keys to establish a trust relationship between the wearable and new companion device. The settings and pairing data can also include device data such that the wearable can be discoverable by the new companion device.
    Type: Application
    Filed: April 27, 2018
    Publication date: December 6, 2018
    Inventors: David C. Donley, Per Love Hornquist Astrand, Chen Ganir, Craig P. Dooley, James C. Grandy, Julien A. Poumailloux, Tyler D. Hawkins, David S. Wilser, David P. Remahl
  • Publication number: 20180352022
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Application
    Filed: June 1, 2018
    Publication date: December 6, 2018
    Inventors: Per Love HORNQUIST ASTRAND, Benjamin I. WILLIAMSON, Keaton F. MOWERY, Mitchell D. ADLER, Michelle A. AURICCHIO, Luke T. HIESTERMAN
  • Publication number: 20180352031
    Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N?1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N?1 peer devices.
    Type: Application
    Filed: June 1, 2018
    Publication date: December 6, 2018
    Inventors: Per Love HORNQUIST ASTRAND, Benjamin I. WILLIAMSON, Keaton F. MOWERY, Mitchell D. ADLER, Michelle A. AURICCHIO, Luke T. HIESTERMAN
  • Publication number: 20180336087
    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
    Type: Application
    Filed: September 27, 2017
    Publication date: November 22, 2018
    Inventors: Bob BRADLEY, Per Love HORNQUIST ASTRAND