Patents by Inventor Mitchell Adler
Mitchell Adler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110061113Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: ApplicationFiled: September 30, 2010Publication date: March 10, 2011Applicant: Apple Inc.Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
-
Publication number: 20110010759Abstract: Embodiments of the present disclosure provide a system and method of providing customized access to an electronic storefront for downloading software for a mobile device based on authorization data stored on the mobile device. In one embodiment, mobile devices have stored one or more profile. Each profile is signed by a particular entity (a particular developer or enterprise) and includes authorization data authorizing one or more devices to install and use software associated with the entity. A content management application associated with the storefront (e.g., iTunes) identifies one or more storefronts associated with the entities of authorized profiles for a particular device upon access to the storefront and provides the entity storefronts to a user of the device based on the authorization data stored on the device. In one embodiment, a profile is authorized, e.g., using encryption and installed to the device by the particular entity.Type: ApplicationFiled: December 29, 2009Publication date: January 13, 2011Applicant: Apple Inc.Inventor: Mitchell Adler
-
Patent number: 7823214Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: GrantFiled: February 3, 2005Date of Patent: October 26, 2010Assignee: Apple Inc.Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
-
Publication number: 20100233961Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: ApplicationFiled: March 9, 2010Publication date: September 16, 2010Applicant: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Publication number: 20100235373Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: ApplicationFiled: March 9, 2010Publication date: September 16, 2010Applicant: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Shyam Toprani, John Ananny, Peter T. Langenfeld, Scott Krueger
-
Publication number: 20100235425Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.Type: ApplicationFiled: March 9, 2010Publication date: September 16, 2010Applicant: Apple Inc.Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
-
Publication number: 20090254753Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. A request in a first program may be received from a second program. A profile is then identified. The profile includes at least one entitlement associated with the second program. The profile is authenticated based on a first digest indicative of the profile and the second program is authenticated based on a second digest indicative of the second program. The request is then executed based on the entitlement.Type: ApplicationFiled: March 4, 2009Publication date: October 8, 2009Applicant: APPLE INC.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090249071Abstract: Systems and methods for managing access to restricted data and system resources in secure operating environments are disclosed. Developer access profiles are issued by trusted authorities to developers which define entitlements that provide limited access to system resources and data on specified computing devices. The developer access profiles allow software developers to write software which accesses parts of the target platform environment which are typically off limits to third party developers.Type: ApplicationFiled: March 4, 2009Publication date: October 1, 2009Applicant: APPLE INC.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090249075Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.Type: ApplicationFiled: March 4, 2009Publication date: October 1, 2009Applicant: APPLE INC.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090247124Abstract: Systems and methods for provisioning computing devices are provided. Carrier provisioning profiles are distributed to computing devices via an activation service during the provisioning process. The carrier provisioning profiles specify access limitations to certain device resources which may otherwise be available to users of the device.Type: ApplicationFiled: March 4, 2009Publication date: October 1, 2009Applicant: APPLE INC.Inventors: Dallas de Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090249064Abstract: Embodiments include systems and methods for authorizing software code to be executed on a device based on a trusted cache. When receiving a request to execute software, this software may be checked for a digital signature by at least one trusted authority. According, a digest value indicative of at least a portion of the software module may be determined. A cache stored in trusted space of the device is then accessed for a matching digest value. If an entry is found, the device may allow execution of the software module; if an entry is not found, then the device may continue with the cryptographic operations for verifying the software's digital signature, or may be configured to block execution of the software.Type: ApplicationFiled: March 4, 2009Publication date: October 1, 2009Applicant: APPLE INC.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090249065Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.Type: ApplicationFiled: March 4, 2009Publication date: October 1, 2009Applicant: Apple Inc.Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090228704Abstract: In some embodiments, software developers may obtain development access to a computing device. A software developer may request development access from one or more trusted authorities, such as a manufacturer of the devices, an operating system provider, etc. The request may be approved by a single trusted authority, by at least one of a plurality of trusted authorities, or a combination of several trusted authorities. In order to enable developer access, a trusted authority may create a digital certificate that may be specific to the software developer and the devices and generate a profile that specifies the access rights of the developer on those devices. In addition, the digital certificate may enable the software developer to sign their applications or code so that it may execute on the device in accordance with their profile.Type: ApplicationFiled: March 4, 2009Publication date: September 10, 2009Applicant: Apple Inc.Inventors: Dallas de Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
-
Publication number: 20090219131Abstract: The system is designed for use in a hospital for tracking hand washing and other medical care related tasks. It includes multiple disinfectant soap dispenser devices connected to a network server that provide confirmation that caregivers are in compliance with hospital rules regarding hand cleanliness and the performance of other patient maintenance or treatment procedures. The system individually identifies each disinfectant soap dispenser device, identifies the location of the device associated with each patient and identifies each authorized caregiver or unauthorized recorded person using the device. The device identifies its location, the identity of caregiver, the time and date of use of device, and same is recorded in a network server as part of patient records.Type: ApplicationFiled: February 26, 2009Publication date: September 3, 2009Inventors: Michael H. Barnett, Coleman L. Munch, Mitchell A. Adler
-
Publication number: 20090083834Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: ApplicationFiled: December 4, 2008Publication date: March 26, 2009Applicant: Apple Inc.Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
-
Publication number: 20060156415Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.Type: ApplicationFiled: February 3, 2005Publication date: July 13, 2006Inventors: Jonathan Rubinstein, Anthony Fadell, Jesse Dorogusker, Mitchell Adler, John Archibald
-
Publication number: 20040088778Abstract: A garment for draping about the neck. The garment having a configuration comprising first and second sections that are both either conic or pyramidal. The first and second sections are of substantially equal size arranged on opposite slides of a vertex. The first and second sections are joined at the vertex. In an alternative embodiment, the vertex is at a fixed point situated generally along a first direction. The proximal portion of each of the first and second sections is situated about the areas where the vertex joins these sections. The medial portion of the garment generally extends along the first direction between the proximal portions of the first and second sections. When the garment is draped around an area of the body, the first and second sections form a generally collapsed cone-shaped configuration.Type: ApplicationFiled: January 30, 2002Publication date: May 13, 2004Inventor: Mitchell Adler
-
Patent number: 6175964Abstract: A garment comprising first and second sections of substantially equal size arranged on opposite sides of a vertex. The distal portions of the first and second sections have greater fabric surface than the medial portion of the garment. When the medial portion is draped on or about the body, the medial portion imparts a more sparse appearance than the distal portions of the first and second sections. When the garment is draped around an area of the body, the first and second sections form a generally collapsed cone-shaped configuration, displaying a neat and attractive appearance when the garment is worn.Type: GrantFiled: August 4, 1999Date of Patent: January 23, 2001Inventor: Mitchell Adler