Patents by Inventor Mitchell Adler

Mitchell Adler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110061113
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Application
    Filed: September 30, 2010
    Publication date: March 10, 2011
    Applicant: Apple Inc.
    Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
  • Publication number: 20110010759
    Abstract: Embodiments of the present disclosure provide a system and method of providing customized access to an electronic storefront for downloading software for a mobile device based on authorization data stored on the mobile device. In one embodiment, mobile devices have stored one or more profile. Each profile is signed by a particular entity (a particular developer or enterprise) and includes authorization data authorizing one or more devices to install and use software associated with the entity. A content management application associated with the storefront (e.g., iTunes) identifies one or more storefronts associated with the entities of authorized profiles for a particular device upon access to the storefront and provides the entity storefronts to a user of the device based on the authorization data stored on the device. In one embodiment, a profile is authorized, e.g., using encryption and installed to the device by the particular entity.
    Type: Application
    Filed: December 29, 2009
    Publication date: January 13, 2011
    Applicant: Apple Inc.
    Inventor: Mitchell Adler
  • Patent number: 7823214
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: October 26, 2010
    Assignee: Apple Inc.
    Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
  • Publication number: 20100233961
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Application
    Filed: March 9, 2010
    Publication date: September 16, 2010
    Applicant: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Publication number: 20100235373
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Application
    Filed: March 9, 2010
    Publication date: September 16, 2010
    Applicant: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Shyam Toprani, John Ananny, Peter T. Langenfeld, Scott Krueger
  • Publication number: 20100235425
    Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
    Type: Application
    Filed: March 9, 2010
    Publication date: September 16, 2010
    Applicant: Apple Inc.
    Inventors: Paul Holden, Lawrence Bolton, Nitin Ganatra, Mitchell Adler, Emily Clark Schubert, Jesse Lee Dorogusker
  • Publication number: 20090254753
    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. A request in a first program may be received from a second program. A profile is then identified. The profile includes at least one entitlement associated with the second program. The profile is authenticated based on a first digest indicative of the profile and the second program is authenticated based on a second digest indicative of the second program. The request is then executed based on the entitlement.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 8, 2009
    Applicant: APPLE INC.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090249071
    Abstract: Systems and methods for managing access to restricted data and system resources in secure operating environments are disclosed. Developer access profiles are issued by trusted authorities to developers which define entitlements that provide limited access to system resources and data on specified computing devices. The developer access profiles allow software developers to write software which accesses parts of the target platform environment which are typically off limits to third party developers.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 1, 2009
    Applicant: APPLE INC.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090249075
    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 1, 2009
    Applicant: APPLE INC.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090247124
    Abstract: Systems and methods for provisioning computing devices are provided. Carrier provisioning profiles are distributed to computing devices via an activation service during the provisioning process. The carrier provisioning profiles specify access limitations to certain device resources which may otherwise be available to users of the device.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 1, 2009
    Applicant: APPLE INC.
    Inventors: Dallas de Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090249064
    Abstract: Embodiments include systems and methods for authorizing software code to be executed on a device based on a trusted cache. When receiving a request to execute software, this software may be checked for a digital signature by at least one trusted authority. According, a digest value indicative of at least a portion of the software module may be determined. A cache stored in trusted space of the device is then accessed for a matching digest value. If an entry is found, the device may allow execution of the software module; if an entry is not found, then the device may continue with the cryptographic operations for verifying the software's digital signature, or may be configured to block execution of the software.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 1, 2009
    Applicant: APPLE INC.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090249065
    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The profiles allow entities to add software code to the device without reauthorizing each distribution by a trusted authority such as testing, quality assurance, or to limited groups of devices controlled or authorized by the other entities.
    Type: Application
    Filed: March 4, 2009
    Publication date: October 1, 2009
    Applicant: Apple Inc.
    Inventors: Dallas De Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090228704
    Abstract: In some embodiments, software developers may obtain development access to a computing device. A software developer may request development access from one or more trusted authorities, such as a manufacturer of the devices, an operating system provider, etc. The request may be approved by a single trusted authority, by at least one of a plurality of trusted authorities, or a combination of several trusted authorities. In order to enable developer access, a trusted authority may create a digital certificate that may be specific to the software developer and the devices and generate a profile that specifies the access rights of the developer on those devices. In addition, the digital certificate may enable the software developer to sign their applications or code so that it may execute on the device in accordance with their profile.
    Type: Application
    Filed: March 4, 2009
    Publication date: September 10, 2009
    Applicant: Apple Inc.
    Inventors: Dallas de Atley, Heiko Panther, Mitchell Adler, Simon Cooper, Michael Brouwer, Matt Reda
  • Publication number: 20090219131
    Abstract: The system is designed for use in a hospital for tracking hand washing and other medical care related tasks. It includes multiple disinfectant soap dispenser devices connected to a network server that provide confirmation that caregivers are in compliance with hospital rules regarding hand cleanliness and the performance of other patient maintenance or treatment procedures. The system individually identifies each disinfectant soap dispenser device, identifies the location of the device associated with each patient and identifies each authorized caregiver or unauthorized recorded person using the device. The device identifies its location, the identity of caregiver, the time and date of use of device, and same is recorded in a network server as part of patient records.
    Type: Application
    Filed: February 26, 2009
    Publication date: September 3, 2009
    Inventors: Michael H. Barnett, Coleman L. Munch, Mitchell A. Adler
  • Publication number: 20090083834
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Application
    Filed: December 4, 2008
    Publication date: March 26, 2009
    Applicant: Apple Inc.
    Inventors: Jonathan Jake Rubinstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler, John Wesley Archibald
  • Publication number: 20060156415
    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices.
    Type: Application
    Filed: February 3, 2005
    Publication date: July 13, 2006
    Inventors: Jonathan Rubinstein, Anthony Fadell, Jesse Dorogusker, Mitchell Adler, John Archibald
  • Publication number: 20040088778
    Abstract: A garment for draping about the neck. The garment having a configuration comprising first and second sections that are both either conic or pyramidal. The first and second sections are of substantially equal size arranged on opposite slides of a vertex. The first and second sections are joined at the vertex. In an alternative embodiment, the vertex is at a fixed point situated generally along a first direction. The proximal portion of each of the first and second sections is situated about the areas where the vertex joins these sections. The medial portion of the garment generally extends along the first direction between the proximal portions of the first and second sections. When the garment is draped around an area of the body, the first and second sections form a generally collapsed cone-shaped configuration.
    Type: Application
    Filed: January 30, 2002
    Publication date: May 13, 2004
    Inventor: Mitchell Adler
  • Patent number: 6175964
    Abstract: A garment comprising first and second sections of substantially equal size arranged on opposite sides of a vertex. The distal portions of the first and second sections have greater fabric surface than the medial portion of the garment. When the medial portion is draped on or about the body, the medial portion imparts a more sparse appearance than the distal portions of the first and second sections. When the garment is draped around an area of the body, the first and second sections form a generally collapsed cone-shaped configuration, displaying a neat and attractive appearance when the garment is worn.
    Type: Grant
    Filed: August 4, 1999
    Date of Patent: January 23, 2001
    Inventor: Mitchell Adler