Patents by Inventor Paul William Chinn
Paul William Chinn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160202998Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: ApplicationFiled: January 11, 2016Publication date: July 14, 2016Inventors: Dallas Blake DE ATLEY, Gordon FREEDMAN, Thomas Brogan DUFFY, JR., Tahoma Madrone TOELKES, Michael John SMITH, Paul William CHINN, David RAHARDJA
-
Publication number: 20160066178Abstract: A method of activating a first device is disclosed. The method includes: the first device pairing with a second device; receiving a connection request from a second device; connecting to the second device; opening a communication channel to the second device; transmitting an activation package to the second device; receiving an activation payload from the second device; and performing an activation using information from the activation payload.Type: ApplicationFiled: September 2, 2014Publication date: March 3, 2016Inventors: Tyler HAWKINS, Christopher WILSON, Conrad SAUERWALD, Gregory NOVICK, Neil G. CRANE, Rudolph VAN DER MERWE, Samuel NOBLE, Paul William CHINN
-
Patent number: 9244673Abstract: Systems, methods, and non-transitory computer-readable storage media for updating software applications installed on client computing devices, creating a manifest file describing the differences between multiple versions of application archives present in an application distribution system, and coordinating an update process for updating the applications on the client computing devices are disclosed. A scheme of hard-linking to existing files, downloading new files, and erasing unwanted files can be used.Type: GrantFiled: September 6, 2012Date of Patent: January 26, 2016Assignee: Apple Inc.Inventors: Paul William Chinn, Eric Olaf Carlson, Cameron Stuart Birse, James Mensch, Ronnie Misra
-
Patent number: 9237016Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: GrantFiled: June 9, 2014Date of Patent: January 12, 2016Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
-
Publication number: 20150350323Abstract: Disclosed herein is a technique for managing disk space in user devices. A disk space manager is configured to manage the disk space by requesting clients running on the user device to free up disk space. The clients receive the requests and respond to the requests by deleting their own data to free up the requested disk space.Type: ApplicationFiled: September 29, 2014Publication date: December 3, 2015Inventors: Paul William CHINN, Timothy P. HANNON, Cameron S. BIRSE, Ronnie G. MIRSA
-
Publication number: 20140366157Abstract: The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file system that an assigned application can access to store data, while other applications are restricted access to the container. In some instances, it may be beneficial for multiple applications to share some data, while still maintaining other data in a secure location, thus an application can be assigned to multiple containers, a personal container that can only be accessed by the application, and a shared container that can be accessed by multiple applications. Further, an application can be assigned an alternate container, in addition to the personal container. The alternate container can be used when an alternate user is using the client device, thus restricting the alternate user from accessing any sensitive data stored in the personal container.Type: ApplicationFiled: June 7, 2013Publication date: December 11, 2014Inventors: Kelly B. Yancey, Jacques Anthony Vidrine, Eric Olaf Carlson, Paul William Chinn, Simon P. Cooper
-
Publication number: 20140351605Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: ApplicationFiled: June 9, 2014Publication date: November 27, 2014Applicant: Apple IncInventors: Dallas Blake DE ATLEY, Gordon FREEDMAN, Thomas Brogan DUFFY, JR., Tahoma Madrone TOELKES, Michael John SMITH, Paul William CHINN, David RAHARDJA
-
Publication number: 20140201316Abstract: A system is described to create and transmit a streamable ZIP file container. The streamable ZIP file container contains stream metadata, files, and a central directory. The stream metadata, files, and central directory can be saved in a contiguous stream without any intervening bytes. When the streamable ZIP file container is read by a client device that supports streamable ZIP file containers, the client device can exit the data stream without receiving the central directory. Interruptions during transmission of the ZIP file container can be resumed.Type: ApplicationFiled: January 17, 2013Publication date: July 17, 2014Applicant: Apple Inc.Inventors: Paul William Chinn, Eric Olaf Carlson, Ronnie Misra
-
Patent number: 8756419Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: GrantFiled: July 12, 2013Date of Patent: June 17, 2014Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
-
Publication number: 20130339715Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: ApplicationFiled: July 12, 2013Publication date: December 19, 2013Applicant: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
-
Publication number: 20130332916Abstract: Systems, methods, and non-transitory computer-readable storage media for updating software applications installed on client computing devices, creating a manifest file describing the differences between multiple versions of application archives present in an application distribution system, and coordinating an update process for updating the applications on the client computing devices are disclosed. A scheme of hard-linking to existing files, downloading new files, and erasing unwanted files can be used.Type: ApplicationFiled: September 6, 2012Publication date: December 12, 2013Applicant: Apple Inc.Inventors: Paul William Chinn, Eric Olaf Carlson, Cameron Stuart Birse, James Mensch, Ronnie Misra
-
Patent number: 8561207Abstract: A method for authenticating a multiple interface accessory device is provided. The method includes receiving enumeration information identifying the multiple interfaces supported by the accessory. The enumeration information includes information about a master interface supported by the accessory. A host device obtains authentication information from the accessory in accordance with a protocol associated with the master interface. Based on the authentication information, the host device determines whether the accessory is authorized to communicate with the host device. In the event that the accessory is authorized, the host device permits communication with the accessory using one or more of the multiple interfaces supported by the accessory.Type: GrantFiled: August 20, 2010Date of Patent: October 15, 2013Assignee: Apple Inc.Inventors: Paul William Chinn, Roberto G. Yepez, Anand Dalal
-
Patent number: 8433901Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: GrantFiled: April 7, 2010Date of Patent: April 30, 2013Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
-
Publication number: 20120047368Abstract: A method for authenticating a multiple interface accessory device is provided. The method includes receiving enumeration information identifying the multiple interfaces supported by the accessory. The enumeration information includes information about a master interface supported by the accessory. A host device obtains authentication information from the accessory in accordance with a protocol associated with the master interface. Based on the authentication information, the host device determines whether the accessory is authorized to communicate with the host device. In the event that the accessory is authorized, the host device permits communication with the accessory using one or more of the multiple interfaces supported by the accessory.Type: ApplicationFiled: August 20, 2010Publication date: February 23, 2012Applicant: Apple Inc.Inventors: Paul William Chinn, Roberto G. Yepez, Anand Dalal
-
Publication number: 20110252232Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: ApplicationFiled: April 7, 2010Publication date: October 13, 2011Applicant: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, JR., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja