| 11861350 |
Secure delivery of assets to a trusted device |
Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl +2 more |
2024-01-02 |
| 11676188 |
Methods of authenticating a user |
Thomas Alsina, Augustin J. Farrugia, Byron B. Han, Sean B. Kelly, Craig A. Marciniak +2 more |
2023-06-13 |
| 11263020 |
System and method for wiping encrypted data on a device having file-level content protection |
Gordon J. Freedman, Thomas Brogan Duffy, Jr., Tahoma M. Toelkes, Michael J. Smith, Paul William Chinn +1 more |
2022-03-01 |
| 11144297 |
Secure delivery of assets to a trusted device |
Bailey E. Basile, Venkat V. Memula, Thomas P. Mensch, Robert M. Marini, David P. Remahl +2 more |
2021-10-12 |
| 11023587 |
External trust cache |
Julien Oster, Eric Harmon, Mitchell K. Allison, Pierre-Olivier J. Martel, Damien P. Sorresso +1 more |
2021-06-01 |
| 10931451 |
Securely recovering a computing device |
Joshua P. de Cesare, Michael J. Smith, Matthew Reda, Shantonu Sen, John Andrew Wright |
2021-02-23 |
| 10872042 |
Backup system with multiple recovery keys |
Michael D. Ford, Jerrold V. Hauck, Matthew G. Watson, Mitchell D. Adler, James Wilson |
2020-12-22 |
| 10771545 |
Keychain syncing |
Mitchell D. Adler, Michael Brouwer |
2020-09-08 |
| 10708049 |
Secure escrow service |
Jerrold V. Hauck, Mitchell D. Adler |
2020-07-07 |
| 10645573 |
Postponed carrier configuration |
David Fleischman, Patrick L. Coffman, Jeremy Wyld, Gregory N. Christie, Jerrold V. Hauck +10 more |
2020-05-05 |
| 10606611 |
Techniques for performing dynamic linking |
Louis G. Gerbarg, Nick Kledzik, Peter Cooper |
2020-03-31 |
| 10521214 |
Methods and systems for upgrade and synchronization of securely installed applications on a computing device |
Simon P. Cooper |
2019-12-31 |
| 10440561 |
Mobile device activation |
Jeffrey Bush, Scott Forstall, Jeffrey L. Robbin, Eddy Cue, Steve Jobs +1 more |
2019-10-08 |
| 10372932 |
Secure factory data generation and restoration |
Thomas P. Mensch, Jason D. Gosnell, Jerrold V. Hauck, Muralidhar S. Vempaty |
2019-08-06 |
| 10218685 |
Keychain syncing |
Michael Brouwer, Mitchell D. Adler |
2019-02-26 |
| 10153900 |
Secure escrow service |
Jerrold V. Hauck, Mitchell D. Adler |
2018-12-11 |
| 10142104 |
Securely recovering a computing device |
Joshua P. de Cesare, Michael J. Smith, Matthew Reda, Shantonu Sen, John Andrew Wright |
2018-11-27 |
| 10025597 |
System and method for wiping encrypted data on a device having file-level content protection |
Gordon J. Freedman, Thomas Brogan Duffy, Jr., Tahoma M. Toelkes, Michael J. Smith, Paul William Chinn +1 more |
2018-07-17 |
| 9904629 |
Backup system with multiple recovery keys |
Michael D. Ford, Jerrold V. Hauck, Matthew G. Watson, Mitchell D. Adler, James Wilson |
2018-02-27 |
| 9842062 |
Backup accessible by subset of related devices |
Michael D. Ford, Jerrold V. Hauck, Matthew G. Watson, Mitchell D. Adler, James Wilson |
2017-12-12 |
| 9825762 |
Secure escrow service |
Jerrold V. Hauck, Mitchell D. Adler |
2017-11-21 |
| 9710673 |
Conflict resolution for keychain syncing |
Michael Brouwer, Mitchell D. Adler |
2017-07-18 |
| 9684801 |
Data protection for keychain syncing |
Michael Brouwer, Mitchell D. Adler |
2017-06-20 |
| 9680648 |
Securely recovering a computing device |
Joshua P. de Cesare, Michael J. Smith, Matthew Reda, Shantonu Sen, John Andrew Wright |
2017-06-13 |
| 9672350 |
System and method of authorizing execution of software code based on at least one installed profile |
Heiko Gernot Albert Panther, Mitchell D. Adler, Simon P. Cooper, Michael Brouwer, Matt Reda |
2017-06-06 |