Issued Patents All Time
Showing 26–50 of 69 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9542558 | Secure factory data generation and restoration | Thomas P. Mensch, Jason D. Gosnell, Jerrold V. Hauck, Muralidhar S. Vempaty | 2017-01-10 |
| 9479583 | Conflict resolution for keychain syncing | Michael Brouwer, Mitchell D. Adler | 2016-10-25 |
| 9460313 | Secure escrow service | Jerrold V. Hauck, Mitchell D. Adler | 2016-10-04 |
| 9451450 | Postponed carrier configuration | David Fleischman, Patrick L. Coffman, Jeremy Wyld, Gregory N. Christie, Jerry Hauck +10 more | 2016-09-20 |
| 9378340 | Methods and systems for upgrade and synchronization of securely installed applications on a computing device | Simon P. Cooper | 2016-06-28 |
| 9336394 | Securely recovering a computing device | Joshua P. de Cesare, Michael J. Smith, Matthew Reda, Shantonu Sen, John Andrew Wright | 2016-05-10 |
| 9237016 | System and method for wiping encrypted data on a device having file-level content protection | Gordon J. Freedman, Thomas Brogan Duffy, Jr., Tahoma M. Toelkes, Michael J. Smith, Paul William Chinn +1 more | 2016-01-12 |
| 9208201 | Cloud storage | Dominic Giampaolo, Matthew G. Watson, Matthew Reda, Curtis C. Galloway, Benjamin C. Trumbull +1 more | 2015-12-08 |
| 9197700 | Keychain syncing | Michael Brouwer, Mitchell D. Adler | 2015-11-24 |
| 9124637 | Data protection for keychain syncing | Michael Brouwer, Mitchell D. Adler | 2015-09-01 |
| 9106411 | Secure escrow service | Jerrold V. Hauck, Mitchell D. Adler | 2015-08-11 |
| 9077759 | Conflict resolution for keychain syncing | Michael Brouwer, Mitchell D. Adler | 2015-07-07 |
| 8977294 | Securely locating a device | — | 2015-03-10 |
| 8948729 | Secure device configuration profiles | Mitchell D. Adler, Curtis C. Galloway, Christophe Allie, Conrad Sauerwald, Dieter Siegmund +5 more | 2015-02-03 |
| 8880736 | Methods and systems for archiving and restoring securely installed applications on a computing device | Simon P. Cooper | 2014-11-04 |
| 8849278 | Mobile device activation | Jeffrey Bush, Scott Forstall, Jeffrey L. Robbin, Eddy Cue, Phillip W. Schiller +2 more | 2014-09-30 |
| 8850135 | Secure software installation | Simon P. Cooper | 2014-09-30 |
| 8850140 | Data backup for mobile device | Scott Forstall, Gordie Freedman, David Heller, Steve Jobs, Jeffrey L. Robbin | 2014-09-30 |
| 8850572 | Methods for handling a file associated with a program in a restricted program environment | Toby Paterson, Jason Clay Beaver, Gregory Novick, John J. Iarocci, Curtis C. Galloway +1 more | 2014-09-30 |
| 8826405 | Trusting an unverified code image in a computing device | Joshua P. de Cesare, Michael J. Smith, John Andrew Wright | 2014-09-02 |
| 8806221 | Securely recovering a computing device | Joshua P. de Cesare, Michael J. Smith, Matthew Reda, Shantonu Sen, John Andrew Wright | 2014-08-12 |
| 8798677 | Service provider activation | Jeffrey Bush, Jerry Hauck, Ronald K. Huang, Brainard Sathianathan | 2014-08-05 |
| 8789037 | Compatible trust in a computing device | Joshua P. de Cesare, Michael J. Smith, Jerry Hauck, Jeffrey Bush | 2014-07-22 |
| 8756419 | System and method for wiping encrypted data on a device having file-level content protection | Gordon J. Freedman, Thomas Brogan Duffy, Jr., Tahoma M. Toelkes, Michael J. Smith, Paul William Chinn +1 more | 2014-06-17 |
| 8725112 | Activation solution | Jerrold V. Hauck, Muralidhar S. Vempaty, Onur Tackin | 2014-05-13 |