-
公开(公告)号:AU2009222009B2
公开(公告)日:2013-02-07
申请号:AU2009222009
申请日:2009-03-02
Applicant: APPLE INC
Inventor: PANTHER HEIKO , COOPER SIMON , REDA MATT , ADLER MITCHELL , DE ATLEY DALLAS , BROUWER MICHAEL
IPC: G06F21/00
Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.
-
22.
公开(公告)号:AU2011101205B4
公开(公告)日:2012-08-23
申请号:AU2011101205
申请日:2011-09-19
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , ADLER MITCHELL , SCHUBERT EMILY CLARK , DOROGUSKER JESSE LEE , TOPRANI SHYAM S , ANANNY JOHN M , LANGENFELD PETER T , KRUEGER SCOTT
IPC: H04J3/16
Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
-
23.
公开(公告)号:GB2481349A
公开(公告)日:2011-12-21
申请号:GB201117660
申请日:2010-03-11
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , SCHUBERT EMILY CLARK , DOROGUSKER JESSE L , TOPRANI SHYAM S , LANGENFELD PETER T , KRUEGER SCOTT , ANANNY JOHN M , ADLER MITCHELL
Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
-
公开(公告)号:AU2009100750B4
公开(公告)日:2010-04-01
申请号:AU2009100750
申请日:2009-08-03
Applicant: APPLE INC
Inventor: RUBINSTEIN JONATHAN JAKE , ARCHIBALD JOHN WESLEY , FADELL ANTHONY M , DOROGUSKER JESSE L , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100749B4
公开(公告)日:2010-04-01
申请号:AU2009100749
申请日:2009-08-03
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , ADLER MITCHELL , ARCHIBALD JOHN WESLEY , DOROGUSKER JESSE L , RUBINSTEIN JONATHAN JAKE
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009222009A1
公开(公告)日:2009-09-11
申请号:AU2009222009
申请日:2009-03-02
Applicant: APPLE INC
Inventor: BROUWER MICHAEL , COOPER SIMON , ATLEY DALLAS DE , REDA MATT , PANTHER HEIKO , ADLER MITCHELL
IPC: G06F21/00
Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.
-
27.
公开(公告)号:AU2009222006A1
公开(公告)日:2009-09-11
申请号:AU2009222006
申请日:2009-03-02
Applicant: APPLE INC
Inventor: PANTHER HEIKO , ADLER MITCHELL , REDA MATT , BROUWER MICHAEL , COOPER SIMON , ATLEY DALLAS DE
IPC: G06F21/00
-
公开(公告)号:AU2009100750A4
公开(公告)日:2009-09-10
申请号:AU2009100750
申请日:2009-08-03
Applicant: APPLE INC
Inventor: RUBINSTEIN JONATHAN JAKE , ARCHIBALD JOHN WESLEY , FADELL ANTHONY M , DOROGUSKER JESSE L , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:HK1114196A1
公开(公告)日:2008-10-24
申请号:HK08103946
申请日:2008-04-09
Applicant: APPLE INC
Inventor: RUBINSTEIN JONATHAN JAKE , ANTHONY M FADELL M , JESSE L DOROGUSKER L , ADLER MITCHELL , ARCHIBALD JOHN WESLEY
IPC: G06F20060101
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2005323229A2
公开(公告)日:2006-07-13
申请号:AU2005323229
申请日:2005-12-13
Applicant: APPLE INC
Inventor: ARCHIBALD JOHN WESLEY , DOROGUSKER JESSE L , ADLER MITCHELL , RUBINSTEIN JONATHAN JAKE , FADELL ANTHONY M
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
-
-
-
-
-
-
-
-