-
公开(公告)号:CA2988269A1
公开(公告)日:2011-10-13
申请号:CA2988269
申请日:2010-09-22
Applicant: APPLE INC
Inventor: ALBERT ERIC , BALLARD LUCIA , CHAPMAN GREGORY R , CRANE NEIL GARETH , FORSTALL SCOTT , FREEDMAN GORDON J , GOODWIN DAVID WILLIAM , IAROCCI JOHN , LITZINGER DARREN , MARCELLINO CHRISTOPHER , MASON HENRY GRAHAM , MASPUTRA CAHYA , MYSZEWSKI DAVID , NOVICK GREGORY , SCHREYER RICHARD , SOKOL JOSEPH , SORRESSO DAMIEN , SRISUWANANUKORN CHARLES , VAN MILLIGAN MICHAEL , WASTON MATTHEW G , DUFFY THOMAS BROGAN , ROTHERT CURTIS
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation.
-
公开(公告)号:CA2988269C
公开(公告)日:2019-05-07
申请号:CA2988269
申请日:2010-09-22
Applicant: APPLE INC
Inventor: ALBERT ERIC , BALLARD LUCIA , CHAPMAN GREGORY R , CRANE NEIL GARETH , FORSTALL SCOTT , FREEDMAN GORDON J , GOODWIN DAVID WILLIAM , IAROCCI JOHN , LITZINGER DARREN , MARCELLINO CHRISTOPHER , MASON HENRY GRAHAM , MASPUTRA CAHYA , MYSZEWSKI DAVID , NOVICK GREGORY , SCHREYER RICHARD , SOKOL JOSEPH , SORRESSO DAMIEN , SRISUWANANUKORN CHARLES , VAN MILLIGAN MICHAEL , WASTON MATTHEW G , DUFFY THOMAS BROGAN , ROTHERT CURTIS
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation.
-
公开(公告)号:AU2010350737A1
公开(公告)日:2012-11-29
申请号:AU2010350737
申请日:2010-09-22
Applicant: APPLE INC
Inventor: ALBERT ERIC , BALLARD LUCIA , CHAPMAN GREGORY R , CRANE NEIL GARETH , DUFFY THOMAS BROGAN , FORSTALL SCOTT , FREEDMAN GORDON J , GOODWIN DAVID WILLIAM , IAROCCI JOHN , LITZINGER DARREN , MARCELLINO CHRISTOPHER , MASON HENRY GRAHAM , MASPUTRA CAHYA , MYSZEWSKI DAVID , NOVICK GREGORY , ROTHERT CURTIS , SCHREYER RICHARD , SOKOL JOSEPH , SORRESSO DAMIEN , SRISUWANANUKORN CHARLES , VAN MILLIGAN MICHAEL , WASTON MATTHEW G
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation
-
公开(公告)号:AU2016200941B2
公开(公告)日:2018-01-04
申请号:AU2016200941
申请日:2016-02-12
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:AU2012294770B2
公开(公告)日:2015-11-26
申请号:AU2012294770
申请日:2012-07-31
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:DE112010005473T5
公开(公告)日:2013-01-24
申请号:DE112010005473
申请日:2010-09-22
Applicant: APPLE INC
Inventor: ALBERT ERIC , CHAPMAN GREGORY R , FORSTALL SCOTT , CRANE NEIL GARETH , LITZINGER DARREN , MYSZEWSKI DAVID , SCHREYER RICHARD , SRISUWANANUKORN CHARLES , DUFFY THOMAS BROGAN , FREEDMAN GORDON J , GOODWIN DAVID WILLIAM , LAROCCI JOHN , MARCELLINO CHRISTOPHER , MASON HENRY GRAHAM , MASPUTRA CAHYA , NOVICK GREGORY , ROTHERT CURTIS , BALLARD LUCIA , SOKOL JOSEPH , SORRESSO DAMIEN , MILLIGAN MICHAEL VAN , WASTON MATTHEW G
Abstract: Dienste für eine persönliche elektronische Vorrichtung werden bereitgestellt, durch welche eine Form von Hintergrundverarbeitung oder Multitasking unterstützt wird. Die offenbarten Dienste erlauben es Nutzeranwendungen Vorteile aus Hintergrundverarbeitung zu ziehen, ohne signifikante negative Konsequenzen auf eine Nutzererfahrung des Vordergrundprozesses oder auf die Leistungsressourcen der persönlichen elektronischen Vorrichtung. Um das offenbarte Multitasking zu bewirken, werden ein oder mehrere einer Anzahl von operationellen Beschränkungen durchgesetzt. Eine Konsequenz solcher Beschränkungen kann es sein, dass ein Prozess in dem Hintergrundzustand nicht das tun kann, was es zu tun in der Lage wäre, wenn es in dem Vordergrundzustand wäre. Die Implementierung der offenbarten Dienste kann im Wesentlichen erkennbar für die ausführenden Nutzeranwendungen sein und kann, in einigen Fällen, ohne die explizite Kooperation der Nutzeranwendungen ausgeführt werden.
-
公开(公告)号:AU2016200941A1
公开(公告)日:2016-03-03
申请号:AU2016200941
申请日:2016-02-12
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:AU2012294770A1
公开(公告)日:2014-02-20
申请号:AU2012294770
申请日:2012-07-31
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:CA2795489A1
公开(公告)日:2011-10-13
申请号:CA2795489
申请日:2010-09-22
Applicant: APPLE INC
Inventor: ALBERT ERIC , BALLARD LUCIA , CHAPMAN GREGORY R , CRANE NEIL GARETH , DUFFY THOMAS BROGAN , FORSTALL SCOTT , FREEDMAN GORDON J , GOODWIN DAVID WILLIAM , IAROCCI JOHN , LITZINGER DARREN , MARCELLINO CHRISTOPHER , MASON HENRY GRAHAM , MASPUTRA CAHYA , MYSZEWSKI DAVID , NOVICK GREGORY , ROTHERT CURTIS , SCHREYER RICHARD , SOKOL JOSEPH , SORRESSO DAMIEN , SRISUWANANUKORN CHARLES , VAN MILLIGAN MICHAEL , WASTON MATTHEW G
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation
-
公开(公告)号:AU2018202051A1
公开(公告)日:2018-04-12
申请号:AU2018202051
申请日:2018-03-22
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
-
-
-
-
-
-
-
-