Patent application number | Description | Published |
20110179194 | METHODS FOR HANDLING REMOVAL OF MEDIA STORAGE DEVICES - In response to an insertion of a removable storage device into a data processing system, the removable storage device is automatically mounted by an operating system (OS) in a file system of the data processing system. A daemon is configured to determine a type of media content stored in the removable storage device and to identify a program that is associated with the type of the media content of the removable storage device. The identified program is automatically launched for accessing the media content of the removable storage device. In response to a termination of the program, the removable storage device is automatically unmounted from the file system of the data processing system without user intervention. | 07-21-2011 |
20110179483 | METHODS FOR HANDLING A FILE ASSOCIATED WITH A PROGRAM IN A RESTRICTED PROGRAM ENVIRONMENT - Techniques for handling a file associated with a program are described herein. According to an aspect of the invention, in response to a request for accessing a file received through a first program, the file is stored in a first sandboxed storage area, where the file is to be accessed by a second program. An atomic move operation is then performed on the file that atomically moves the file from the first sandboxed storage area to a second sandboxed storage area, where the first sandboxed storage area is not accessible to the first program and second program. The second program is launched to access the file stored in the second sandboxed storage area, where the second sandboxed storage area is a part of a sandbox associated with the second program. | 07-21-2011 |
20110258426 | BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor. | 10-20-2011 |
20120309348 | ACTIVATION SOLUTION - To securely factory activate a mobile device according to authorized records, factory activation server generates and sends a signed factory activation record including a signed factory activation ticket. Signed factory activation record and ticket are cryptographically signed using factory private key stored in factory activation server. Factory private key is different from customer private key stored in the activation server that provides activation tickets for customer activation. If factory activation record is valid, application processor (AP) included in the device performs factory activation of the device which includes AP activating to allow for factory testing and rebooting at a predetermined reboot time. Wireless communication processor (BB) included in the device verifies the factory activation ticket and if valid, BB performs factory activation including: BB registering to a cellular telephone communications network for factory testing, and unregistering from the network after a predetermined unregistering time. Other embodiments are also described. | 12-06-2012 |
20140093084 | Secure Escrow Service - A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key. | 04-03-2014 |
20140208404 | CONFLICT RESOLUTION FOR KEYCHAIN SYNCING - Some embodiments provide a program that synchronizes a keychain stored on a device with a set of other devices. The keychain includes a set of keychain items. The program receives (1) a list of keychain items for updating the keychain stored on the device and (2) data representing the keychain items specified in the list of keychain items. For each keychain item in the list of keychain items, the program updates the keychain stored on the device with the data that represents the keychain item. | 07-24-2014 |
20140208434 | DATA PROTECTION FOR KEYCHAIN SYNCING - Some embodiments provide a program that provides data protection for a device when synchronizing a set of keychains stored on the device with a set of other devices. The program receives keychain data for synchronizing the set of keychains stored on the device with the set of other devices. The keychain data is specified as belonging to a protection domain. The program determines whether a set of conditions defined for the protection domain is satisfied. When the set of conditions is determined as satisfied, the program allows access to the keychain data in order to process the keychain data and synchronize the set of keychains stored on the device with the set of other devices. | 07-24-2014 |
20140281540 | KEYCHAIN SYNCING - Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels. | 09-18-2014 |