-
公开(公告)号:US20170357830A1
公开(公告)日:2017-12-14
申请号:US15275273
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Conrad Sauerwald , Mitchell D. Adler , Michael Brouwer , Timothee Geoghegan , Andrew R. Whalley , David P. Finkelstein , Yannick L. Sierra
Abstract: Techniques are disclosed relating to securely storing data in a computing device. In one embodiment, a computing device includes a secure circuit configured to maintain key bags for a plurality of users, each associated with a respective one of the plurality of users and including a first set of keys usable to decrypt a second set of encrypted keys for decrypting data associated with the respective user. The secure circuit is configured to receive an indication that an encrypted file of a first of the plurality of users is to be accessed and use a key in a key bag associated with the first user to decrypt an encrypted key of the second set of encrypted keys. The secure circuit is further configured to convey the decrypted key to a memory controller configured to decrypt the encrypted file upon retrieval from a memory.
-
公开(公告)号:US10235152B2
公开(公告)日:2019-03-19
申请号:US14866816
申请日:2015-09-25
Applicant: Apple Inc.
Inventor: Christopher S. Linn , Eric S. Brown , Eric O. Carlson , Cindy M. Barrett , Jonathan M. Grynspan , Donald M. Firlik , Cameron S. Birse , Timothee Geoghegan
Abstract: Disclosed herein is a technique for downgrading applications to placeholder applications in order to free up storage space in a user device. Based on a variety of heuristics, a number of installed applications are identified as candidates for a downgrade. The downgrading of the identified applications involves creating a placeholder application for each of the identified applications. The identified applications are temporarily deleted while keeping the user data associated with the applications intact and the placeholder applications are installed.
-
公开(公告)号:US11662996B2
公开(公告)日:2023-05-30
申请号:US17660365
申请日:2022-04-22
Applicant: Apple Inc.
Inventor: Christopher S. Linn , Eric S. Brown , Eric O. Carlson , Cindy M. Barrett , Jonathan M. Grynspan , Donald M. Firlik , Cameron S. Birse , Timothee Geoghegan
Abstract: A technique for downgrading applications to placeholder applications in order to free up storage space in a user device. Based on a variety of heuristics, a number of installed applications are identified as candidates for a downgrade. The downgrading of the identified applications involves creating a placeholder application for each of the identified applications. The identified applications are temporarily deleted while keeping the user data associated with the identified applications intact and the placeholder applications are installed.
-
公开(公告)号:US11314498B2
公开(公告)日:2022-04-26
申请号:US16226259
申请日:2018-12-19
Applicant: Apple Inc.
Inventor: Christopher S. Linn , Eric S. Brown , Eric O. Carlson , Cindy M. Barrett , Jonathan M. Grynspan , Donald M. Firlik , Cameron S. Birse , Timothee Geoghegan
Abstract: Disclosed herein is a technique for downgrading applications to placeholder applications in order to free up storage space in a user device. Based on a variety of heuristics, a number of installed applications are identified as candidates for a downgrade. The downgrading of the identified applications involves creating a placeholder application for each of the identified applications. The identified applications are temporarily deleted while keeping the user data associated with the applications intact and the placeholder applications are installed.
-
公开(公告)号:US10423804B2
公开(公告)日:2019-09-24
申请号:US15275273
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Conrad Sauerwald , Mitchell D. Adler , Michael Brouwer , Timothee Geoghegan , Andrew R. Whalley , David P. Finkelstein , Yannick L. Sierra
Abstract: Techniques are disclosed relating to securely storing data in a computing device. In one embodiment, a computing device includes a secure circuit configured to maintain key bags for a plurality of users, each associated with a respective one of the plurality of users and including a first set of keys usable to decrypt a second set of encrypted keys for decrypting data associated with the respective user. The secure circuit is configured to receive an indication that an encrypted file of a first of the plurality of users is to be accessed and use a key in a key bag associated with the first user to decrypt an encrypted key of the second set of encrypted keys. The secure circuit is further configured to convey the decrypted key to a memory controller configured to decrypt the encrypted file upon retrieval from a memory.
-
-
-
-