Patent application number | Description | Published |
20090006498 | Peer-to-Peer Syncing in a Decentralized Environment - An apparatus and method of synchronizing a datum between a plurality of stores uses version vectors associated with the datum in each store. Each version vector has one or more entries, and each entry has an identifier and a value. The identifier identifies a store that has modified the datum, and the value indicates a number of modifications to the datum made by the store. When synchronizing the datum between stores, the version vectors of the datum are compared to determine whether one version vector is subordinate to another version vector. The datum in the store having the subordinate version vector is then replaced with the datum having the dominant version vector. When compared, a conflict resolution by a user is required if the version vectors are not identical, if the version vectors do not have all the same identifiers, and if one version vector does not contain all of the identifiers with equal or greater values of those in the other version vector. | 01-01-2009 |
20090144343 | PEER-TO-PEER N-WAY SYNCING IN DECENTRALIZED ENVIRONMENT - An apparatus and method of synchronizing a datum between a plurality of stores is disclosed. A version history is associated with the datum in each store. The version history has one or more entries, and each entry has an identifier and a value. The identifier identifies a store that has modified the datum, and the value indicates a number of modifications to the datum made by the store. When synchronizing the datum between stores, the version histories of the datum are compared to determine whether one version history is subordinate to another version history. The datum in the store having the subordinate version history is then replaced with the datum having the dominant version history. When compared, a conflict resolution by a user is required if the version histories are not identical, if the version histories do not have all the same identifiers, and if one version history does not contain all of the identifiers with equal or greater values of those in the other version history. | 06-04-2009 |
20100299444 | Wide Area Peer-to-Peer Synching in a Decentralized Environment - A system and method are disclosed for synchronizing data between devices and more particularly for synchronizing data between a plurality of peer-to-peer devices in a decentralized environment where no one device stores the most “recent” or “true” version of the data. Embodiments of the invention relate concepts of discovering synchronizing peers, communication between peers using special techniques, and using a way station concept as an aid for both discovery and synchronization between peers that are not simultaneously available. | 11-25-2010 |
20110016089 | RESTORING DATA TO A MOBILE DEVICE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for backing up and restoring data to a mobile device. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving data from a mobile device to be included in a backup, the data including data associated with one or more mobile device applications; storing the data in a backup archive; generating a backup mapping file for each of the mobile device applications, each backup mapping file identifying each file in the backup associated with the respective application; and using the backup mapping files to restore the corresponding applications to the mobile device. | 01-20-2011 |
20110252240 | Mobile Device Management - Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to receiving a notification from the management server, a trust of the notification may be verified against the management profile. If the trust is verified, a network session may be established with the management server. The network session may be secured via a certificate in the management profile. Management operations may be performed for management commands received over the secure network session to manage the configurations transparently to a user of the wireless device according to the control. | 10-13-2011 |
20110264623 | METHOD AND SYSTEM FOR USING GLOBAL EQUIVALENCY SETS TO IDENTIFY DATA DURING PEER-TO-PEER SYNCHRONIZATION - Systems and methods for synchronization including the use of a global equivalency identification datum or set of datum. A universally unique identification datum may be associated with each independently created associated data set. In some embodiments, a synchronization server software element may be responsible for maintaining synchronization for a plurality of clients, including software elements or devices. A record believed to be new by the software elements may verify that the record is actually new. In some embodiments, verification of the record's newness involves assuming that the local ID is a global identification datum and comparing that datum to the all the sets of datum that the Sync-Server knows about. The synchronization server software element may use a table to hold information for all of the records known to that element. In some embodiments these records may have been deleted in the past. | 10-27-2011 |
20120030173 | PEER-TO-PEER SYNCING IN A DECENTRALIZED ENVIRONMENT - An apparatus and method of synchronizing a datum between a plurality of stores uses version vectors associated with the datum in each store. Each version vector has one or more entries, and each entry has an identifier and a value. The identifier identifies a store that has modified the datum, and the value indicates a number of modifications to the datum made by the store. When synchronizing the datum between stores, the version vectors of the datum are compared to determine whether one version vector is subordinate to another version vector. The datum in the store having the subordinate version vector is then replaced with the datum having the dominant version vector. When compared, a conflict resolution by a user is required if the version vectors are not identical, if the version vectors do not have all the same identifiers, and if one version vector does not contain all of the identifiers with equal or greater values of those in the other version vector. | 02-02-2012 |
20130031055 | PEER-TO-PEER N-WAY SYNCING IN A DECENTRALIZED ENVIRONMENT - A technique for synchronizing a datum between a plurality of stores, wherein a version history is associated with the datum in each store. The version history has one or more entries, and each entry has an identifier and a value. The identifier identifies a store that has modified the datum, and indicates a number of modifications to the datum. When synchronizing the datum between stores, the version histories of the datum are compared to determine whether one version history is subordinate to another version history. The datum having the subordinate version history is then replaced with the datum having the dominant version history. Conflict resolution is required if the version histories are not identical, if the version histories do not have the same identifiers, and if one version history does not contain all of the identifiers with equal or greater values of those in the other version history. | 01-31-2013 |
20130247166 | MOBILE DEVICE MANAGEMENT - Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to receiving a notification from the management server, a trust of the notification may be verified against the management profile. If the trust is verified, a network session may be established with the management server. The network session may be secured via a certificate in the management profile. Management operations may be performed for management commands received over the secure network session to manage the configurations transparently to a user of the wireless device according to the control. | 09-19-2013 |
Patent application number | Description | Published |
20110252232 | SYSTEM AND METHOD FOR WIPING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys. | 10-13-2011 |
20110252233 | SYSTEM AND METHOD FOR BACKING UP AND RESTORING FILES ENCRYPTED WITH FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating a backup, backing up encrypted data, and restoring backed up encrypted data. The method for initiating a backup includes sending a backup secret to a backup device having an encrypted file system, receiving from the backup device a backup ticket created based on the backup secret, and storing the backup ticket. The method for backing up encrypted data includes receiving a backup ticket and a backup secret, retrieving an escrow key bag containing protection class keys, decrypting the protection class keys with the backup ticket, generating a backup key bag containing new protection class keys, selecting a set of encrypted files to back up, decrypting the file encryption keys with corresponding decrypted protection class keys, re-encrypting the file encryption keys with new protection class keys, and transferring the selected encrypted files, the backup key bag, and metadata. | 10-13-2011 |
20110252234 | SYSTEM AND METHOD FOR FILE-LEVEL DATA PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Also disclosed is a method of verifying a password by decrypting a key bag, retrieving data from an encrypted file using an encryption key from the decrypted key bag, and verifying the password by comparing retrieved data with expected data. | 10-13-2011 |
20110252236 | SYSTEM AND METHOD FOR SYNCHRONIZING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating data synchronization between devices. The method includes sending a host identifier and pairing record to a second device having a file system encrypted on a per file and on a per class basis for a set of classes, receiving from the second device a sync ticket containing encryption keys for the set of classes, and storing the sync ticket. Also disclosed is a method for synchronizing encrypted data between devices. This method includes receiving, at a first device having a file system encrypted on a per file and on a per class basis, a sync ticket containing encryption keys from a second device, retrieving an escrow key bag containing protection class keys, decrypting protection class keys based on the sync ticket, and synchronizing data with the second device based on the decrypted protection class keys. | 10-13-2011 |
20130339715 | SYSTEM AND METHOD FOR WIPING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys. | 12-19-2013 |
20140351605 | SYSTEM AND METHOD FOR WIPING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys. | 11-27-2014 |
Patent application number | Description | Published |
20090006640 | INCREMENTAL SECURE BACKUP AND RESTORE OF USER SETTINGS AND DATA - Methods and apparatuses for performing secure incremental backup and restore operations are disclosed. | 01-01-2009 |
20090307279 | REFRESH AND FILTER ANCHORS - Structured data on a device is synchronized with structured data on a host if the device and the host have a matching refresh anchor. Structured data on the device is additively synchronized with structured data on the host if the device and the host have different refresh anchors. Additive synchronization combines structured data from the device with structured data on the host without deleting structured data from the device or the host. | 12-10-2009 |
20100145908 | SYNCHRONIZATION METHODS AND SYSTEMS - Widget synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component which is configured to cause retrieval and storage of data for a first data class for one or more widgets from a first store of the data on a device, such as a first data processing system, and is configured to synchronize data for the first data class in the first store with data of the first data class in a second store on at least one of a host or another device, such as a second data processing system. The first software component is separate from a widget application software which provides a user interface to allow a user to use the data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device. | 06-10-2010 |
20100306170 | SYNCHRONIZATION METHODS AND SYSTEMS - Connection architectures, methods, systems and computer readable media are described. In one exemplary embodiment, a computer readable medium comprises a first software component which is configured to interface, through first software based messages, with synchronization software components during a structured data synchronization process between a host and a device and which is configured to interface, through second software based messages, with a plurality of different stream handlers for a corresponding plurality of physical interfaces. Systems, methods, architectures and other computer readable media are also described. | 12-02-2010 |
20110016087 | SYNCHRONIZATION METHODS AND SYSTEMS - Synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component which is configured to cause retrieval and storage of structured data for a first data class from a first store of the structured data on a device, such as a first data processing system, and is configured to synchronize structured data for the first data class in the first store with structured data of the first data class in a second store on a host, such as a second data processing system. The first software component is separate from an application software which provides a user interface to allow a user to access and edit the structured data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device and which controls an order of synchronizing and a plurality of data classes including the first data class. | 01-20-2011 |
20110252026 | TOP SEARCH HITS BASED ON LEARNED USER PREFERENCES - At least certain embodiments of the present disclosure include a method to identify top hits in search result based on learned user preferences. In one embodiment, a user search query for records is received from a user. The user search query may contain an alphanumerical string. Records in a multifunctional device are searched to find those that match the alphanumerical string. Based on records previously selected by the user, records in the search result are ranked to identify one or more top hits for the user. | 10-13-2011 |
20110252038 | SEARCH EXTENSIBILITY TO THIRD PARTY APPLICATIONS - At least certain embodiments of the present disclosure include a method to extend search capabilities to third party applications installed on a device. In one embodiment, records associated with a third party application are indexed in a process isolated from other third party applications installed on the device using a search plugin specific to the third party application. Furthermore, the indexed records can be searched in response to a user search query without invoking the third party application. | 10-13-2011 |
20110252423 | Opportunistic Multitasking - Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. By way of example, network-based applications may be suspended until a message is received for them. At that time, the suspended application may be moved into the background state where it is permitted to respond to the message. In a similar fashion, audio application may be permitted to execute in background until suspended by user action. At that time, the application is suspended. | 10-13-2011 |
20120221515 | SYNCHRONIZATION METHODS AND SYSTEMS - Synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component configured to cause retrieval and storage of structured data for a first data class from a first store on a device, such as a first data processing system, and configured to synchronize structured data for the first data class in the first store with structured data of the first data class in a second store on a host, such as a second data processing system. The first software component is separate from an application software which provides a user interface to allow a user to access and edit the structured data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device and which controls an order of synchronizing and a plurality of data classes including the first data class. | 08-30-2012 |
20120260099 | INCREMENTAL SECURE BACKUP AND RESTORE OF USER SETTINGS AND DATA - Methods and apparatuses for performing secure incremental backup and restore operations are disclosed. | 10-11-2012 |
20120317216 | SYNCHRONIZATION METHODS AND SYSTEMS - Systems, methods and computer readable media for synchronization of electronic message accounts. In one embodiment, a method includes receiving information to establish an electronic message account on a first data processing system, the electronic message account being defined by setup information, and synchronizing the setup information onto a store on a second data processing system. In another embodiment, a method includes receiving information to establish an electronic message account, defined by first setup information, on a host and synchronizing the first setup information onto a device when the device is coupled to the host for synchronization. Systems, other methods and computer readable media are also described. | 12-13-2012 |
Patent application number | Description | Published |
20120310889 | METHODS AND APPARATUS FOR MULTI-PHASE MULTI-SOURCE BACKUP - Methods and apparatus that identify a change of resources in a device to a first backup source are described. In response to receiving a token from the first backup source for authorization to a second backup source, the change of resources can be backed up to the second backup source with the token. The change of resources can be committed to the first backup source if the back up of the change to the second backup source is successful. | 12-06-2012 |
20120310894 | METHODS AND APPARATUS FOR INTERFACE IN MULTI-PHASE RESTORE - Methods and apparatus to restore resources to a device according to an order of the resources requested by a user are described. The restoration may be interrupted in response to a user request to update an order to restore remaining resources yet to restore. The remaining resources may be restored according to the updated order. | 12-06-2012 |
20120310896 | METHODS AND APPARATUS FOR MULTI-PHASE RESTORE - Methods and apparatus to identify at least a first portion and a second portion of resources to restore to a device are described. The first portion of the resources may be restored atomically to the device before the second portion of the resources. The device may not respond to at least one user input during the restoration of the first portion of the resources. If the restoring of the first portion is successful, the second portion of the resources may be restored. The device may respond to the user input during the restoring of the second portion of the resources. | 12-06-2012 |
20120311161 | DUAL-PHASE CONTENT SYNCHRONIZATION - Metadata is synchronized between a mobile device and a remote node over a first network, where the metadata specifies media content to be synchronized between the mobile device and the remote node. Subsequently a network connection is established with the remote node over a second network. The media content is bi-directionally synchronized between the mobile device and the remote node over the second network based on the metadata that was synchronized over the first network. | 12-06-2012 |
20120311280 | METHODS AND APPARATUS FOR MULTI-SOURCE RESTORE - Methods and apparatus that restore a resource from a first source and a second source to a device are described. Availability of the resource from a second source may be dynamically determined after a portion of the resource has been restored to the device from the first source. If the second source is determined to be more efficiently connected with the device than the first source, a remaining portion of the resource may be restored from the second source to the device after the portion of the resource has been restored to the device. | 12-06-2012 |
20120311366 | METHODS AND APPARATUS FOR POWER STATE BASED BACKUP - Methods and apparatus that receive, at a wireless device, power through wire or inductive pad are described. The received power is monitored to back up data from the device to a server in a network through an OTA (over the air) wireless interface. The data is transmitted to the server to back up the data on the device. While backing up the data, whether the power has been removed from the device is determined. The backing up of the data in the device can be terminated automatically and without user request, in response to the determination that the power has been removed. | 12-06-2012 |
20130086408 | METHODS AND APPARATUS FOR POWER STATE BASED BACKUP - Methods and apparatus that receive, at a wireless device, power through wire or inductive pad are described. The received power is monitored to back up data from the device to a server in a network through an OTA (over the air) wireless interface. The data is transmitted to the server to back up the data on the device. While backing up the data, whether the power has been removed from the device is determined. The backing up of the data in the device can be terminated automatically and without user request, in response to the determination that the power has been removed. | 04-04-2013 |
20130218996 | SYNCHRONIZATION METHODS AND SYSTEMS - Systems, methods and computer readable media for synchronization of electronic message accounts. In one embodiment, a method includes receiving information to establish an electronic message account on a first data processing system, the electronic message account being defined by setup information, and synchronizing the setup information onto a store on a second data processing system. In another embodiment, a method includes receiving information to establish an electronic message account, defined by first setup information, on a host and synchronizing the first setup information onto a device when the device is coupled to the host for synchronization. Systems, other methods and computer readable media are also described. | 08-22-2013 |
20130332846 | EXTENSIBLE APPLICATION STATE PRESERVATION ARCHITECTURE - The preservation of the user interface state of first application on a first device allows, in one embodiment, a user to resume use of at least a portion of the user interface state on a second application on second devices. The first and second applications can be the same or different (with some common user interface UI features or elements and other UI features that are different). Other embodiments are also described. | 12-12-2013 |
20150026124 | SYNCHRONIZATION METHODS AND SYSTEMS - Synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component which is configured to cause retrieval and storage of structured data for a first data class from a first store of the structured data on a device, such as a first data processing system, and is configured to synchronize structured data for the first data class in the first store with structured data of the first data class in a second store on a host, such as a second data processing system. The first software component is separate from an application software which provides a user interface to allow a user to access and edit the structured data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device and which controls an order of synchronizing and a plurality of data classes including the first data class. | 01-22-2015 |
Patent application number | Description | Published |
20080206333 | Extended Release Pharmaceutical Formulations of S-Adenosylmethionine - Extended release formulations of S-methyladenosylmethionine (SAMe) are provided, as are methods of treating various disorders using extended release SAMe formulations. The extended release formulations may be used to treat a variety of disorders, including liver disorders, psychiatric disorders and joint disorders. Thus, extended release SAMe formulations may be used to treat alcoholic liver disease, fatty liver disease, hepatitis, generalized anxiety disorder, obsessive compulsive disorder, post traumatic stress disorder, panic disorder, and depressive disorders such as depression (e.g. major clinical depression) and dysthymia. | 08-28-2008 |
20090088404 | Extended Release Pharmaceutical Formulations of S-Adenosylmethionine - Extended release formulations of S-methyladenosylmethionine (SAMe) are provided, as are methods of treating various disorders using extended release SAMe formulations. The extended release formulations may be used to treat a variety of disorders, including liver disorders, psychiatric disorders and joint disorders. Thus, extended release SAMe formulations may be used to treat alcoholic liver disease, fatty liver disease, hepatitis, generalized anxiety disorder, obsessive compulsive disorder, post traumatic stress disorder, panic disorder, and depressive disorders such as depression (e.g. major clinical depression) and dysthymia. | 04-02-2009 |
20090197824 | Extended Release Pharmaceutical Formulations of S-Adenosylmethionine - Extended release formulations of S-methyladenosylmethionine (SAMe) are provided, as are methods of treating various disorders using extended release SAMe formulations. The extended release formulations may be used to treat a variety of disorders, including liver disorders, psychiatric disorders and joint disorders. Thus, extended release SAMe formulations may be used to treat alcoholic liver disease, fatty liver disease, hepatitis, generalized anxiety disorder, obsessive compulsive disorder, post traumatic stress disorder, panic disorder, and depressive disorders such as depression (e.g. major clinical depression) and dysthymia. | 08-06-2009 |
Patent application number | Description | Published |
20090079421 | Measurement-Only Topological Quantum Computation - Measurement-only topological quantum computation using both projective and interferometrical measurement of topological charge is described. Various issues that would arise when realizing it in fractional quantum Hall systems are discussed. | 03-26-2009 |
20110287941 | Method for Planar Implementation of PI/8 Gate in Chiral Topological Superconductors - Disclosed herein is a topologically protected π/8-gate which becomes universal when combined with the gates available through quasi-particle braiding and planar quasi-particle interferometry. A twisted interferometer, and a planar π/8-gate in CTS, implemented with the help of the twisted interferometer, are disclosed. Embodiments are described in the context of state X (CTS) supported by an ISH, although the concept of a twisted-interferometer is more general and has relevance to all anionic, i.e. quasiparticle systems. | 11-24-2011 |
20120028806 | Method For Planar Implementation Of PI/8 Gate In Chiral Topological Superconductors - Disclosed herein is a topologically protected π/8-gate which becomes universal when combined with the gates available through quasi-particle braiding and planar quasi-particle interferometry. A twisted interferometer, and a planar π/8-gate in CTS, implemented with the help of the twisted interferometer, are disclosed. Embodiments are described in the context of state X (CTS) supported by an ISH, although the concept of a twisted-interferometer is more general and has relevance to all anionic, i.e. quasiparticle systems. | 02-02-2012 |
20120258861 | TWISTED TRACK INTERFEROMETER FOR PRODUCING MAGIC STATES - A twisted track interferometer (TTI) for producing magic states is disclosed. The spin of ½-vortices may be exploited to produce magic states. The disclosed “twisted track interferometer” is a “topological twist” on the conventional Pabre-Pero interferometer adapted to topological superconductors. In the disclosed TTI, the probe particles may be Josephson vortices (JVs). JVs are estimated to be light and will tunnel more easily than Abrikosov vortices. Also, the disclosed TTI does not require multiple tunneling events. Rather, the JVs are propelled down thin insulating tracks within a 2D topological p-wave superconductor by a Magnus force generated by a tunneling supercurrent across the tracks. The JVs encounter tunneling junctions as they pass into the arms of the TTI. | 10-11-2012 |