-
公开(公告)号:US12210612B2
公开(公告)日:2025-01-28
申请号:US17664206
申请日:2022-05-19
Applicant: Apple Inc.
Inventor: Geoffrey McCormack , Damien P. Sorresso , Eric B. Tamura , Robert J. Kendall-Kuppe
Abstract: Enclosed herein are techniques for securely executing an application. A method can be implemented by an operating system of a computing device, where the computing device includes a file system volume that includes a first data structure, and the method includes the steps of (1) receiving a request to launch the application, where the request references an application archive file that includes a second data structure that: (i) defines an organization of a plurality of files associated with the application, and (ii) includes cryptographic information for verifying the plurality of files and the second data structure; (2) in response to receiving the request: determining whether the second data structure, the plurality of files, or both, are valid using the cryptographic information; and (3) in response to determining that the second data structure, the plurality of files, or both, are valid: associating the second data structure with the first data structure.
-
公开(公告)号:US20230393835A1
公开(公告)日:2023-12-07
申请号:US17952159
申请日:2022-09-23
Applicant: Apple Inc.
Inventor: Damien P. Sorresso , Eric B. Tamura , Ezekiel T. Runyon
CPC classification number: G06F8/65 , G06F2221/033 , G06F21/572
Abstract: Aspects and features include maintaining at least one auxiliary disk image on a computing device. Certain code that is aligned with the base operating system of the computing device resides in and is executed from the auxiliary disk image. In one example, a computing device receives an update asset and uses it to patch the auxiliary disk image. The computing device executes the updated code from the patched disk image without rebooting or otherwise restarting the base operating system. The existing auxiliary disk image may be replaced with the patched disk image in response to a reboot or some other event, or while executing the code in the patched disk image from memory.
-
公开(公告)号:US11132134B2
公开(公告)日:2021-09-28
申请号:US16124147
申请日:2018-09-06
Applicant: Apple Inc.
Inventor: Meha N. Desai , Eric B. Tamura
Abstract: The embodiments set forth a technique for over-provisioning storage space within a solid-state storage device (SSD). In particular, a file system can (1) receive a first request to create a file, where the first request includes a size for the file, (2) identifying at least one extent that corresponds to storage space within the SSD that satisfies the size for the file, and associating the file with the at least one extent to indicate that the storage space is occupied, (3) receive a second request to cause (i) the file to remain established within the file system, and (ii) the storage space to be marked free within the SSD, and (4) carrying out the second request by causing the storage space to be marked free within the SSD.
-
公开(公告)号:US20240160766A1
公开(公告)日:2024-05-16
申请号:US18474146
申请日:2023-09-25
Applicant: Apple Inc.
Inventor: Eric B. Tamura , Wade Benson , John Garvey
CPC classification number: G06F21/6218 , G06F21/31 , G06F21/602 , H04L9/14
Abstract: Techniques are disclosed relating to securely storing file system metadata in a computing device. In one embodiment, a computing device includes a processor, memory, and a secure circuit. The memory has a file system stored therein that includes metadata for accessing a plurality of files in the memory. The metadata is encrypted with a metadata encryption key that is stored in an encrypted form. The secure circuit is configured to receive a request from the processor to access the file system. In response to the request, the secure circuit is configured to decrypt the encrypted form of the metadata encryption key. In some embodiments, the computing device includes a memory controller configured to receive the metadata encryption key from the secure circuit, retrieve the encrypted metadata from the memory, and decrypt the encrypted metadata prior to providing the metadata to the processor.
-
公开(公告)号:US11194920B2
公开(公告)日:2021-12-07
申请号:US16659146
申请日:2019-10-21
Applicant: Apple Inc.
Inventor: Eric B. Tamura , Wade Benson , John Garvey
Abstract: Techniques are disclosed relating to securely storing file system metadata in a computing device. In one embodiment, a computing device includes a processor, memory, and a secure circuit. The memory has a file system stored therein that includes metadata for accessing a plurality of files in the memory. The metadata is encrypted with a metadata encryption key that is stored in an encrypted form. The secure circuit is configured to receive a request from the processor to access the file system. In response to the request, the secure circuit is configured to decrypt the encrypted form of the metadata encryption key. In some embodiments, the computing device includes a memory controller configured to receive the metadata encryption key from the secure circuit, retrieve the encrypted metadata from the memory, and decrypt the encrypted metadata prior to providing the metadata to the processor.
-
公开(公告)号:US10592679B2
公开(公告)日:2020-03-17
申请号:US15274724
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Eric B. Tamura , Kelly B. Yancey
Abstract: Representative embodiments set forth herein disclose techniques for modifying encryption classes of files. According to some embodiments, a technique can include receiving a request to update an encryption configuration of a file from a current encryption class to an updated encryption class. In response, the technique involves obtaining (i) a first class key associated with the current encryption class, and (ii) a second class key associated with the updated encryption class. Next, the technique involves identifying file extents of the file, where each file extent is encrypted by a respective extent key that is encrypted by the first class key. Finally, the technique involves, for each file extent of the file: (i) decrypting the respective extent key using the first class key to produce a decrypted respective extent key, and (ii) encrypting the decrypted respective extent key using the second class key to produce an updated respective extent key.
-
公开(公告)号:US11609898B2
公开(公告)日:2023-03-21
申请号:US17031259
申请日:2020-09-24
Applicant: Apple Inc.
Inventor: Meha N. Desai , Eric B. Tamura
Abstract: Techniques are disclosed for ensuring consistent metadata across computing devices. In one example, a user device of a plurality of user devices receives a manifest that includes first metadata associated with a file system update of a file system of the user device. The user device generates second metadata of the file system based on performing the file system update. The user device then generates a dictionary based on comparing metadata records of the first metadata with metadata records of the second metadata. The dictionary may indicate a difference between at least one metadata record of the first metadata and at least one metadata record of the second metadata. The user device then updates the second metadata of the file system to match the first metadata based at least in part on the difference indicated by the dictionary.
-
公开(公告)号:US20210397600A1
公开(公告)日:2021-12-23
申请号:US17031259
申请日:2020-09-24
Applicant: Apple Inc.
Inventor: Meha N. Desai , Eric B. Tamura
IPC: G06F16/23 , G06F16/22 , G06F16/2457 , H04L9/06 , H04L9/08
Abstract: Techniques are disclosed for ensuring consistent metadata across computing devices. In one example, a user device of a plurality of user devices receives a manifest that includes first metadata associated with a file system update of a file system of the user device. The user device generates second metadata of the file system based on performing the file system update. The user device then generates a dictionary based on comparing metadata records of the first metadata with metadata records of the second metadata. The dictionary may indicate a difference between at least one metadata record of the first metadata and at least one metadata record of the second metadata. The user device then updates the second metadata of the file system to match the first metadata based at least in part on the difference indicated by the dictionary.
-
公开(公告)号:US20170357817A1
公开(公告)日:2017-12-14
申请号:US15275289
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Eric B. Tamura , Wade Benson , John Garvey
CPC classification number: G06F21/6218 , G06F21/31 , G06F21/602 , G06F21/78 , G06F2221/2107 , H04L9/0822 , H04L9/0863 , H04L9/14
Abstract: Techniques are disclosed relating to securely storing file system metadata in a computing device. In one embodiment, a computing device includes a processor, memory, and a secure circuit. The memory has a file system stored therein that includes metadata for accessing a plurality of files in the memory. The metadata is encrypted with a metadata encryption key that is stored in an encrypted form. The secure circuit is configured to receive a request from the processor to access the file system. In response to the request, the secure circuit is configured to decrypt the encrypted form of the metadata encryption key. In some embodiments, the computing device includes a memory controller configured to receive the metadata encryption key from the secure circuit, retrieve the encrypted metadata from the memory, and decrypt the encrypted metadata prior to providing the metadata to the processor.
-
公开(公告)号:US12164901B2
公开(公告)日:2024-12-10
申请号:US17952159
申请日:2022-09-23
Applicant: Apple Inc.
Inventor: Damien P. Sorresso , Eric B. Tamura , Ezekiel T. Runyon
IPC: G06F9/48 , G06F8/65 , G06F8/71 , G06F21/57 , G06F8/41 , G06F8/61 , G06F9/4401 , G06F21/12 , G06F21/72
Abstract: Aspects and features include maintaining at least one auxiliary disk image on a computing device. Certain code that is aligned with the base operating system of the computing device resides in and is executed from the auxiliary disk image. In one example, a computing device receives an update asset and uses it to patch the auxiliary disk image. The computing device executes the updated code from the patched disk image without rebooting or otherwise restarting the base operating system. The existing auxiliary disk image may be replaced with the patched disk image in response to a reboot or some other event, or while executing the code in the patched disk image from memory.
-
-
-
-
-
-
-
-
-