Ivan Krstic - Sunnyvale CA, US Austin G. Jennings - Santa Clara CA, US Jacques Anthony Vidrine - San Francisco CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
H04L 29/06
US Classification:
726 10, 726 2, 726 27
Abstract:
A resource manager of an operating system of a data processing system receives a first request from a first program for a ticket for accessing at least one of resources of the data processing system. In response to the first request, the resource manager determines whether the first program is entitled to access the resource. The ticket for accessing the resource is issued to the first program if the first program is entitled to access the resource. The ticket can be used by a second program to obtain rights to access the resource by acquiring the ticket from the first program, where the second program would not otherwise be entitled to access the resource based on a security profile associated with the second program.
Methods For Restricting Resources Used By A Program Based On Entitlements
Ivan Krstic - Sunnyvale CA, US Austin G. Jennings - Santa Clara CA, US Richard L. Hagy - Montara CA, US
Assignee:
APPLE INC. - Cupertino CA
International Classification:
G06F 9/50
US Classification:
718104
Abstract:
In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.
Methods For Restricting Resources Used By A Program Based On Entitlements
Austin G. Jennings - Santa Clara CA, US Richard L. Hagy - Montara CA, US
International Classification:
G06F 21/10
US Classification:
726 1
Abstract:
In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.
- Cupertino CA, US Nikolaj Schlej - Deggendorf, DE Thomas P. Mensch - Sunnyvale CA, US Wade Benson - San Jose CA, US Jerrold V. Hauck - Windermere FL, US Josh P. de Cesare - Los Gatos CA, US Austin G. Jennings - San Jose CA, US John J. Dong - San Jose CA, US Robert C. Graham - San Jose CA, US Jacques Fortier - San Francisco CA, US
Techniques are disclosed relating to securing computing devices during boot. In various embodiments, a secure circuit of a computing device generates for a public key pair and signs, using a private key of the public key pair, configuration settings for an operating system of the computing device. A bootloader of the computing device receives a certificate for the public key pair from a certificate authority and initiates a boot sequence to load the operating system. The boot sequence includes the bootloader verifying the signed configuration settings using a public key included in the certificate and the public key pair. In some embodiments, the secure circuit cryptographically protects the private key based on a passcode of a user, the passcode being usable by the user to authenticate to the computing device.
Methods For Configuring Security Restrictions Of A Data Processing System
- Cupertino CA, US Austin G. Jennings - Santa Clara CA, US
International Classification:
G06F 21/12 G06F 21/57
Abstract:
According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received from an application to modify a security settings of the data processing system. In response to the request, the data processing system is restarted into a second operating system, where the second operating system includes functionalities that are fewer than the first operating system. The security settings of the data processing system is modified within the second operating system. After the security settings of the data processing system has been modified, the data processing is rebooted back to the first operating system. A security measure within the first operating system is enforced based on the modified security settings.
Storage Volume Protection Using Restricted Resource Classes
- Cupertino CA, US Austin G. Jennings - Santa Clara CA, US
International Classification:
G06F 21/62 G06F 9/54
Abstract:
Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access control logic in the data processing system can receive a message indicating the attachment of a storage volume. The logic can apply access restrictions to the storage volume by creating an association between a restricted resource class and the storage volume to limit programmatic access to the storage volume. An evaluation of the storage volume can be requested and based on the result of the evaluation the access restrictions can be removed or retained on the storage volume.
Methods For Restricting Resources Used By A Program Based On Entitlements
- Cupertino CA, US Austin G. Jennings - Santa Clara CA, US Richard L. Hagy - Montara CA, US
International Classification:
G06F 21/62 G06F 21/10 G06F 21/51
Abstract:
In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.
Restricted Resource Classes Of An Operating System
- Cupertino CA, US Pierre-Olivier J. Martel - Mountain View CA, US Austin G. Jennings - Santa Clara CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 21/62 G06F 9/50 G06F 21/44
Abstract:
Techniques for access control of a data processing system are described. In one embodiment, in response to a request from an application for accessing a resource of a data processing system, it is determined a first class of resources the requested resource belongs. A second class of resources the application is entitled to access is determined based on a resource entitlement encoded within the application and authorized by a predetermined authority. The application is allowed to access the resource if the first class and the second class of resources are matched. The application is denied from accessing the resource if the first class and the second class are not matched, regardless an operating privilege level of the application.
License Records
Austin D Jennings
License #:
068884 - Active
Category:
Real Estate
Type:
Salesperson
Name / Title
Company / Classification
Phones & Addresses
Austin Jennings Manager
Roughrider Power Mfg Motors/Generators · Site Preparation Contrs
1830 E Burlington Ave, Casper, WY 82601 (307)2655500
Fairfax Pride - Board Member (2011) SMASH Groups - President and Founder (2011) WestPark Corporate Center - Concierge (2010) So Addictive Lounge - Manager (2010-2011) Freddie's Beach Bar - Bartender (2009) Barcode Richmond - Hottest Shit Ever (2006-2009)
Education:
Virginia Commonwealth University - Religion, Virginia Commonwealth University - International Studies
Tagline:
The google gods may have outdone themselves with this one...
Austin Jennings
Education:
University of Texas at Austin - Economics
Austin Jennings
Work:
Beneath Acacia - Noises
Austin Jennings
Austin Jennings
Austin Jennings
Austin Jennings
Austin Jennings
News
Show your support through breast cancer month events
workers decided to act. They organized the first EMS Chili Cook-Off and asked local fire departments and other emergency workers to sponsor a pot of chili. Entry into the event, which will also include live music from Joey Miller and Austin Jennings, a costume contest and childrens activities, is $5.