-
1.
公开(公告)号:US20170026182A1
公开(公告)日:2017-01-26
申请号:US15286505
申请日:2016-10-05
Applicant: Apple Inc.
Inventor: Conrad SAUERWALD , Alexander LEDWITH , John IAROCCI , Marc J. KROCHMAL , Wade BENSON , Gregory NOVICK , Noah WITHERSPOON
CPC classification number: H04L9/3234 , G06F21/32 , G06F21/44 , G06F2221/2147 , H04L9/0822 , H04L9/0825 , H04L9/0838 , H04L9/0866 , H04L9/3226 , H04L9/3271 , H04L2209/24 , H04W4/80 , H04W12/003 , H04W12/08
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
Abstract translation: 公开了一种使用第一设备解锁第二设备的方法。 该方法可以包括:第一设备与第二设备配对; 建立与第二设备的信任关系; 使用设备密钥验证第一设备; 从第二设备接收秘密密钥; 从输入/输出设备接收用户输入; 以及响应于接收到所述用户输入而将所接收到的秘密密钥发送到所述第二设备以解锁所述第二设备,其中与所述第二设备建立可信关系包括使用从与所述第一设备相关联的硬件密钥生成的密钥来认证所述设备 键。
-
公开(公告)号:US20230300122A1
公开(公告)日:2023-09-21
申请号:US18107982
申请日:2023-02-09
Applicant: Apple Inc.
Inventor: Wade BENSON , Marc J. KROCHMAL , Alexander R. LEDWITH , John IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA
IPC: H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
CPC classification number: H04L63/08 , H04L63/107 , H04L63/1466 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/44505 , H04L63/06 , H04L63/083 , H04W12/06 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/108 , H04L2209/80
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20240406735A1
公开(公告)日:2024-12-05
申请号:US18509220
申请日:2023-11-14
Applicant: Apple Inc.
Inventor: Benjamin A. WERNER , Wade BENSON , Rachel E. MILLER , Brian G. KILBERG
Abstract: The subject technology provides a framework for a trusted device to modify a security state of a target device (e.g., not fully unlocking the target device by activating biometric authentication at the target device) based on a secure ranging operation. The subject technology enables the trusted device to establish a secure and authenticated connection with the target device that is used to activate biometric authentication at the target device. The biometric authentication may fully unlock the target device. The trusted device may be able to activate the biometric authentication at the target device when the trusted device is in an unlocked state, or even when the trusted device is in a locked state so long as less than a threshold amount of time has passed since the trusted device was last unlocked.
-
公开(公告)号:US20190171465A1
公开(公告)日:2019-06-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade BENSON , Marc J. KROCHMAL , Alexander R. LEDWITH , John IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20230231718A1
公开(公告)日:2023-07-20
申请号:US18053352
申请日:2022-11-07
Applicant: Apple Inc.
Inventor: Conrad SAUERWALD , Alexander LEDWITH , John IAROCCI , Marc J. KROCHMAL , Wade BENSON , Gregory NOVICK , Noah WITHERSPOON
CPC classification number: H04L9/3234 , H04L9/0822 , G06F21/32 , H04L9/0825 , H04L9/3226 , H04L9/3271 , H04W12/08 , H04W12/50 , G06F21/44 , H04L9/0838 , H04L9/0866 , H04W4/80
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:US20180276367A1
公开(公告)日:2018-09-27
申请号:US15996413
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Wade BENSON , Alexander R. LEDWITH , Marc J. KROCHMAL , John J. IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA , Libor SYKORA
CPC classification number: G06F21/36 , G06F21/34 , H04W4/02 , H04W4/80 , H04W12/00503 , H04W12/06 , H04W12/0802
Abstract: In some embodiments, a first device performs ranging operations to allow a user to access the first device under one of several user accounts without providing device-access credentials. For example, when a second device is within a first distance of the first device, the first device determines that the second device is associated with a first user account under which a user can access (e.g., can log into) the first device. In response to the determination, the first device enables at least one substitute interaction (e.g., a password-less UI interaction) to allow the first device to be accessed without receiving access credentials through a user interface. In response to detecting an occurrence of the substitute interaction, the user is allowed to access the first device under the first user account. In some embodiments, the substitute interaction occurs while the first device is logged into under a second user account.
-
公开(公告)号:US20190318074A1
公开(公告)日:2019-10-17
申请号:US16388831
申请日:2019-04-18
Applicant: Apple Inc.
Inventor: Alexander R. LEDWITH , Wade BENSON , Marc J. KROCHMAL , John J. IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA , Libor SYKORA , Jiri MARGARITOV
Abstract: In some embodiments, a first device performs ranging operations to allow a user to perform one or more operations on the first device without providing device-access credentials. For example, when a second device is within a first distance of the first device, the first device determines that the second device is associated with a first user account that is authorized to perform operations on the first device. In response to the determination, the first device enables at least one substitute interaction (e.g., a password-less UI interaction) to allow the operations to be performed on the first device to be accessed without receiving access credentials through a user interface. In response to detecting an occurrence of the substitute interaction, the operation is authorized on the first device.
-
8.
公开(公告)号:US20160065374A1
公开(公告)日:2016-03-03
申请号:US14810395
申请日:2015-07-27
Applicant: Apple Inc.
Inventor: Conrad SAUERWALD , Alexander LEDWITH , John IAROCCI , Marc KROCHMAL , Wade BENSON , Gregory NOVICK , Noah WITHERSPOON
CPC classification number: H04L9/3234 , G06F21/32 , G06F21/44 , G06F2221/2147 , H04L9/0822 , H04L9/0825 , H04L9/0838 , H04L9/0866 , H04L9/3226 , H04L9/3271 , H04L2209/24 , H04W4/80 , H04W12/003 , H04W12/08
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
Abstract translation: 公开了一种使用第一设备解锁第二设备的方法。 该方法可以包括:第一设备与第二设备配对; 建立与第二设备的信任关系; 使用设备密钥验证第一设备; 从第二设备接收秘密密钥; 从输入/输出设备接收用户输入; 以及响应于接收到所述用户输入而将所接收到的秘密密钥发送到所述第二设备以解锁所述第二设备,其中与所述第二设备建立可信关系包括使用从与所述第一设备相关联的硬件密钥生成的密钥来认证所述设备 键。
-
-
-
-
-
-
-