-
公开(公告)号:US10699622B2
公开(公告)日:2020-06-30
申请号:US15874799
申请日:2018-01-18
Applicant: Apple Inc.
Inventor: Ross Thompson , Guy Cote , Christopher P. Tann , Jerrold V. Hauck , Ian C. Hendry , Vanessa C. Heppolette , Adam J. Machalek , Alan M. Dunn , Ali Sazegari , Lars M. Lindberg , Arthur L. Spence
IPC: G09G3/20 , G09G3/00 , G06F9/451 , G09G3/32 , G06F3/06 , G09G3/3208 , G06F9/4401
Abstract: A data processing system can store a long-term history of pixel luminance values in a secure memory and use those values to create burn-in compensation values that are used to mitigate burn-in effect on a display. The long-term history can be updated over time with new, accumulated pixel luminance values.
-
公开(公告)号:US20200084050A1
公开(公告)日:2020-03-12
申请号:US16532197
申请日:2019-08-05
Applicant: Apple Inc.
Inventor: Thomas P. Mensch , Chiye K. Kojima , Han Jong Yu , Jerrold V. Hauck , Muralidhar S. Vempaty , Peter Chang , Tiffany Shih-Yu Fang , Yiqun Zhu
IPC: H04L9/32 , G06F16/901 , G06T7/80
Abstract: Systems and methods for storing and recovering data for a device are described. In one embodiment, factory generated calibration data can be generated, sealed and restored securely even if two sensors in two different devices, such as a first ambient light sensor and a second ambient light sensor have the same sensor identifier. In one embodiment, a device transmits a database key to cause storage or recovery of the calibration data, and the database key includes a sensor identifier and a public cryptographic key of the device.
-
公开(公告)号:US10453375B2
公开(公告)日:2019-10-22
申请号:US15874791
申请日:2018-01-18
Applicant: Apple Inc.
Inventor: Paul S. Drzaic , Tae-Wook Koh , Ross Thompson , Guy Cote , Christopher P. Tann , Jerrold V. Hauck , Yifan Zhang , Jean-Pierre Guillou , Ian C. Hendry , Vanessa C. Heppolette , Arthur L. Spence
IPC: G09G3/00 , G09G3/20 , G06F3/06 , G09G3/3208 , G06F9/4401 , G09G3/32 , G06F9/451
Abstract: A data processing system can store a long-term history of pixel luminance values in a secure memory and use those values to create burn-in compensation values that are used to mitigate burn-in effect on a display. The long-term history can be updated over time with new, accumulated pixel luminance values.
-
公开(公告)号:US20190236254A1
公开(公告)日:2019-08-01
申请号:US16371860
申请日:2019-04-01
Applicant: Apple Inc.
Inventor: Lucia E. Ballard , Jerrold V. Hauck , Deepti S. Prakash , Jan Cibulka , Ivan Krstic
CPC classification number: G06F21/32 , G06F21/34 , G06F21/6218 , G06F21/78 , G06F2221/2149 , G06F2221/2153 , G06Q20/3227 , H04L9/3226 , H04L9/3231 , H04L29/06809 , H04L63/0861 , H04L63/102 , H04L63/105 , H04L2463/082 , H04M1/72577 , H04W12/06 , H04W12/08
Abstract: The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
-
95.
公开(公告)号:US10289996B2
公开(公告)日:2019-05-14
申请号:US15865074
申请日:2018-01-08
Applicant: Apple Inc.
Inventor: Ahmer A. Khan , Gregory B. Novick , Jerrold V. Hauck , Saket R. Vora , Yehonatan Perez
Abstract: Methods for operating a portable electronic device to conduct a mobile payment transaction at a merchant terminal are provided. The electronic device may verify that the current user of the device is indeed the authorized owner by requiring the current user to enter a passcode. If the user is able to provide the correct passcode, the device is only partly ready to conduct a mobile payment. In order for the user to fully activate the payment function, the user may have to supply a predetermined payment activation input such as a double button press that notifies the device that the user intends to perform a financial transaction in the immediate future. The device may subsequently activate a payment applet for a predetermined period of time during which the user may hold the device within a field of the merchant terminal to complete a near field communications based mobile payment transaction.
-
公开(公告)号:US20190044723A1
公开(公告)日:2019-02-07
申请号:US16049933
申请日:2018-07-31
Applicant: Apple Inc.
Inventor: Deepti S. Prakash , Lucia E. Ballard , Jerrold V. Hauck , Feng Tang , Etai Littwin , Pavan Kumar Ansosalu Vasu , Gideon Littwin , Thorsten Gernoth , Lucie Kucerova , Petr Kostka , Steven P. Hotelling , Eitan Hirsh , Tal Kaitz , Jonathan Pokrass , Andrei Kolin , Moshe Laifenfeld , Matthew C. Waldon , Thomas P. Mensch , Lynn R. Youngs , Christopher G. Zeleznik , Michael R. Malone , Ziv Hendel , Ivan Krstic , Anup K. Sharma
Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
-
公开(公告)号:US10153900B2
公开(公告)日:2018-12-11
申请号:US15730487
申请日:2017-10-11
Applicant: Apple Inc.
Inventor: Dallas B. De Atley , Jerrold V. Hauck , Mitchell D. Adler
Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.
-
公开(公告)号:US20180034632A1
公开(公告)日:2018-02-01
申请号:US15730487
申请日:2017-10-11
Applicant: Apple Inc.
Inventor: Dallas B. De Atley , Jerrold V. Hauck , Mitchell D. Adler
CPC classification number: H04L9/0894 , G06F21/00 , G06F21/33 , G06F21/445 , G06F21/606 , G06F21/6245 , G06F21/64 , H04L9/0861 , H04L63/0428 , H04L63/0442 , H04L63/06 , H04L63/062 , H04L63/08 , H04L63/101
Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.
-
公开(公告)号:US09842062B2
公开(公告)日:2017-12-12
申请号:US14871484
申请日:2015-09-30
Applicant: Apple Inc.
Inventor: Michael D. Ford , Jerrold V. Hauck , Matthew G. Watson , Mitchell D. Adler , Dallas B. De Atley , James Wilson
CPC classification number: G06F12/1408 , G06F11/1448 , G06F21/6218 , G06F2201/80 , G06F2212/1052 , H04L9/006 , H04L9/0822 , H04L9/0825 , H04L9/088 , H04L9/0894 , H04L9/0897
Abstract: Some embodiments provide, for a particular device in a set of related devices, a method for backing up data synchronized between the devices. The method receives a command to create a backup for a subset of data synchronized between a subset of the devices, which is a subset of all data synchronized between the devices. The method identifies the subset of synchronization data from the set of all synchronization data. The subset of synchronization data is tagged as pertaining to a particular set of criteria for synchronization between only the subset of devices. The method stores a backup of the subset of synchronization data in a backup storage encrypted in such a way that requires a recovery key associated with any one of the devices in the subset of devices to access the backup while preventing access to the backup with recovery keys of any of the other devices.
-
公开(公告)号:US20170048066A1
公开(公告)日:2017-02-16
申请号:US15268471
申请日:2016-09-16
Applicant: Apple Inc.
Inventor: Dallas B. De Atley , Jerrold V. Hauck , Mitchell D. Adler
CPC classification number: H04L9/0894 , G06F21/00 , G06F21/33 , G06F21/445 , G06F21/606 , G06F21/6245 , G06F21/64 , H04L9/0861 , H04L63/0428 , H04L63/0442 , H04L63/06 , H04L63/062 , H04L63/08 , H04L63/101
Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.
Abstract translation: 一种通过使用一组服务器将第一设备的机密信息项恢复到第二设备的方法。 该方法生成公钥和私钥对,并在生成公钥和私钥时将私钥与服务器的可执行代码的哈希值相关联。 该方法在用用户特定的密钥和公钥加密的安全对象中接收加密的机密信息项。 当第二设备提供与加密安全对象的密钥相同的用户特定密钥时,该方法仅向第二设备提供机密信息,并且在访问私钥以解密时提供服务器的可执行代码的散列 安全对象匹配在生成私钥时在服务器上运行的可执行代码的散列。
-
-
-
-
-
-
-
-
-