-
公开(公告)号:US11641563B2
公开(公告)日:2023-05-02
申请号:US16543227
申请日:2019-08-16
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
IPC: H04W4/029 , H04W4/80 , H04W12/50 , H04W12/126 , H04W12/63
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US11540137B2
公开(公告)日:2022-12-27
申请号:US16835057
申请日:2020-03-30
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Yannick L. Sierra , Kyle C. Brogle , Steven Andrew Myers
IPC: H04W12/50 , H04W12/037 , H04W12/06 , H04W4/02 , H04W76/14 , H04L9/32 , H04L9/08 , H04W12/64 , H04W4/80
Abstract: Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.
-
公开(公告)号:US20220394431A1
公开(公告)日:2022-12-08
申请号:US17819873
申请日:2022-08-15
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
IPC: H04W4/029 , H04W4/80 , H04W12/50 , H04W12/126 , H04W12/63
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US20220386076A1
公开(公告)日:2022-12-01
申请号:US17818859
申请日:2022-08-10
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
IPC: H04W4/029 , H04W4/80 , H04W12/50 , H04W12/126 , H04W12/63
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US20220360945A1
公开(公告)日:2022-11-10
申请号:US17813897
申请日:2022-07-20
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
IPC: H04W4/029 , H04W4/80 , H04W12/50 , H04W12/126 , H04W12/63
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US20220303137A1
公开(公告)日:2022-09-22
申请号:US17655147
申请日:2022-03-16
Applicant: APPLE INC.
Inventor: Kyle C. Brogle , Wade Benson , Sean P. Devlin , Lucie Kucerova , Thomas P. Mensch , Yannick L. Sierra , Tomislav Suchan
Abstract: Embodiments described herein provided techniques to enable peripherals configured to provide secure functionality. A secure circuit on a peripheral device can be paired with a secure circuit on a host device outside of a factory environment without compromising security by verifying silicon keys that are embedded within the secure circuit during manufacturing.
-
公开(公告)号:US11438322B2
公开(公告)日:2022-09-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20220092208A1
公开(公告)日:2022-03-24
申请号:US17242105
申请日:2021-04-27
Applicant: Apple Inc.
Inventor: Frederic Jacobs , Eric Bainville , Yannick L. Sierra
Abstract: Embodiments described herein provide a compressed container format that enables the container to be decrypted and decompressed in a streaming manner. One embodiment provides a container format for encrypted archives in which data is compressed and encrypted in a segmented manner. A segment of the archive can be decompressed, decrypted, and checked for integrity before the entire archive is received. Metadata for the encrypted archive is also encrypted to secure details of data stored within the archive.
-
公开(公告)号:US11182349B2
公开(公告)日:2021-11-23
申请号:US16428914
申请日:2019-05-31
Applicant: Apple Inc.
Inventor: Per Love Hornquist Astrand , Van Hong , Nihar Sharma , Xixi Lu , Steven A. Myers , Michelle D. Linington , Yannick L. Sierra
IPC: H04L29/06 , G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US11176237B2
公开(公告)日:2021-11-16
申请号:US15996413
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Wade Benson , Alexander R. Ledwith , Marc J. Krochmal , John J. Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra , Libor Sykora
Abstract: In some embodiments, a first device performs ranging operations to allow a user to access the first device under one of several user accounts without providing device-access credentials. For example, when a second device is within a first distance of the first device, the first device determines that the second device is associated with a first user account under which a user can access (e.g., can log into) the first device. In response to the determination, the first device enables at least one substitute interaction (e.g., a password-less UI interaction) to allow the first device to be accessed without receiving access credentials through a user interface. In response to detecting an occurrence of the substitute interaction, the user is allowed to access the first device under the first user account. In some embodiments, the substitute interaction occurs while the first device is logged into under a second user account.
-
-
-
-
-
-
-
-
-