CRYPTOGRAPHIC SEPARATION OF USERS
    11.
    发明申请

    公开(公告)号:US20170357830A1

    公开(公告)日:2017-12-14

    申请号:US15275273

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to securely storing data in a computing device. In one embodiment, a computing device includes a secure circuit configured to maintain key bags for a plurality of users, each associated with a respective one of the plurality of users and including a first set of keys usable to decrypt a second set of encrypted keys for decrypting data associated with the respective user. The secure circuit is configured to receive an indication that an encrypted file of a first of the plurality of users is to be accessed and use a key in a key bag associated with the first user to decrypt an encrypted key of the second set of encrypted keys. The secure circuit is further configured to convey the decrypted key to a memory controller configured to decrypt the encrypted file upon retrieval from a memory.

    Key Management Using Security Enclave Processor
    13.
    发明申请
    Key Management Using Security Enclave Processor 有权
    使用安全处理器进行密钥管理

    公开(公告)号:US20140086406A1

    公开(公告)日:2014-03-27

    申请号:US13626476

    申请日:2012-09-25

    Applicant: APPLE INC.

    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.

    Abstract translation: SOC实现安全飞地处理器(SEP)。 SEP可以包括处理器和一个或多个安全外设。 SEP可以与SOC的其余部分隔离(例如SOC中的一个或多个中央处理单元(CPU),或SOC中的应用处理器(AP))。 对SEP的访问可以由硬件严格控制。 例如,描述了CPU / AP仅能访问SEP中的邮箱位置的机制。 CPU / AP可以向邮箱写入消息,SEP可以读取并响应。 在一些实施例中,SEP可以包括以下一个或多个:使用包装密钥的安全密钥管理,引导和/或电源管理的SEP控制以及存储器中的单独的信任区域。

    SECURE DEVICE PAIRING
    15.
    发明申请

    公开(公告)号:US20210281426A1

    公开(公告)日:2021-09-09

    申请号:US17203560

    申请日:2021-03-16

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.

    Secure device pairing
    16.
    发明授权

    公开(公告)号:US10951419B2

    公开(公告)日:2021-03-16

    申请号:US16537391

    申请日:2019-08-09

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.

    Secure public key acceleration
    17.
    发明授权

    公开(公告)号:US10521596B1

    公开(公告)日:2019-12-31

    申请号:US16138670

    申请日:2018-09-21

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Secure public key acceleration
    18.
    发明授权

    公开(公告)号:US10114956B1

    公开(公告)日:2018-10-30

    申请号:US15860314

    申请日:2018-01-02

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Secure public key acceleration
    19.
    发明授权
    Secure public key acceleration 有权
    安全公钥加速

    公开(公告)号:US09547778B1

    公开(公告)日:2017-01-17

    申请号:US14498820

    申请日:2014-09-26

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

    Abstract translation: 在一个实施例中,提供一种系统,其中私钥是以硬件管理的,并且对于软件是不可见的。 该系统可以为公开密钥生成,数字签名生成,加密/解密以及大量随机素数生成提供硬件支持,而不会向软件揭示私有密钥。 因此,私钥比基于软件的版本更安全。 在一个实施例中,可以访问专用密钥的私有密钥和硬件可以集成到与集成电路(例如芯片上的系统(SOC))相同的半导体衬底上。 私钥在集成电路之外可能不可用,因此,恶意的第三方在尝试获取私钥时面临着很大障碍。

    Secure Public Key Acceleration
    20.
    发明申请

    公开(公告)号:US20250053667A1

    公开(公告)日:2025-02-13

    申请号:US18774305

    申请日:2024-07-16

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

Patent Agency Ranking