Software fault monitoring
    11.
    发明授权

    公开(公告)号:US10915402B2

    公开(公告)日:2021-02-09

    申请号:US16129726

    申请日:2018-09-12

    Applicant: Apple Inc.

    Abstract: A method for verifying program flow during execution of a software program in a computer system is disclosed. Program code of the software program includes multiple program instructions and checkpoint data structures, where a given checkpoint data structure is associated with a given program instruction and is linked to at least one other checkpoint data structure. A fault monitor circuit may receive a particular checkpoint data structure and compare the particular checkpoint data structure to a previously received checkpoint data structure that is associated with another program instruction. Based on results of the comparison, the software fault monitor circuit may signal a program flow error.

    Combined authorization process
    13.
    发明授权

    公开(公告)号:US10419422B2

    公开(公告)日:2019-09-17

    申请号:US14871782

    申请日:2015-09-30

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for a first device for joining a group of related devices. The method receives input of a password for authorization with a centralized entity. The method receives input of a code generated by a second device already established in the group of related devices. The method uses the password and the code to (i) join the group of related devices in order to synchronize user data with the devices in the group of related devices and (ii) authorize the first device with the centralized entity as a valid device for a particular account with the centralized entity.

    Diversification of Public Keys
    16.
    发明申请

    公开(公告)号:US20170359318A1

    公开(公告)日:2017-12-14

    申请号:US15275234

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.

    Baseband caching of SIM files
    17.
    发明授权
    Baseband caching of SIM files 有权
    SIM卡文件的基带缓存

    公开(公告)号:US09544758B2

    公开(公告)日:2017-01-10

    申请号:US14501573

    申请日:2014-09-30

    Applicant: Apple Inc.

    CPC classification number: H04W8/183

    Abstract: This disclosure relates to caching SIM files at a baseband processor to reduce cellular bootup time. According to one embodiment, a wireless device may read SIM files from a SIM and store a local copy of each file in a cache of the baseband processor of the wireless device. SIM identification information for the SIM from which the cached files were read may be associated with the cache. Indicator information usable for comparing file versions may also be generated and stored in the cache for each file. Upon a subsequent SIM initialization, the wireless device may read SIM files from the cache instead of from the initialized SIM if the cached version is identical to the SIM version, which may be determined based at least in part on the SIM identification information and the indicator information for such files.

    Abstract translation: 本公开涉及在基带处理器上缓存SIM文件以减少蜂窝启动时间。 根据一个实施例,无线设备可以从SIM读取SIM文件,并将每个文件的本地副本存储在无线设备的基带处理器的高速缓存中。 读取缓存文件的SIM卡的SIM识别信息可以与缓存相关联。 用于比较文件版本的指示符信息也可以被生成并存储在每个文件的高速缓存中。 在随后的SIM初始化中,如果缓存版本与SIM版本相同,则无线设备可以从高速缓存而不是从初始化的SIM读取SIM文件,其可以至少部分地基于SIM识别信息和指示符来确定 这些文件的信息。

    Silicon Key Exchange
    18.
    发明申请

    公开(公告)号:US20250094602A1

    公开(公告)日:2025-03-20

    申请号:US18541961

    申请日:2023-12-15

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a computing device includes a cryptographic circuit coupled to a secure memory inaccessible to a processor of the computing device. Program instructions executing on the computing device can request performance of a key exchange to establish a shared secret with another device. The cryptographic circuit is configured to perform the key exchange including deriving the shared secret using private key material maintained in the secure memory. In some embodiments, the key exchange includes verifying a key authorization data structure issued by a key authority including a first public key of a first participant authority and a second public key of a second participant authority. In response to the verifying being successful, the exchange uses a public key pair attested to by the first participant authority as belonging to a member in the first device group.

    Data encryption for emergency response

    公开(公告)号:US11973859B2

    公开(公告)日:2024-04-30

    申请号:US17123856

    申请日:2020-12-16

    Applicant: Apple Inc.

    Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.

Patent Agency Ranking