-
公开(公告)号:US10915402B2
公开(公告)日:2021-02-09
申请号:US16129726
申请日:2018-09-12
Applicant: Apple Inc.
Inventor: Zhimin Chen , Timothy R. Paaske , Yannick L. Sierra , Anish C. Trivedi
Abstract: A method for verifying program flow during execution of a software program in a computer system is disclosed. Program code of the software program includes multiple program instructions and checkpoint data structures, where a given checkpoint data structure is associated with a given program instruction and is linked to at least one other checkpoint data structure. A fault monitor circuit may receive a particular checkpoint data structure and compare the particular checkpoint data structure to a previously received checkpoint data structure that is associated with another program instruction. Based on results of the comparison, the software fault monitor circuit may signal a program flow error.
-
12.
公开(公告)号:US10666628B2
公开(公告)日:2020-05-26
申请号:US16055892
申请日:2018-08-06
Applicant: Apple Inc.
Inventor: Julien F. Freudiger , Andrew J. Ringer , Yannick L. Sierra , Farouk Belghoul , Samuel D. Post
IPC: H04L29/06 , H04W12/06 , H04W76/14 , H04W12/04 , H04L9/06 , H04L9/08 , H04L9/32 , H04L9/16 , H04W12/00
Abstract: Systems, methods, and computer-readable media may be provided for securely authenticating device identification and/or user identification for low throughput device-to-device wireless communication.
-
公开(公告)号:US10419422B2
公开(公告)日:2019-09-17
申请号:US14871782
申请日:2015-09-30
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Mitchell D. Adler
Abstract: Some embodiments provide a method for a first device for joining a group of related devices. The method receives input of a password for authorization with a centralized entity. The method receives input of a code generated by a second device already established in the group of related devices. The method uses the password and the code to (i) join the group of related devices in order to synchronize user data with the devices in the group of related devices and (ii) authorize the first device with the centralized entity as a valid device for a particular account with the centralized entity.
-
公开(公告)号:US10320563B2
公开(公告)日:2019-06-11
申请号:US15274816
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Kumar Saurav , Jerrold V. Hauck , Yannick L. Sierra , Charles E. Gray , Robert Yepez , Samuel Gosselin , Petr Kostka , Wade Benson
Abstract: A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.
-
公开(公告)号:US20170359717A1
公开(公告)日:2017-12-14
申请号:US15275231
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Mitchell D. Adler , Yannick L. Sierra , Ganesha A.G. Batta , Michael Giles , Akshay M. Srivatsa , Craig P. Dooley , Sriram Hariharan , Robert D. Watson
CPC classification number: H04W12/04 , H04L9/0891 , H04L9/0894 , H04L9/14 , H04L63/0435 , H04L63/061 , H04L2209/80 , H04L2463/061 , H04W12/02
Abstract: Some embodiments provide a method for establishing a secured session with backward security between a first device and a second device. In some embodiments, the method establishes a communication session between the first and second devices using shared keys stored at the first and second devices. The method exchanges encrypted data between the first and second devices as a part of the communication session. The method, upon completion of the communication session, modifies the shared key at the first device in a predictable way. The shared key is modified at the second device in the same predictable way. The method then stores the modified shared key at the first device. The modified shared key cannot be used to decrypt any portion of the encrypted data of the current and previous communication sessions.
-
公开(公告)号:US20170359318A1
公开(公告)日:2017-12-14
申请号:US15275234
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Lei Wei , Yannick L. Sierra , Per Love Hornquist Astrand
CPC classification number: H04L9/0819 , H04L9/0869 , H04L9/14 , H04L9/30 , H04L63/045 , H04L63/062 , H04L63/083
Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.
-
公开(公告)号:US09544758B2
公开(公告)日:2017-01-10
申请号:US14501573
申请日:2014-09-30
Applicant: Apple Inc.
Inventor: Abhishek Sen , Bharath Narasimha Rao , Prashant H. Vashi , Vikram B. Yerrabommanahalli , Yannick L. Sierra
IPC: H04W8/18
CPC classification number: H04W8/183
Abstract: This disclosure relates to caching SIM files at a baseband processor to reduce cellular bootup time. According to one embodiment, a wireless device may read SIM files from a SIM and store a local copy of each file in a cache of the baseband processor of the wireless device. SIM identification information for the SIM from which the cached files were read may be associated with the cache. Indicator information usable for comparing file versions may also be generated and stored in the cache for each file. Upon a subsequent SIM initialization, the wireless device may read SIM files from the cache instead of from the initialized SIM if the cached version is identical to the SIM version, which may be determined based at least in part on the SIM identification information and the indicator information for such files.
Abstract translation: 本公开涉及在基带处理器上缓存SIM文件以减少蜂窝启动时间。 根据一个实施例,无线设备可以从SIM读取SIM文件,并将每个文件的本地副本存储在无线设备的基带处理器的高速缓存中。 读取缓存文件的SIM卡的SIM识别信息可以与缓存相关联。 用于比较文件版本的指示符信息也可以被生成并存储在每个文件的高速缓存中。 在随后的SIM初始化中,如果缓存版本与SIM版本相同,则无线设备可以从高速缓存而不是从初始化的SIM读取SIM文件,其可以至少部分地基于SIM识别信息和指示符来确定 这些文件的信息。
-
公开(公告)号:US20250094602A1
公开(公告)日:2025-03-20
申请号:US18541961
申请日:2023-12-15
Applicant: Apple Inc.
Inventor: Thomas P. Mensch , Elad Efrat , David Tamagno , Armaiti Ardeshiricham , Wade Benson , Yannick L. Sierra
Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a computing device includes a cryptographic circuit coupled to a secure memory inaccessible to a processor of the computing device. Program instructions executing on the computing device can request performance of a key exchange to establish a shared secret with another device. The cryptographic circuit is configured to perform the key exchange including deriving the shared secret using private key material maintained in the secure memory. In some embodiments, the key exchange includes verifying a key authorization data structure issued by a key authority including a first public key of a first participant authority and a second public key of a second participant authority. In response to the verifying being successful, the exchange uses a public key pair attested to by the first participant authority as belonging to a member in the first device group.
-
公开(公告)号:US20250005195A1
公开(公告)日:2025-01-02
申请号:US18731009
申请日:2024-05-31
Applicant: Apple Inc.
Inventor: Daniel P. Shepard , Michael P. Dal Santo , Ping-Ko Chiu , Kumar Gaurav Chhokra , Yannick L. Sierra , Andrew M. Pace , Richard L. Hagy , Lindsey McAllister , Dharini Sitaraman , Andrew N. Khoury , Richard Bower Warren , Brent M. Ledvina , Siva Ganesh Movva , Ronald Keryuan Huang , Robert W. Mayor , Stacey F. Lysik , Areeba Kamal , Ryan D. Shelby , Elizabeth Caroline Furches Cranfill , Kanika Malhotra , Gillian T. Verga
Abstract: Embodiments of the present disclosure are directed to, among other things, monitoring a user device to determine whether a user associated with the device is safe. In some examples, a user (which may be referred to herein as an “initiator” establishes a device monitoring session (which may be referred to herein as “session”) with a user, or a group of users, so that the user(s) are notified either when the initiator has safely ended the device monitoring session or receives access to session data that was collected during the session. In some configurations, the session can be handed off from a first user device that is currently active to a different user device. Instead of the first user device always being the device that interacts with the server, a different first user device may be selected as the active device to interact with the server.
-
公开(公告)号:US11973859B2
公开(公告)日:2024-04-30
申请号:US17123856
申请日:2020-12-16
Applicant: Apple Inc.
Inventor: Frederic Jacobs , Yannick L. Sierra
CPC classification number: H04L9/0825 , H04L9/3236 , H04W4/029 , H04W4/90 , H04L2209/04 , H04L2209/80
Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.
-
-
-
-
-
-
-
-
-