-
公开(公告)号:US20240386421A1
公开(公告)日:2024-11-21
申请号:US18772759
申请日:2024-07-15
Applicant: Apple Inc.
Inventor: Karl Anders CARLSSON , Anton K. DIEDERICH , Christopher SHARP , Gianpaolo FASOLI , Maciej STACHOWIAK , Matthew C. BYINGTON , Nicholas J. SHEARER , Samuel M. WEINIG
Abstract: Systems, methods, and computer-readable media for validating online access to secure device functionality are provided that may use shared secrets between different subsystems and limited use validation data.
-
12.
公开(公告)号:US20230385709A1
公开(公告)日:2023-11-30
申请号:US18228645
申请日:2023-07-31
Applicant: Apple Inc.
Inventor: Edouard GODFREY , Gianpaolo FASOLI , Kuangyu WANG
Abstract: The subject technology receives assessment values determined by a first machine learning model deployed on a client electronic device, the assessment values being indicative of classifications of input data and the assessment values being associated with constraint data that comprises a probability distribution of the assessment values with respect to the classifications of the input data. The subject technology applies the assessment values determined by the first machine learning model to a second machine learning model to determine the classifications of the input data. The subject technology determines whether accuracies of the classifications determined by the second machine learning model conform with the probability distribution for corresponding assessment values determined by the first machine learning model. The subject technology retrains the first machine learning model when the accuracies of the classifications determined by the second machine learning model do not conform with the probability distribution.
-
公开(公告)号:US20220005028A1
公开(公告)日:2022-01-06
申请号:US17443419
申请日:2021-07-26
Applicant: Apple Inc.
Inventor: Karl Anders CARLSSON , Anton K. DIEDERICH , Christopher SHARP , Gianpaolo FASOLI , Maciej STACHOWIAK , Matthew C. BYINGTON , Nicholas J. SHEARER , Samuel M. WEINIG
Abstract: Systems, methods, and computer-readable media for validating online access to secure device functionality are provided that may use shared secrets between different subsystems and limited use validation data.
-
公开(公告)号:US20200213295A1
公开(公告)日:2020-07-02
申请号:US16726731
申请日:2019-12-24
Applicant: Apple Inc.
Inventor: Rupamay SAHA , Brandon K. LEVENTHAL , Christopher SHARP , Vishnu JANARDHANAN PILLAI , Gianpaolo FASOLI , Augustin J. FARRUGIA
Abstract: A device implementing a system for using a verified claim of identity includes at least one processor configured to receive a first request to revoke a verified claim, the verified claim comprising information to identify a user of a device, wherein the verified claim includes a hardware reference key of the device, and wherein the hardware reference key is a public key of a public-private key pair, a corresponding private key of which is securely stored on the device. The at least one processor may be further configured to in response to receiving the request, send, to the device, a second request to revoke the verified claim on the device, and add the verified claim to a revocation list.
-
公开(公告)号:US20190114399A1
公开(公告)日:2019-04-18
申请号:US16177250
申请日:2018-10-31
Applicant: Apple Inc.
Inventor: Jean-Pierre CIUDAD , Augustin J. FARRUGIA , David M'RAIHI , Bertrand Mollinier TOUBLET , Gianpaolo FASOLI , Nicholas T. SULLIVAN
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
-
公开(公告)号:US20160359816A1
公开(公告)日:2016-12-08
申请号:US14871567
申请日:2015-09-30
Applicant: Apple Inc.
Inventor: Srinivas VEDULA , Daniel P. CARTER , Gianpaolo FASOLI , Augustin J. FARRUGIA , Eugene JIVOTOVSKI
CPC classification number: H04L67/306 , H04L63/10 , H04L65/60 , H04L67/146
Abstract: This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server.
Abstract translation: 本申请涉及用于基于在设备和帐户服务器之间建立的协议从内容服务器向设备提供内容流的实施例。 帐户服务器可以发起与设备的会话,并向设备提供可用于与设备相关联的用户帐户的频道列表。 当在设备上选择频道时,可以从帐户服务器向设备提供条件访问信息,该设备随后可以将条件访问信息中继到内容服务器。 内容服务器可以使用条件访问信息来验证设备是否具有接收流内容的适当权限。 以这种方式,由于条件访问信息来自帐户服务器,所以可以通过帐户服务器和设备之间的对应而不是内容服务器来管理访问流内容的权限。
-
公开(公告)号:US20240251019A1
公开(公告)日:2024-07-25
申请号:US18625154
申请日:2024-04-02
Applicant: Apple Inc.
Inventor: Srinivas VEDULA , Daniel P. CARTER , Gianpaolo FASOLI , Augustin J. FARRUGIA , Eugene JIVOTOVSKI
IPC: H04L67/306 , H04L9/32 , H04L9/40 , H04L65/60 , H04L67/146
CPC classification number: H04L67/306 , H04L9/3213 , H04L63/10 , H04L65/60 , H04L63/108 , H04L67/146
Abstract: This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server.
-
公开(公告)号:US20240147243A1
公开(公告)日:2024-05-02
申请号:US18404058
申请日:2024-01-04
Applicant: Apple Inc.
Inventor: Haya Iris VILLANUEVA GAVIOLA , Gianpaolo FASOLI , Vinay GANESH , Irene M. GRAFF , Martijn Theo HARING , Ahmer A. KHAN , Franck Farian RAKOTOMALALA , Gordon Y. SCOTT , Ho Cheung CHUNG , Antonio ALLEN , Mayura Dhananjaya DESHPANDE , Thomas John MILLER , Christopher SHARP , David W. SILVER , Policarpo B. WOOD , Ka YANG
IPC: H04W12/69 , H04W4/80 , H04W12/02 , H04W12/037 , H04W12/47
CPC classification number: H04W12/69 , H04W4/80 , H04W12/02 , H04W12/037 , H04W12/47 , G06Q50/265
Abstract: An embodiment includes a method to increase the efficiency of security checkpoint operations. A security checkpoint kiosk serves as a Relying Party System (RPS). The RPS establishes a secure local connection between the RPS and a User Mobile-Identification-Credential Device (UMD). The RPS sends a user information request to the UMD, via the secure local connection, seeking release of user information associated with a Mobile Identification Credential (MIC). The RPS obtains authentication of the user information received in response to the user information request. The RPS retrieves user travel information based on the user information. The RPS determines that the user travel information matches the user information. When the user travel information matches the user information, the RPS approves the user to proceed past the security checkpoint kiosk.
-
公开(公告)号:US20240071141A1
公开(公告)日:2024-02-29
申请号:US18103487
申请日:2023-01-30
Applicant: Apple Inc.
Inventor: Gianpaolo FASOLI , Tal TVERSKY , Vinay SHARMA , Hubert GREICHE
Abstract: Aspects of the subject technology include receiving, by a first device and from a second device, a video of a first subject and indications of one or more select frames from the video, selecting one or more additional frames from the video, generating a first confidence score that the video was captured in a single take based on the one or more select frames and the one or more additional frames, generating a request for proofing an identity of the first subject, and transmitting the request for proofing the identity to a third device. The request for proofing an identity may include the first confidence score.
-
公开(公告)号:US20230273985A1
公开(公告)日:2023-08-31
申请号:US18167767
申请日:2023-02-10
Applicant: Apple Inc.
Inventor: Tomislav SUCHAN , Jay MOON , Jonathan R. DASCOLA , Vitalii KRAMAR , Gianpaolo FASOLI , Anton K. DIEDERICH , Luojie XIANG
Abstract: In some examples, a change in a current viewpoint of a user is detected while a three-dimensional environment is visible. In some examples, in accordance with a determination that at least a threshold amount of the object is visible from the viewpoint of the user, user authorization of the secure operation, using a virtual user interface object, is enabled. In some examples, the user is biometrically authenticated, at a first time, to perform a first type of biometric authentication. In some examples, a request to perform the secure operation is received at a second time. In some examples, in accordance with a determination that the user met respective criteria between the first time and the second time, the secure operation is performed without performing, after receiving the request, the first type of biometric authentication.
-
-
-
-
-
-
-
-
-