APPLICATION INTEGRITY ATTESTATION
    22.
    发明申请

    公开(公告)号:US20200159966A1

    公开(公告)日:2020-05-21

    申请号:US16683233

    申请日:2019-11-13

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.

    Apparatuses and methods for using a random authorization number to provide enhanced security for a secure element

    公开(公告)号:US10546293B2

    公开(公告)日:2020-01-28

    申请号:US14475375

    申请日:2014-09-02

    Applicant: Apple Inc.

    Abstract: A system for provisioning credentials onto an electronic device is provided. The system may include a payment network subsystem, a service provider subsystem, and one or more user devices that can be used to perform mobile transactions at a merchant terminal. The user device may communicate with the service provider subsystem in order to obtained commerce credentials from the payment network subsystem. The user device may include a secure element and a corresponding trusted processor. The trusted processor may generate a random authorization number and inject that number into the secure element. Mobile payments should only be completed if the random authorization number on the secure element matches the random authorization number at the trusted processor. The trusted processor may be configured to efface the previous random authorization number and generate a new random authorization number when detecting a potential change in ownership at the user device.

    Silicon key attestation
    24.
    发明授权

    公开(公告)号:US10536271B1

    公开(公告)日:2020-01-14

    申请号:US15435229

    申请日:2017-02-16

    Applicant: Apple Inc.

    Abstract: Systems and methods are disclosed for generating one or more hardware reference keys (HRK) on a computing device, and for attesting to the validity of the hardware reference keys. An initial hardware reference key can be a silicon attestation key (SIK) generated during manufacture of a computing system, such as a system-on-a-chip. The SIK can comprise an asymmetric key pair based at least in part on an identifier of the processing system type and a unique identifier of the processing system. The SIK can be signed by the computing system and stored thereon. The SIK can be used to generate further HRKs on the computing device that can attest to the processing system type of the computing device and an operating system version that was running when the HRK was generated. The computing device can generate an HRK attestation (HRKA) for each HRK generated on the computing system.

    System and method for policy control functions management mechanism

    公开(公告)号:US09763081B2

    公开(公告)日:2017-09-12

    申请号:US14549088

    申请日:2014-11-20

    Applicant: APPLE INC.

    CPC classification number: H04W8/22 G06F9/44505 G06F9/5011

    Abstract: Systems and methods for validating and applying modifications to a policy control function (PCF) of a station. The methods include generating a PCF package including a modification to a PCF, and determining whether the PCF package is to be transmitted to the station by a first or second entity. The methods further include when the PCF package is to be transmitted by the first entity, including a first signature of the first entity in a deliverer field of the PCF package, and when the PCF package is to be transmitted by the second entity, including the first signature in an owner field and a second signature of the second entity in the deliverer field. The methods further include receiving the PCF package from the first or second entity, determining whether the PCF package is valid, and applying the modification to the PCF when it is determined the PCF package is valid.

    Backup System with Multiple Recovery Keys
    30.
    发明申请
    Backup System with Multiple Recovery Keys 有权
    具有多个恢复密钥的备份系统

    公开(公告)号:US20160352518A1

    公开(公告)日:2016-12-01

    申请号:US14871498

    申请日:2015-09-30

    Applicant: Apple Inc.

    Abstract: Some embodiments provide, for a particular device in a set of related devices, a method for backing up data synchronized between the set of related devices. The method stores the backup data encrypted with a set of data encryption keys. The method also stores the set of data encryption keys encrypted with a master recovery key. The method also stores several copies of master recovery key data, each copy of the master recovery key data encrypted with a public key of a different one of the related devices. The backup data is only recoverable by accessing a private key of any one of the related devices.

    Abstract translation: 一些实施例为一组相关设备中的特定设备提供用于备份在该组相关设备之间同步的数据的方法。 该方法存储用一组数据加密密钥加密的备份数据。 该方法还存储用主恢复密钥加密的一组数据加密密钥。 该方法还存储主恢复密钥数据的几个副本,主恢复密钥数据的每个副本用相关设备中的不同的一个的公钥加密。 备份数据只能通过访问任一相关设备的私钥来恢复。

Patent Agency Ranking