APPARATUS AND METHOD FOR TRANSMITTING A RANGING PACKET COMPATIBLE WITH LEGACY 802.11 SYSTEMS

    公开(公告)号:US20190037549A1

    公开(公告)日:2019-01-31

    申请号:US15937365

    申请日:2018-03-27

    Applicant: Apple Inc.

    Abstract: Communicating wireless devices collaborate and utilize waveforms to enable secure channel estimation. To protect against a repetitive replay attack, some embodiments include Single Carrier Physical Layer (SC-PHY) waveforms and/or interpolated OFDM waveforms that do not include a repeatable or predictable structure. The waveforms are transmitted in ranging packet structures that are compatible with legacy 802.11 technologies that do not utilize secure channel estimation. The ranging packets are received in combination with the information previously exchanged to enable the receiving wireless system to securely determine a channel estimate (e.g., determine a channel estimate without an interloper transmission that is not an authentic first arrival path in a multi-path channel between the wireless systems). Thus, one or both of the wireless systems can estimate the distance between them (or range). Devices utilizing legacy 802.11 technologies may receive the ranging packet structures and determine durations for deferring access to the channel.

    Accessory assisted account recovery

    公开(公告)号:US11863671B1

    公开(公告)日:2024-01-02

    申请号:US16848591

    申请日:2020-04-14

    Applicant: Apple Inc.

    CPC classification number: H04L9/0894 H04L9/083 H04L9/0822 H04L9/0869

    Abstract: Embodiments described herein enable a user to bypass the use of one-time keys or account recovery codes by providing techniques for accessory assisted account recovery. In various embodiments, accessory assisted account recovery makes use of an accessory device of a user, where the accessory device can be any device having a secure processor, cryptographic engine, public key accelerator, or is otherwise able to accelerate cryptographic operations or perform cryptographic operations in a secure execution environment. An account recovery key can be split into multiple portions. At least one portion of the recovery key is then encrypted. The accessory device is then configured to be uniquely capable of decrypting the encrypted portion of an account recovery key.

    Secure Accessory Connections
    27.
    发明申请

    公开(公告)号:US20220393885A1

    公开(公告)日:2022-12-08

    申请号:US17805335

    申请日:2022-06-03

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to securely authenticating communicating devices. In various embodiments, a computing device receives, via a network connection with a network, a first certificate for a first public key pair of the computing device. The computing device provides the first certificate to an offline accessory device and receives a second certificate for a second public key pair maintained by the offline accessory device. The computing device performs a verification of the second certificate and, responsive to the verification being successful, interacts with the offline accessory device. In some embodiments, prior to providing the first certificate, the computing device determines an ordering in which the first and second certificates are to be exchanged by the first computing device and the offline accessory device, and the first certificate is provided to the offline accessory device in accordance with the determined ordering.

    Friend Key Sharing
    29.
    发明申请

    公开(公告)号:US20210250355A1

    公开(公告)日:2021-08-12

    申请号:US17251140

    申请日:2019-06-07

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.

Patent Agency Ranking