TECHNIQUES FOR MANUAL VERIFICATION
    23.
    发明公开

    公开(公告)号:US20230396439A1

    公开(公告)日:2023-12-07

    申请号:US18131801

    申请日:2023-04-06

    Applicant: APPLE INC.

    CPC classification number: H04L9/3226 H04L9/14 H04L9/30 H04L9/0869 H04L9/088

    Abstract: A device may include accessing first public key associated with a first user identifier for the first electronic device and a second public key associated with a second user identifier for a second electronic device. The device can generate a first random number and a first commitment using a hash function and the first random number; transmit a first message to the second electronic device via a channel between the first and second electronic devices. The device can receive a message from the second electronic device via the channel including include a second random number generated by the second electronic device. The device can extract a code via the hash function using the first public key, the second public key, the first random number, and the second random number. The device can present the code on a user interface for verification. The user interface can receive confirmation of the verification.

    INDIRECT BRANCH PREDICTOR SECURITY PROTECTION

    公开(公告)号:US20230010948A1

    公开(公告)日:2023-01-12

    申请号:US17932883

    申请日:2022-09-16

    Applicant: Apple Inc.

    Abstract: A system and method for efficiently protecting branch prediction information. In various embodiments, a computing system includes at least one processor with a branch predictor storing branch target addresses and security tags in a table. The security tag includes one or more components of machine context. When the branch predictor receives a portion of a first program counter of a first branch instruction, and hits on a first table entry during an access, the branch predictor reads out a first security tag. The branch predictor compares one or more components of machine context of the first security tag to one or more components of machine context of the first branch instruction. When there is at least one mismatch, the branch prediction information of the first table entry is not used. Additionally, there is no updating of any branch prediction training information of the first table entry.

    METHODS AND ARCHITECTURES FOR SECURE RANGING

    公开(公告)号:US20220399994A1

    公开(公告)日:2022-12-15

    申请号:US17848922

    申请日:2022-06-24

    Applicant: APPLE INC.

    Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.

    Sharing system access using a mobile device

    公开(公告)号:US11522695B2

    公开(公告)日:2022-12-06

    申请号:US16982513

    申请日:2019-03-19

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.

    Authenticating a messaging program session

    公开(公告)号:US10944562B2

    公开(公告)日:2021-03-09

    申请号:US16221043

    申请日:2018-12-14

    Applicant: Apple Inc.

    Abstract: Techniques disclosed herein relate to the authentication of a first user in a communication session between the first user using a user device and a second user using a remote computer system. The computer system sends an authentication request in the session, and the user device receives the authentication request in the session via a messaging program. The user device then causes a different program to access an authentication token received from an authentication computer system. The user device sends an indication of the authentication token to the remote computer system which the remote computer system verifies to authenticate the first user within the session.

Patent Agency Ranking