DEVICE-TO-DEVICE MESSAGING PROTOCOL
    31.
    发明申请

    公开(公告)号:US20200235929A1

    公开(公告)日:2020-07-23

    申请号:US16528532

    申请日:2019-07-31

    Applicant: Apple Inc.

    Abstract: One embodiment provides for an electronic device, comprising a network interface, a memory coupled with the network interface, at least one application processor coupled with the memory, the at least one processor to execute instructions stored in the memory, and a secure processor including a cryptographic engine, wherein the cryptographic engine is to generate a sealed encrypted message to be transmitted via the network interface, the sealed encrypted message encrypted on behalf of the at least one application processor and includes a signature to enable integrity verification of the sealed encrypted message, the signature generated based on an identity key of the electronic device and data including ciphertext of the encrypted message and a public key of a recipient of the sealed encrypted message.

    SOFTWARE FAULT MONITORING
    32.
    发明申请

    公开(公告)号:US20200081785A1

    公开(公告)日:2020-03-12

    申请号:US16129726

    申请日:2018-09-12

    Applicant: Apple Inc.

    Abstract: A method for verifying program flow during execution of a software program in a computer system is disclosed. Program code of the software program includes multiple program instructions and checkpoint data structures, where a given checkpoint data structure is associated with a given program instruction and is linked to at least one other checkpoint data structure. A fault monitor circuit may receive a particular checkpoint data structure and compare the particular checkpoint data structure to a previously received checkpoint data structure that is associated with another program instruction. Based on results of the comparison, the software fault monitor circuit may signal a program flow error.

    Combined Authorization Process
    34.
    发明申请
    Combined Authorization Process 审中-公开
    组合授权流程

    公开(公告)号:US20170012959A1

    公开(公告)日:2017-01-12

    申请号:US14871782

    申请日:2015-09-30

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for a first device for joining a group of related devices. The method receives input of a password for authorization with a centralized entity. The method receives input of a code generated by a second device already established in the group of related devices. The method uses the password and the code to (i) join the group of related devices in order to synchronize user data with the devices in the group of related devices and (ii) authorize the first device with the centralized entity as a valid device for a particular account with the centralized entity.

    Abstract translation: 一些实施例提供了用于连接一组相关设备的第一设备的方法。 该方法接收输入密码以进行集中实体的授权。 该方法接收由相关设备组中已经建立的第二设备生成的代码的输入。 该方法使用密码和代码(i)加入相关设备组,以便将用户数据与相关设备组中的设备同步,以及(ii)将具有集中式实体的第一设备授权为有效设备 与集中实体的特定帐户。

    BASEBAND SECURE BOOT WITH REMOTE STORAGE
    35.
    发明申请
    BASEBAND SECURE BOOT WITH REMOTE STORAGE 有权
    基带安全引导带远程存储

    公开(公告)号:US20160232343A1

    公开(公告)日:2016-08-11

    申请号:US14632917

    申请日:2015-02-26

    Applicant: APPLE INC.

    Abstract: In order to simplify and reduce the cost of an electronic device, the size of a first non-volatile memory associated with an integrated circuit is significantly reduced. Instead of using the first non-volatile memory, a second non-volatile memory associated with a processor in the electronic device is used to store an embedded operating system of the integrated circuit, as well as associated data and a configuration of the integrated circuit. To reduce the security risks associated with using this remote second non-volatile memory, the first non-volatile memory may store authorization information and anti-replay information. During a secure boot of the integrated circuit, the authorization information is used to verify that the embedded operating system, the data and the configuration are authorized. In addition, the anti-replay information is used to determine that the embedded operating system, the data and the configuration are different than previously received versions of these items.

    Abstract translation: 为了简化和降低电子设备的成本,与集成电路相关联的第一非易失性存储器的尺寸显着降低。 代替使用第一非易失性存储器,与电子设备中的处理器相关联的第二非易失性存储器用于存储集成电路的嵌入式操作系统,以及相关联的数据和集成电路的配置。 为了减少与使用该远程第二非易失性存储器相关联的安全风险,第一非易失性存储器可以存储授权信息和反重放信息。 在集成电路的安全启动期间,授权信息用于验证嵌入式操作系统,数据和配置是否被授权。 此外,反重放信息用于确定嵌入式操作系统,数据和配置与先前接收到的这些项目的版本不同。

    Device Managed Cryptographic Keys
    36.
    发明申请

    公开(公告)号:US20250119273A1

    公开(公告)日:2025-04-10

    申请号:US18907189

    申请日:2024-10-04

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to improving key management on devices. In various embodiments, a device receives, from a browser via a key-management API supported by the device, a request for a browser session to receive access to a cryptographic key managed by the device. The key-management API of the device determines whether to grant the browser session access to the cryptographic key based on verification of a signed attestation from a server corresponding to the browser session and using metadata stored about the cryptographic key. Based on the determination, the device provides access to the cryptographic key via the key-management API. In some embodiments, providing access to the cryptographic key includes performing a requested cryptographic operation using the cryptographic key and without providing the cryptographic key to the browser. In some embodiments, the cryptographic key is managed by an operating system, a secure element, or another application of the device.

    Secure Key Exchange
    37.
    发明申请

    公开(公告)号:US20250097018A1

    公开(公告)日:2025-03-20

    申请号:US18542176

    申请日:2023-12-15

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a first device belonging to a first device group receives a request to perform a key exchange to establish a shared secret with a second device belonging to a second device group. The first device verifies a key authorization data structure issued by a key authority, the key authorization data structure including a first public key of a first participant authority authorized to identify members of the first device group and a second public key of a second participant authority authorized to identify members of the second device group. In response to the verifying being successful, the first device performs the requested exchange using a public key pair attested to by the first participant authority as belonging to a member in the first device group.

    MOBILE IDENTIFICATION TECHNIQUES
    39.
    发明公开

    公开(公告)号:US20240146531A1

    公开(公告)日:2024-05-02

    申请号:US17976649

    申请日:2022-10-28

    Applicant: Apple Inc.

    CPC classification number: H04L9/32 H04L9/30

    Abstract: Techniques are described herein for mobile document provisioning. An example method includes a device receiving, from an inspection system of a first jurisdiction, a request for a mobile identification document of a second jurisdiction. The device can transmit, to the inspection system, the mobile identification document based on the request, the mobile identification document comprising a mobile identification document public key. The device can receive from the inspection system, a mobile supplemental document, the mobile supplemental document comprising a mobile supplemental document public key derived from the mobile identification document public key, the inspection system being configured to derive the mobile supplemental document public key from the mobile identification document public key. The device can derivate a mobile supplemental document private key that corresponds to the mobile supplemental document public key, the derivation of the mobile supplemental document to private key linking the mobile supplemental document to the mobile identification document.

Patent Agency Ranking