Restricted resource classes of an operating system

    公开(公告)号:US11100242B2

    公开(公告)日:2021-08-24

    申请号:US14292705

    申请日:2014-05-30

    Applicant: Apple Inc.

    Abstract: Techniques for access control of a data processing system are described. In one embodiment, in response to a request from an application for accessing a resource of a data processing system, it is determined a first class of resources the requested resource belongs. A second class of resources the application is entitled to access is determined based on a resource entitlement encoded within the application and authorized by a predetermined authority. The application is allowed to access the resource if the first class and the second class of resources are matched. The application is denied from accessing the resource if the first class and the second class are not matched, regardless an operating privilege level of the application.

    Friend Key Sharing
    34.
    发明申请

    公开(公告)号:US20210250355A1

    公开(公告)日:2021-08-12

    申请号:US17251140

    申请日:2019-06-07

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.

    Methods for restricting resources used by a program based on entitlements

    公开(公告)号:US11055438B2

    公开(公告)日:2021-07-06

    申请号:US15060837

    申请日:2016-03-04

    Applicant: Apple Inc.

    Abstract: In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.

    Preventing URL confusion attacks
    40.
    发明授权

    公开(公告)号:US09602520B2

    公开(公告)日:2017-03-21

    申请号:US14932877

    申请日:2015-11-04

    Applicant: Apple Inc.

    CPC classification number: H04L63/1408 H04L63/1466 H04L67/02

    Abstract: Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that includes link text and a link address, generating normalized link text based upon the link text, wherein characters in the link text that are visually similar are represented by a single normalized character identifier in the normalized text, determining whether the normalized link text is in the format of a link address, and determining that the text is safe when the normalized link text is not in the format of a link address. The techniques disclosed herein further involve determining whether the normalized link text matches the link address, determining that the text is safe when the normalized link text matches the link address, and determining that the text is unsafe when the normalized link text does not match the link address.

Patent Agency Ranking