-
公开(公告)号:US20230075275A1
公开(公告)日:2023-03-09
申请号:US18055325
申请日:2022-11-14
Applicant: Apple Inc.
Inventor: Siva Ganesh Movva , Raghunandan K. Pai , Yannick L. Sierra
IPC: H04W12/50 , H04W12/069 , H04W76/18
Abstract: Embodiments described herein provide a service to enable a user to track a variety of even when those devices are not connected to the internet by either Wi-Fi or cellular. One embodiment provides techniques to enable a pairing registration for a wireless accessory device that enables a server-mediated pairing process to be performed between the wireless accessory device and a companion device.
-
公开(公告)号:US11553350B2
公开(公告)日:2023-01-10
申请号:US17219595
申请日:2021-03-31
Applicant: Apple Inc.
Inventor: Siva Ganesh Movva , Raghunandan K. Pai , Yannick L. Sierra
IPC: H04W12/50 , H04W12/069 , H04W76/18
Abstract: Embodiments described herein provide a service to enable a user to track a variety of even when those devices are not connected to the internet by either Wi-Fi or cellular. One embodiment provides techniques to enable a pairing registration for a wireless accessory device that enables a server-mediated pairing process to be performed between the wireless accessory device and a companion device.
-
公开(公告)号:US20220303120A1
公开(公告)日:2022-09-22
申请号:US17835421
申请日:2022-06-08
Applicant: Apple Inc.
Inventor: Vishnu Pillai Janardhanan Pillai , Rantao Chen , Gianpaolo Fasoli , Frederic Jacobs , Rupamay Saha , Yannick L. Sierra , Dian Wen , Ka Yang
Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.
-
公开(公告)号:US11265929B2
公开(公告)日:2022-03-01
申请号:US16090007
申请日:2017-04-14
Applicant: Apple Inc.
Inventor: Jerrold V. Hauck , Alejandro J. Marquez , Timothy R. Paaske , Indranil S. Sen , Herve Sibert , Yannick L. Sierra , Raman S. Thiara
Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
-
公开(公告)号:US20210400492A1
公开(公告)日:2021-12-23
申请号:US17219595
申请日:2021-03-31
Applicant: Apple Inc.
Inventor: Siva Ganesh Movva , Raghunandan K. Pai , Yannick L. Sierra
IPC: H04W12/50 , H04W76/18 , H04W12/069
Abstract: Embodiments described herein provide a service to enable a user to track a variety of even when those devices are not connected to the internet by either Wi-Fi or cellular. One embodiment provides techniques to enable a pairing registration for a wireless accessory device that enables a server-mediated pairing process to be performed between the wireless accessory device and a companion device.
-
公开(公告)号:US11057210B1
公开(公告)日:2021-07-06
申请号:US16550836
申请日:2019-08-26
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Mitchell D. Adler
Abstract: A user device can segment a secret (e.g., a data recovery key) into a master segment and a shared segment such that possession of both segments is necessary and sufficient to reconstruct the secret. The user device can provide the master segment to a server system. The user device can further segment the shared segment to generate a set of M shares such that any subset of the shares that includes at least a threshold number t of the shares can be used to reconstruct the shared segment, while fewer than t shares provide no information about the shared segment. The M shares can be distributed to shareholder devices. To reconstruct the secret, a recovery device can obtain the master segment and at least t of the M shares, then reconstruct the secret.
-
公开(公告)号:US10831484B1
公开(公告)日:2020-11-10
申请号:US16524490
申请日:2019-07-29
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Jeffry E. Gonion , Thomas Roche , Jerrold V. Hauck
Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.
-
公开(公告)号:US20200336303A1
公开(公告)日:2020-10-22
申请号:US16643237
申请日:2018-07-03
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Zhimin Chen , Thomas Icart
Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.
-
公开(公告)号:US20190296905A1
公开(公告)日:2019-09-26
申请号:US16436328
申请日:2019-06-10
Applicant: Apple Inc.
Inventor: Kumar Saurav , Jerrold V. Hauck , Yannick L. Sierra , Charles E. Gray , Roberto G. Yepez , Samuel Gosselin , Petr Kostka , Wade Benson
Abstract: A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.
-
公开(公告)号:US10409600B1
公开(公告)日:2019-09-10
申请号:US15202269
申请日:2016-07-05
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Jeffry E. Gonion , Thomas Roche , Jerrold V. Hauck
Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the to address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.
-
-
-
-
-
-
-
-
-