Distribution and recovery of a user secret

    公开(公告)号:US11057210B1

    公开(公告)日:2021-07-06

    申请号:US16550836

    申请日:2019-08-26

    Applicant: Apple Inc.

    Abstract: A user device can segment a secret (e.g., a data recovery key) into a master segment and a shared segment such that possession of both segments is necessary and sufficient to reconstruct the secret. The user device can provide the master segment to a server system. The user device can further segment the shared segment to generate a set of M shares such that any subset of the shares that includes at least a threshold number t of the shares can be used to reconstruct the shared segment, while fewer than t shares provide no information about the shared segment. The M shares can be distributed to shareholder devices. To reconstruct the secret, a recovery device can obtain the master segment and at least t of the M shares, then reconstruct the secret.

    Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection

    公开(公告)号:US10831484B1

    公开(公告)日:2020-11-10

    申请号:US16524490

    申请日:2019-07-29

    Applicant: Apple Inc.

    Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.

    METHODS AND ARCHITECTURES FOR SECURE RANGING
    48.
    发明申请

    公开(公告)号:US20200336303A1

    公开(公告)日:2020-10-22

    申请号:US16643237

    申请日:2018-07-03

    Applicant: Apple Inc.

    Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.

    Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection

    公开(公告)号:US10409600B1

    公开(公告)日:2019-09-10

    申请号:US15202269

    申请日:2016-07-05

    Applicant: Apple Inc.

    Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the to address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.

Patent Agency Ranking