-
公开(公告)号:US12095907B2
公开(公告)日:2024-09-17
申请号:US17835421
申请日:2022-06-08
Applicant: Apple Inc.
Inventor: Vishnu Pillai Janardhanan Pillai , Rantao Chen , Gianpaolo Fasoli , Frederic Jacobs , Rupamay Saha , Yannick L. Sierra , Dian Wen , Ka Yang
CPC classification number: H04L9/085 , G06Q20/3829 , H04L9/3247 , H04L63/0428 , H04L63/061 , H04L63/0823
Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.
-
公开(公告)号:US11995446B2
公开(公告)日:2024-05-28
申请号:US17661696
申请日:2022-05-02
Applicant: Apple Inc.
Inventor: Steven A. Myers , Jeffry E. Gonion , Yannick L. Sierra , Thomas Icart
CPC classification number: G06F9/3844 , G06F9/30029 , G06F9/45558 , G06F21/602 , G06F21/52 , G06F21/6209
Abstract: Techniques are disclosed relating to protecting branch prediction information. In various embodiments, an integrated circuit includes branch prediction logic having a table that maintains a plurality of entries storing encrypted target address information for branch instructions. The branch prediction logic is configured to receive machine context information for a branch instruction having a target address being predicted by the branch prediction logic, the machine context information including a program counter associated with the branch instruction. The branch prediction logic is configured to use the machine context information to decrypt encrypted target address information stored in one of the plurality of entries identified based on the program counter. In some embodiments, the branch prediction logic decrypts the encrypted target address information by performing a cipher to encrypt the machine context information and performing a Boolean exclusive-OR operation of the encrypted machine context information and the encrypted target address information.
-
公开(公告)号:US11895495B2
公开(公告)日:2024-02-06
申请号:US17057622
申请日:2018-06-22
Applicant: Apple Inc.
Inventor: Xiangying Yang , Elliot S. Briggs , Samuel D. Post , Yannick L. Sierra , Fangli Xu , Dawei Zhang , Haijing Hu , Huarui Liang , Li Li , Lijia Zhang , Shu Guo , Yuqin Chen
IPC: H04W12/069 , H04W76/27 , H04W12/73 , H04W12/108 , H04W74/08
CPC classification number: H04W12/069 , H04W12/108 , H04W12/73 , H04W74/0833 , H04W76/27
Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
-
公开(公告)号:US11870902B2
公开(公告)日:2024-01-09
申请号:US17193838
申请日:2021-03-05
Applicant: Apple Inc.
Inventor: Mayur P. Mahajan , Gokul P. Thirumalai , Scott Lopatin , Tommy Rochette , Robert Y. Loh , Yannick L. Sierra
IPC: H04L29/06 , H04L9/32 , H04L51/046 , H04L9/08
CPC classification number: H04L9/3213 , H04L9/0822 , H04L9/3226 , H04L51/046
Abstract: Techniques disclosed herein relate to the authentication of a first user in a communication session between the first user using a user device and a second user using a remote computer system. The computer system sends an authentication request in the session, and the user device receives the authentication request in the session via a messaging program. The user device then causes a different program to access an authentication token received from an authentication computer system. The user device sends an indication of the authentication token to the remote computer system which the remote computer system verifies to authenticate the first user within the session.
-
公开(公告)号:US11847099B2
公开(公告)日:2023-12-19
申请号:US17533106
申请日:2021-11-22
Applicant: Apple Inc.
Inventor: Per Love Hornquist Astrand , Van Hong , Nihar Sharma , Xixi Lu , Steven A. Myers , Michelle D. Linington , Yannick L. Sierra
IPC: H04L29/06 , G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
CPC classification number: G06F16/178 , G06F16/1834 , H04L9/0819 , H04L9/0825 , H04L9/0891 , H04L9/12 , H04L9/30 , H04L9/3247
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US11790113B2
公开(公告)日:2023-10-17
申请号:US17343358
申请日:2021-06-09
Applicant: Apple Inc.
Inventor: Pablo Antonio Gonzalez Cervantes , Mohan Singh Randhava , Jorge F. Pozas Trevino , Samuel A. Mussell , Isaac Pinol Catadau , Steven A. Myers , Dongsheng Zhang , Suhail Ahmad , Zhengjun Jiang , Yannick L. Sierra , Amir H. Jadidi
CPC classification number: G06F21/6245 , G16H10/60 , H04L9/0825 , H04L9/0866 , H04L9/14
Abstract: A user device may share encrypted health data with an electronic health record (EHR) system associated with a health institution. A unique data identifier that identifies a portion of the health data and a cryptographic key may be shared with the EHR system. The encrypted health may be shared with a service provider and a unique data identifier. To access the health data, the EHR system may query the service provider with the unique data identifier.
-
公开(公告)号:US11677554B2
公开(公告)日:2023-06-13
申请号:US16888157
申请日:2020-05-29
Applicant: Apple Inc.
Inventor: Bailey E. Basile , Keaton F. Mowery , Yannick L. Sierra , Frederic Jacobs , Ryan W. Baker
CPC classification number: H04L9/30 , G06F16/1805 , G06F16/2246 , H04L9/0861 , H04L9/3247
Abstract: Techniques are disclosed relating to secure message exchanges. In some embodiments, a first computing device generates an account key associated with a user account shared by a plurality of computing devices. The first computing device signs a public key of the first computing device with the generated account key to produce a digital signature and sends the public key and the digital signature to a first server system for distributing the public key to a second computing device attempting to send an encrypted message to the first computing device. The first computing device sends the account key to an external storage external usable by others of the plurality of computing devices to obtain the account key and use the account key to sign public keys of the other computing devices. The first computing device receives, from the second computing device, the encrypted message encrypted using the public key.
-
公开(公告)号:US11606669B2
公开(公告)日:2023-03-14
申请号:US17813897
申请日:2022-07-20
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US11582215B2
公开(公告)日:2023-02-14
申请号:US15275203
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20220326957A1
公开(公告)日:2022-10-13
申请号:US17661696
申请日:2022-05-02
Applicant: Apple Inc.
Inventor: Steven A. Myers , Jeffry E. Gonion , Yannick L. Sierra , Thomas Icart
Abstract: Techniques are disclosed relating to protecting branch prediction information. In various embodiments, an integrated circuit includes branch prediction logic having a table that maintains a plurality of entries storing encrypted target address information for branch instructions. The branch prediction logic is configured to receive machine context information for a branch instruction having a target address being predicted by the branch prediction logic, the machine context information including a program counter associated with the branch instruction. The branch prediction logic is configured to use the machine context information to decrypt encrypted target address information stored in one of the plurality of entries identified based on the program counter. In some embodiments, the branch prediction logic decrypts the encrypted target address information by performing a cipher to encrypt the machine context information and performing a Boolean exclusive-OR operation of the encrypted machine context information and the encrypted target address information.
-
-
-
-
-
-
-
-
-