-
公开(公告)号:US20170357822A1
公开(公告)日:2017-12-14
申请号:US15619519
申请日:2017-06-11
Applicant: Apple Inc.
Inventor: Lei Wei , Yannick L. Sierra , Per Love Hornquist Astrand
Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.
-
公开(公告)号:US09763153B2
公开(公告)日:2017-09-12
申请号:US14727958
申请日:2015-06-02
Applicant: Apple Inc.
Inventor: Prashant H. Vashi , Vikram B. Yerrabommenahalli , Abhishek Sen , Bharath Narasimha Rao , Yannick L. Sierra
CPC classification number: H04W36/14 , H04B7/2628 , H04W8/183 , H04W48/18
Abstract: A user equipment (UE) may camp on a network following a SIM bootup. Specifically, the UE may determine that a SIM implementation module of the UE includes a first SIM application (e.g., USIM) associated with a first cellular radio access technology (RAT) (e.g., LTE) and a second SIM application (e.g., CSIM) associated with a second cellular RAT (e.g., CDMA). The UE may then initialize the first SIM application and the second SIM application. The UE may determine whether the network is configured to support both voice and data communications using the first cellular RAT. If so, the UE may initiate camping on the network with the first cellular RAT in response to determining that the first SIM application is ready, but before the second SIM application is ready. If not, the UE may wait until both the first and second SIM applications are ready before initiating camping on the network.
-
83.
公开(公告)号:US20160360456A1
公开(公告)日:2016-12-08
申请号:US14727958
申请日:2015-06-02
Applicant: Apple Inc.
Inventor: Prashant H. Vashi , Vikram B. Yerrabommenahalli , Abhishek Sen , Bharath Narasimha Rao , Yannick L. Sierra
CPC classification number: H04W36/14 , H04B7/2628 , H04W8/183 , H04W48/18
Abstract: A user equipment (UE) may camp on a network following a SIM bootup. Specifically, the UE may determine that a SIM implementation module of the UE includes a first SIM application (e.g., USIM) associated with a first cellular radio access technology (RAT) (e.g., LTE) and a second SIM application (e.g., CSIM) associated with a second cellular RAT (e.g., CDMA). The UE may then initialize the first SIM application and the second SIM application. The UE may determine whether the network is configured to support both voice and data communications using the first cellular RAT. If so, the UE may initiate camping on the network with the first cellular RAT in response to determining that the first SIM application is ready, but before the second SIM application is ready. If not, the UE may wait until both the first and second SIM applications are ready before initiating camping on the network.
Abstract translation: 用户设备(UE)可以在SIM启动之后驻留在网络上。 具体地,UE可以确定UE的SIM实现模块包括与第一蜂窝无线电接入技术(RAT)(例如,LTE)和第二SIM应用(例如,CSIM)相关联的第一SIM应用(例如,USIM) 与第二细胞RAT(例如,CDMA)相关联。 然后,UE可以初始化第一SIM应用和第二SIM应用。 UE可以确定网络是否被配置为支持使用第一蜂窝RAT的语音和数据通信。 如果是,则UE可以响应于确定第一SIM应用准备就绪,但在第二SIM应用准备好之前,可以利用第一蜂窝RAT在网络上启动野营。 如果不是,则在启动在网络上的野营之前,UE可以等待直到第一和第二SIM应用都准备就绪。
-
公开(公告)号:US20250119411A1
公开(公告)日:2025-04-10
申请号:US18909442
申请日:2024-10-08
Applicant: Apple Inc.
Inventor: Catherine Yun , Elliot S. Briggs , Simon J. Gornall , Michael J. Hashe , Steven A. Myers , Andrew M. Pace , Yannick L. Sierra , Phillip T. Tao
Abstract: Techniques are disclosed relating to improving secure message communication. In various embodiments, a message delivery server receives a request to deliver an encrypted message from a sender to a recipient. The encrypted message obfuscates the identity of the sender such that the message delivery server is unable to determine the identity of the sender. The message delivery server determines whether to deliver the encrypted message based on a signed attestation received with the request and, based on the determining, delivers the encrypted message to the recipient. In some embodiments, the determining includes verifying the signed attestation using a verification key provide by the sender. In some embodiments, the encrypted message is an email, a text message, a push notification, or a video or audio call request.
-
公开(公告)号:US20240349042A1
公开(公告)日:2024-10-17
申请号:US18637105
申请日:2024-04-16
Applicant: Apple Inc.
Inventor: Benjamin A. Detwiler , Brent M. Ledvina , Chen Ganir , Emmanuel Lalande , Michael C. Laster , Siva Ganesh Movva , Ernst T. Erdmann , Yannick L. Sierra
IPC: H04W12/04 , H04W12/121
CPC classification number: H04W12/04 , H04W12/121
Abstract: Portable electronic devices can be used to perform tracking functionality through the exchange of proximity messages. Based on the payload in these messages, a mobile device can detect whether a portable electronic device is likely performing unwanted tracking. The mobile device user may wish to identify an account that is associated with the portable device. In response to a request from the mobile device, the portable electronic device can provide a partial identifier that can be used to determine an associated account. The portable electronic device can also provide information that the mobile device can use to locate disablement instructions that can show how to stop the portable device from performing tracking functionality.
-
公开(公告)号:US12074865B1
公开(公告)日:2024-08-27
申请号:US16252515
申请日:2019-01-18
Applicant: Apple Inc.
Inventor: Max M. Gunther , Onar Vikingstad , Ramiro Calvo , Isabella M. Funke , Eric D. Friedman , Hervé Sibert , David P. Remahl , Yannick L. Sierra , Frank B. Dancs , Sudhakar N. Mambakkam
CPC classification number: H04L63/0838 , G06F21/71 , G06K7/1417 , G06K19/06037 , H04L9/0869 , H04L9/3213 , H04L9/3228 , H04L63/0428 , H04L63/061 , H04L63/0853 , H04L63/0861 , H04L63/102 , H04L63/108 , H04L63/18 , H04L65/1069
Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.
-
公开(公告)号:US11863671B1
公开(公告)日:2024-01-02
申请号:US16848591
申请日:2020-04-14
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Lucia E. Ballard , Kyle C. Brogle , DJ Capelis
CPC classification number: H04L9/0894 , H04L9/083 , H04L9/0822 , H04L9/0869
Abstract: Embodiments described herein enable a user to bypass the use of one-time keys or account recovery codes by providing techniques for accessory assisted account recovery. In various embodiments, accessory assisted account recovery makes use of an accessory device of a user, where the accessory device can be any device having a secure processor, cryptographic engine, public key accelerator, or is otherwise able to accelerate cryptographic operations or perform cryptographic operations in a secure execution environment. An account recovery key can be split into multiple portions. At least one portion of the recovery key is then encrypted. The accessory device is then configured to be uniquely capable of decrypting the encrypted portion of an account recovery key.
-
公开(公告)号:US11818681B2
公开(公告)日:2023-11-14
申请号:US17582785
申请日:2022-01-24
Applicant: Apple Inc.
Inventor: Jerrold V. Hauck , Alejandro J. Marquez , Timothy R. Paaske , Indranil S. Sen , Herve Sibert , Yannick L. Sierra , Raman S. Thiara
IPC: H04W64/00 , H04W12/03 , H04W12/033 , H04W12/041 , H04W12/062 , H04W12/63 , H04W12/065 , H04W12/069 , H04W12/0431 , H04W12/0433 , H04W12/0471 , H04W76/10 , H04L9/32 , H04L9/40 , H04W12/02 , H04W12/04 , H04W12/06 , H04W12/47 , H04W12/33 , H04W4/80
CPC classification number: H04W64/00 , H04L9/3273 , H04L63/061 , H04L63/0869 , H04W12/02 , H04W12/03 , H04W12/033 , H04W12/04 , H04W12/041 , H04W12/0431 , H04W12/0433 , H04W12/0471 , H04W12/06 , H04W12/062 , H04W12/065 , H04W12/069 , H04W12/63 , H04W76/10 , H04L63/0492 , H04W4/80 , H04W12/33 , H04W12/47
Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
-
公开(公告)号:US11777936B2
公开(公告)日:2023-10-03
申请号:US17251140
申请日:2019-06-07
Applicant: Apple Inc.
Inventor: Florian Galdo , Stephanie R. Martin , Yannick L. Sierra , Ivan Krstic , Christopher A. Volkert , Najeeb M. Abdulrahiman , Matthias Lerch , Onur E. Tackin , Kyle C. Brogle
CPC classification number: H04L63/10 , G06F21/335 , H04L9/0894 , H04L9/3213 , H04L9/3234 , H04L9/3263 , H04L63/0823 , G06Q20/3825 , G06Q20/3829 , G06Q2220/00 , G06Q2240/00 , H04L2209/84 , H04W4/12 , H04W12/03
Abstract: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.
-
公开(公告)号:US11728972B2
公开(公告)日:2023-08-15
申请号:US17848922
申请日:2022-06-24
Applicant: APPLE INC.
Inventor: Yannick L. Sierra , Zhimin Chen , Thomas Icart
IPC: H04L9/08 , G01S13/76 , H04L9/40 , H04W12/03 , H04W12/041
CPC classification number: H04L9/0822 , G01S13/765 , H04L63/1441 , H04W12/03 , H04W12/041 , H04L9/0872 , H04L63/0428 , H04L63/0492
Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.
-
-
-
-
-
-
-
-
-