Secure Key Exchange
    1.
    发明申请

    公开(公告)号:US20250097018A1

    公开(公告)日:2025-03-20

    申请号:US18542176

    申请日:2023-12-15

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a first device belonging to a first device group receives a request to perform a key exchange to establish a shared secret with a second device belonging to a second device group. The first device verifies a key authorization data structure issued by a key authority, the key authorization data structure including a first public key of a first participant authority authorized to identify members of the first device group and a second public key of a second participant authority authorized to identify members of the second device group. In response to the verifying being successful, the first device performs the requested exchange using a public key pair attested to by the first participant authority as belonging to a member in the first device group.

    Application Integrity Attestation
    2.
    发明公开

    公开(公告)号:US20240078343A1

    公开(公告)日:2024-03-07

    申请号:US18463744

    申请日:2023-09-08

    Applicant: Apple Inc.

    CPC classification number: G06F21/64 H04L9/14 H04L9/3236 H04L9/3263 H04L9/3271

    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.

    APPLICATION INTEGRITY ATTESTATION
    5.
    发明申请

    公开(公告)号:US20200159966A1

    公开(公告)日:2020-05-21

    申请号:US16683233

    申请日:2019-11-13

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.

    Silicon key attestation
    6.
    发明授权

    公开(公告)号:US10536271B1

    公开(公告)日:2020-01-14

    申请号:US15435229

    申请日:2017-02-16

    Applicant: Apple Inc.

    Abstract: Systems and methods are disclosed for generating one or more hardware reference keys (HRK) on a computing device, and for attesting to the validity of the hardware reference keys. An initial hardware reference key can be a silicon attestation key (SIK) generated during manufacture of a computing system, such as a system-on-a-chip. The SIK can comprise an asymmetric key pair based at least in part on an identifier of the processing system type and a unique identifier of the processing system. The SIK can be signed by the computing system and stored thereon. The SIK can be used to generate further HRKs on the computing device that can attest to the processing system type of the computing device and an operating system version that was running when the HRK was generated. The computing device can generate an HRK attestation (HRKA) for each HRK generated on the computing system.

    Device Re-Activation
    7.
    发明申请

    公开(公告)号:US20180351748A1

    公开(公告)日:2018-12-06

    申请号:US15721538

    申请日:2017-09-29

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for recovering user data for a device. To initiate recovery, the method sends to a first server a first request including at least (i) a device identifier and (ii) a first set of cryptographic data for a second set of servers with which the first server communicates. If the first server verifies the device identifier with an attestation authority, the method receives from the second set of servers a second set of cryptographic data generated by the second set of servers. After receiving input of a device passcode for the device, the method sends to the first server a second request comprising at least a third set of cryptographic data for the second set of servers generated based on the device passcode. If the first server verifies the device passcode with the second set of servers, the method receives access to the user data.

    Silicon Key Exchange
    8.
    发明申请

    公开(公告)号:US20250094602A1

    公开(公告)日:2025-03-20

    申请号:US18541961

    申请日:2023-12-15

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a computing device includes a cryptographic circuit coupled to a secure memory inaccessible to a processor of the computing device. Program instructions executing on the computing device can request performance of a key exchange to establish a shared secret with another device. The cryptographic circuit is configured to perform the key exchange including deriving the shared secret using private key material maintained in the secure memory. In some embodiments, the key exchange includes verifying a key authorization data structure issued by a key authority including a first public key of a first participant authority and a second public key of a second participant authority. In response to the verifying being successful, the exchange uses a public key pair attested to by the first participant authority as belonging to a member in the first device group.

Patent Agency Ranking