-
公开(公告)号:US20230111452A1
公开(公告)日:2023-04-13
申请号:US17951023
申请日:2022-09-22
Applicant: Apple Inc.
Inventor: Ansh Shukla , Anton K. Diederich , Matthew C. Byington
Abstract: The present application relates to devices and components including apparatus, systems, methods, and computer-readable medium to utilize a credential extension for collection of information for a data transfer. The credential extension may be sandboxed which limit the information to be collected related to the data transfer and/or provide protection for the information collected related to the data transfer.
-
公开(公告)号:US20210400037A1
公开(公告)日:2021-12-23
申请号:US17162955
申请日:2021-01-29
Applicant: Apple Inc.
Inventor: James R. Montgomerie , Jessica Aranda , Patrick Coffman , Julien Freudiger , Matthew Hansen Gamble , Ron Huang , Anant Jain , Glen S. Low , Andrey Pokrovskiy , Stephen J. Rhee , Matthew E. Shepherd , Ansh Shukla , Katherine Skinner , Kyle Martin Sluder , Christopher Soli , Christopher K. Thomas , Guy L. Tribble , John Wilander
Abstract: An access control system is provided to prevent the surreptitious granting of access to privacy related functionality on an electronic device. Software-based events to grant access to device functionality can be validated by confirming that the software event corresponds with a hardware input event. This validation prevents the spoofing of a user interface input that may be used to fraudulently grant access to specific functionality.
-
公开(公告)号:US11895105B2
公开(公告)日:2024-02-06
申请号:US17162955
申请日:2021-01-29
Applicant: Apple Inc.
Inventor: James R. Montgomerie , Jessica Aranda , Patrick Coffman , Julien Freudiger , Matthew Hansen Gamble , Ron Huang , Anant Jain , Glen S. Low , Andrey Pokrovskiy , Stephen J. Rhee , Matthew E. Shepherd , Ansh Shukla , Katherine Skinner , Kyle Martin Sluder , Christopher Soli , Christopher K. Thomas , Guy L. Tribble , John Wilander
CPC classification number: H04L63/0807 , H04L63/083 , H04L63/0853 , H04W12/06
Abstract: An access control system is provided to prevent the surreptitious granting of access to privacy related functionality on an electronic device. Software-based events to grant access to device functionality can be validated by confirming that the software event corresponds with a hardware input event. This validation prevents the spoofing of a user interface input that may be used to fraudulently grant access to specific functionality.
-
-