-
公开(公告)号:US20190163895A1
公开(公告)日:2019-05-30
申请号:US16149021
申请日:2018-10-01
Applicant: Apple Inc.
Inventor: David C. ANDRUS , Philip F. KEARNEY , Christopher B. ZIMMERMANN , Jeremy C. FRANKLIN , Nathaniel S. SHARPE
Abstract: Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is experienced by both devices (e.g., a common physical stimulus). Each device can then use an identical, predetermined algorithm to generate a common authentication key based on the stimulus. The devices can use the common authentication key to establish a secure network.
-
公开(公告)号:US20220386113A1
公开(公告)日:2022-12-01
申请号:US17806465
申请日:2022-06-10
Applicant: Apple Inc.
Inventor: David C. ANDRUS , Philip F. KEARNEY , Christopher B. ZIMMERMANN , Jeremy C. FRANKLIN , Nathaniel S. SHARPE
IPC: H04W12/037 , H04W76/14 , G06F3/01 , H04L9/08
Abstract: Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is experienced by both devices (e.g., a common physical stimulus). Each device can then use an identical, predetermined algorithm to generate a common authentication key based on the stimulus. The devices can use the common authentication key to establish a secure network.
-
公开(公告)号:US20170337367A1
公开(公告)日:2017-11-23
申请号:US15585088
申请日:2017-05-02
Applicant: Apple Inc.
Inventor: David C. ANDRUS , Philip F. KEARNEY , Christopher B. ZIMMERMANN , Jeremy C. FRANKLIN , Nathaniel S. SHARPE
CPC classification number: G06F21/36 , H04L9/0838 , H04L9/0844 , H04L9/0861 , H04L9/3297 , H04L63/08 , H04L2209/805 , H04L2463/061 , H04W12/04 , H04W84/18
Abstract: Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is experienced by both devices (e.g., a common physical stimulus). Each device can then use an identical, predetermined algorithm to generate a common authentication key based on the stimulus. The devices can use the common authentication key to establish a secure network.
-
-