-
公开(公告)号:US11593797B2
公开(公告)日:2023-02-28
申请号:US15275281
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Libor Sykora , Delfin J. Rojas , Paul J. Sholtz , Erika Misaki , Shiva Krovi , Lawrence Aung , Julien Lerouge
Abstract: Techniques are disclosed relating to authentication using public key encryption. In one embodiment, a computing device includes a secure circuit, a processor, and memory. The secure circuit is configured to generate a public key pair usable to authenticate a user of the computing device. The memory has program instructions stored therein that are executable by the processor to cause the computing device to perform operations including authenticating the user with a server system by sending authentication information supplied by the user. The operations further include, in response to the server system verifying the authentication information, receiving a first token usable to register the public key pair with the server system and sending, to the server system, a request to register the public key pair for authenticating the user. In such an embodiment, the request includes the first token and identifies a public key of the public key pair.
-
公开(公告)号:US20140188808A1
公开(公告)日:2014-07-03
申请号:US13839358
申请日:2013-03-15
Applicant: Apple Inc.
Inventor: Christopher Wolf , Daniel I. Feldman , Eric A. Weiss , Kristen A. McIntyre , Pavel Cisler , Richard B. Blair , Erika Misaki
IPC: G06F17/30
CPC classification number: G06F17/30289 , G06F11/1451 , G06F11/1458 , G06F11/1469 , G06F11/323 , G06F17/3007 , G06F2201/815
Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data are disclosed. In some implementations, visual representations of files are generated for presentation in a backup user interface. The visual representations are generated from sparse file system metadata stored on the computing device, thus allowing faster navigating of the backup user interface. During a restore operation, the metadata can be used to retrieve the items from their physical storage locations. In some implementations, when the storage capacity of a backup storage device exceeds a threshold, the data for the N oldest backups are replaced with sparse file system metadata, which can be used to generate visual representations for presentation in the backup user interface.
Abstract translation: 公开了用于存储数据的方法,系统和装置,包括在计算机存储介质上编码的计算机程序。 在一些实现中,生成用于呈现在备份用户界面中的文件的视觉表示。 视觉表示由存储在计算设备上的稀疏文件系统元数据生成,从而允许更快地导航备份用户界面。 在还原操作期间,可以使用元数据从物理存储位置检索项目。 在一些实现中,当备份存储设备的存储容量超过阈值时,N个最旧的备份的数据被稀疏文件系统元数据替换,稀疏文件系统元数据可用于生成用于呈现在备份用户界面中的可视表示。
-
公开(公告)号:US09542423B2
公开(公告)日:2017-01-10
申请号:US13839358
申请日:2013-03-15
Applicant: Apple Inc.
Inventor: Christopher Wolf , Daniel I. Feldman , Eric A. Weiss , Kristen A. McIntyre , Pavel Cisler , Richard B. Blair , Erika Misaki
CPC classification number: G06F17/30289 , G06F11/1451 , G06F11/1458 , G06F11/1469 , G06F11/323 , G06F17/3007 , G06F2201/815
Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data are disclosed. In some implementations, visual representations of files are generated for presentation in a backup user interface. The visual representations are generated from sparse file system metadata stored on the computing device, thus allowing faster navigating of the backup user interface. During a restore operation, the metadata can be used to retrieve the items from their physical storage locations. In some implementations, when the storage capacity of a backup storage device exceeds a threshold, the data for the N oldest backups are replaced with sparse file system metadata, which can be used to generate visual representations for presentation in the backup user interface.
Abstract translation: 公开了用于存储数据的方法,系统和装置,包括在计算机存储介质上编码的计算机程序。 在一些实现中,生成用于呈现在备份用户界面中的文件的视觉表示。 视觉表示由存储在计算设备上的稀疏文件系统元数据生成,从而允许更快地导航备份用户界面。 在还原操作期间,可以使用元数据从物理存储位置检索项目。 在一些实现中,当备份存储设备的存储容量超过阈值时,N个最旧的备份的数据被稀疏文件系统元数据替换,稀疏文件系统元数据可用于生成用于呈现在备份用户界面中的可视表示。
-
公开(公告)号:US20230289787A1
公开(公告)日:2023-09-14
申请号:US18174414
申请日:2023-02-24
Applicant: Apple Inc.
Inventor: Libor Sykora , Delfin J. Rojas , Paul J. Sholtz , Erika Misaki , Shiva Krovi , Lawrence Aung , Julien Lerouge
CPC classification number: G06Q20/3829 , H04L63/0861 , H04L63/083 , H04L9/3268 , G06Q20/3825 , H04L63/08 , H04L63/0823 , H04L63/126 , G06Q20/12 , G06Q20/385 , G06Q20/40145 , G06Q20/3223 , G06Q20/3227 , H04W12/069 , H04L2209/56 , H04L2209/80 , G06Q2220/00
Abstract: Techniques are disclosed relating to authentication using public key encryption. In one embodiment, a computing device includes a secure circuit, a processor, and memory. The secure circuit is configured to generate a public key pair usable to authenticate a user of the computing device. The memory has program instructions stored therein that are executable by the processor to cause the computing device to perform operations including authenticating the user with a server system by sending authentication information supplied by the user. The operations further include, in response to the server system verifying the authentication information, receiving a first token usable to register the public key pair with the server system and sending, to the server system, a request to register the public key pair for authenticating the user. In such an embodiment, the request includes the first token and identifies a public key of the public key pair.
-
公开(公告)号:US20170357967A1
公开(公告)日:2017-12-14
申请号:US15275281
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Libor Sykora , Delfin J. Rojas , Paul J. Sholtz , Erika Misaki , Shiva Krovi , Lawrence Aung , Julien Lerouge
CPC classification number: G06Q20/3829 , G06Q20/12 , G06Q20/3223 , G06Q20/3227 , G06Q20/3825 , G06Q20/385 , G06Q20/40145 , G06Q2220/00 , H04L9/3268 , H04L63/08 , H04L63/0823 , H04L63/083 , H04L63/0861 , H04L63/126 , H04L2209/56 , H04L2209/80 , H04W12/06
Abstract: Techniques are disclosed relating to authentication using public key encryption. In one embodiment, a computing device includes a secure circuit, a processor, and memory. The secure circuit is configured to generate a public key pair usable to authenticate a user of the computing device. The memory has program instructions stored therein that are executable by the processor to cause the computing device to perform operations including authenticating the user with a server system by sending authentication information supplied by the user. The operations further include, in response to the server system verifying the authentication information, receiving a first token usable to register the public key pair with the server system and sending, to the server system, a request to register the public key pair for authenticating the user. In such an embodiment, the request includes the first token and identifies a public key of the public key pair.
-
-
-
-