-
公开(公告)号:US20180352030A1
公开(公告)日:2018-12-06
申请号:US15996390
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Benjamin I. WILLIAMSON , Keaton F. MOWERY , Mitchell D. ADLER , Michelle A. AURICCHIO , Luke T. HIESTERMAN
IPC: H04L29/08
Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
-
公开(公告)号:US20160217294A1
公开(公告)日:2016-07-28
申请号:US14866782
申请日:2015-09-25
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Paul A. SELIGMAN , Van HONG , Mitchell D. ADLER
CPC classification number: G06F21/6209 , H04L9/0825 , H04L9/0894 , H04L9/14 , H04L63/06 , H04L63/10
Abstract: The embodiments set forth techniques for implementing a cloud service that enables cloud data to be shared between different users in a secure manner. One embodiment involves a sharing manager and a sharing client, where the sharing manager is configured to manage various data components stored within a storage system managed by the cloud service. These data components can include user accounts, share objects (for sharing data between users—and, in some cases, public users not known to the sharing manager)—as well as various “wrapping objects” that enable data to be logically separated in an organized manner within the storage system. According to this approach, the sharing client is configured to interface with the sharing manager in order to carry out various encryption/decryption techniques that enable the cloud data to be securely shared between the users.
Abstract translation: 这些实施例阐述了实现云服务的技术,其使云数据能够以安全的方式在不同用户之间共享。 一个实施例涉及共享管理器和共享客户端,其中共享管理器被配置为管理由云服务管理的存储系统中存储的各种数据组件。 这些数据组件可以包括用户帐户,共享对象(用于在用户之间共享数据,在某些情况下,共享管理器不知道的公共用户),以及各种“包装对象”,使数据在逻辑上分开 在存储系统中有组织的方式。 根据该方法,共享客户端被配置为与共享管理器接口,以便执行使得能够在用户之间安全地共享云数据的各种加密/解密技术。
-
公开(公告)号:US20180352031A1
公开(公告)日:2018-12-06
申请号:US15996403
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Benjamin I. WILLIAMSON , Keaton F. MOWERY , Mitchell D. ADLER , Michelle A. AURICCHIO , Luke T. HIESTERMAN
Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
-
公开(公告)号:US20180352022A1
公开(公告)日:2018-12-06
申请号:US15996387
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Benjamin I. WILLIAMSON , Keaton F. MOWERY , Mitchell D. ADLER , Michelle A. AURICCHIO , Luke T. HIESTERMAN
Abstract: Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
-
公开(公告)号:US20180336087A1
公开(公告)日:2018-11-22
申请号:US15717824
申请日:2017-09-27
Applicant: Apple Inc.
Inventor: Bob BRADLEY , Per Love HORNQUIST ASTRAND
Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
-
公开(公告)号:US20220083511A1
公开(公告)日:2022-03-17
申请号:US17533106
申请日:2021-11-22
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Van HONG , Nihar SHARMA , Xixi LU , Steven A. MYERS , Michelle D. LININGTON , Yannick L. SIERRA
IPC: G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US20210103491A1
公开(公告)日:2021-04-08
申请号:US17065492
申请日:2020-10-07
Applicant: Apple Inc.
Inventor: Bob BRADLEY , Per Love HORNQUIST ASTRAND
Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
-
公开(公告)号:US20190286614A1
公开(公告)日:2019-09-19
申请号:US16428914
申请日:2019-05-31
Applicant: Apple Inc.
Inventor: Per Love HORNQUIST ASTRAND , Benjamin I. WILLIAMSON , Keaton F. MOWERY , Mitchell D. ADLER , Michelle A. AURICCHIO , Luke T. HIESTERMAN
IPC: G06F16/178 , H04L9/08 , H04L9/30 , G06F16/182
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US20170318006A1
公开(公告)日:2017-11-02
申请号:US15499823
申请日:2017-04-27
Applicant: Apple Inc.
Inventor: Kevin N. ARMSTRONG , Per Love HORNQUIST ASTRAND , Steven M. WILLIAMSON
CPC classification number: H04L63/083 , G06F21/45 , G06F2221/2107 , G06F2221/2117 , H04L9/0863 , H04L9/0891 , H04L9/3228 , H04L2463/061 , H04L2463/062
Abstract: The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a common user account. According to the embodiments discussed herein, the user the can update a password of the user account at one computing device, and log into another computing device using the updated password without having to provide the current password for the other computing device. The embodiments incorporate a variety of encryption and key generation methods in order to safely transmit password updates between local computing devices. Specifically, the embodiments set forth methods and apparatus for generating and storing breadcrumbs that allow for decrypting a current password of a computing device using a new password.
-
-
-
-
-
-
-
-