SYSTEM AND METHOD FOR PRESERVING REFERENCES IN SANDBOXES
    2.
    发明申请
    SYSTEM AND METHOD FOR PRESERVING REFERENCES IN SANDBOXES 审中-公开
    用于保护砂糖参考物的系统和方法

    公开(公告)号:WO2012166316A1

    公开(公告)日:2012-12-06

    申请号:PCT/US2012/037400

    申请日:2012-05-10

    IPC分类号: G06F21/00

    CPC分类号: G06F21/53

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for preserving references in sandboxes. A system implementing the method receives a document for use in a sandbox environment and passes the document to a parser, via a coordinator. The parser finds references in the document to other resources and outputs a list of references. The system passes the list of references to a verifier that verifies each reference and outputs a list of verified references. The system passes the list of verified references to the sandboxed application which extends the sandbox to include the resources on the list of verified references. In one embodiment, the system preserves references in sandboxes without the use a coordinator.

    摘要翻译: 本文公开了用于保存砂箱中的参考的系统,方法和非暂时的计算机可读存储介质。 实现该方法的系统接收用于沙盒环境中的文档,并通过协调器将文档传递给解析器。 解析器将文档中的引用找到其他资源,并输出引用列表。 系统将引用列表传递给验证者,该验证者验证每个引用,并输出已验证引用的列表。 系统将经过验证的引用列表传递给沙盒应用程序,该应用程序将沙箱扩展到包含已验证引用列表中的资源。 在一个实施例中,系统在沙盒中保留引用而不使用协调器。

    FRIEND KEY SHARING
    5.
    发明申请
    FRIEND KEY SHARING 审中-公开

    公开(公告)号:WO2019241047A1

    公开(公告)日:2019-12-19

    申请号:PCT/US2019/035937

    申请日:2019-06-07

    申请人: APPLE INC.

    摘要: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.

    AUTHENTICATION TECHNIQUES IN RESPONSE TO ATTEMPTS TO ACCESS SENSITIVE INFORMATION

    公开(公告)号:WO2018226263A1

    公开(公告)日:2018-12-13

    申请号:PCT/US2018/015503

    申请日:2018-01-26

    申请人: APPLE INC.

    摘要: The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant "who owns this device?" By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.

    CONSISTENT EXTENSION POINTS TO ALLOW AN EXTENSION TO EXTEND FUNCTIONALITY OF AN APPLICATION TO ANOTHER APPLICATION
    7.
    发明申请
    CONSISTENT EXTENSION POINTS TO ALLOW AN EXTENSION TO EXTEND FUNCTIONALITY OF AN APPLICATION TO ANOTHER APPLICATION 审中-公开
    一致的延伸要点,以延长延长其他应用程序功能的功能

    公开(公告)号:WO2015183456A1

    公开(公告)日:2015-12-03

    申请号:PCT/US2015/028203

    申请日:2015-04-29

    申请人: APPLE INC.

    IPC分类号: G06F9/445 G06F21/53

    CPC分类号: G06F9/44526 G06F21/53

    摘要: According to one embodiment, in response to an inquiry received from a first application for an extension service associated with a first of a plurality of extension points of an operating system, a list of one or more extensions is identified that have been registered for the first extension point with the operating system, where the first application is executed within a first sandboxed environment. The identified list of extensions is displayed to prompt a user to select one of the extensions to be associated with the first application. In response to a selection of one of the extensions, the selected extension is launched in a second sandboxed environment. The selected extension and the second application were packaged in an application bundle, and when the application bundle was installed, the selected extension and the second application appeared in a registry of the operating system as separate applications.

    摘要翻译: 根据一个实施例,响应于从与第一应用程序相关联的用于与操作系统的多个扩展点中的第一个扩展点相关联的扩展服务的查询,识别一个或多个扩展的列表,其已被注册为第一 扩展点与操作系统,第一个应用程序在第一个沙盒环境中执行。 显示已识别的扩展列表,以提示用户选择要与第一个应用程序相关联的其中一个扩展。 响应于选择其中一个扩展,所选扩展名在第二个沙盒环境中启动。 所选的扩展和第二个应用程序被打包在应用程序包中,并且当安装了应用程序包时,所选的扩展和第二个应用程序作为单独的应用程序出现在操作系统的注册表中。

    FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS
    9.
    发明申请
    FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS 审中-公开
    文件系统访问一个或多个SANDBOXED应用程序

    公开(公告)号:WO2013109508A1

    公开(公告)日:2013-07-25

    申请号:PCT/US2013/021486

    申请日:2013-01-14

    申请人: APPLE INC.

    IPC分类号: G06F21/53 G06F17/30

    摘要: Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed environment. One or more applications are restricted by an access control system, which can be, for example, a trusted software component of an operating system. In one embodiment, the bookmarks or other identifiers allow an application to have access to a file even if the file is renamed or moved by a user while the application has been terminated. In one embodiment, a resource manager, or other trusted access control system, can interact with an application to allow for the use of bookmarks in an environment in which a sandbox application controls access to the files such that each application must make a request to the sandbox application in order to obtain access to a particular file or folder.

    摘要翻译: 描述了方法,系统和机器可读存储介质,其中在一个实施例中,诸如书签的标识符被用于允许访问沙盒环境中的文件或文件夹。 访问控制系统限制一个或多个应用程序,访问控制系统可以是例如操作系统的可信软件组件。 在一个实施例中,书签或其它标识符允许应用程序访问文件,即使在应用程序已被终止时,用户重命名或移动该文件。 在一个实施例中,资源管理器或其他受信任的访问控制系统可以与应用程序交互以允许在沙盒应用程序控制对文件的访问的环境中使用书签,使得每个应用程序必须向 沙箱应用程序,以获取访问特定的文件或文件夹。

    SYSTEM AND METHOD FOR TAMPER-RESISTANT BOOTING

    公开(公告)号:WO2012097231A3

    公开(公告)日:2012-07-19

    申请号:PCT/US2012/021215

    申请日:2012-01-13

    IPC分类号: G06F21/00

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for booting a computing device having an encrypted storage medium using full disk encryption, referred to as tamper-resistant boot. The system retrieves a kernel cache and a kernel cache digest from an unencrypted storage medium and verifies the authenticity of the kernel cache based on the credentials and the kernel cache digest. Initiation and execution of the operating system is performed if the kernel cache is authentic. In one embodiment, the system verifies the authenticity of a request to disable tamper-resistant booting by utilizing a password verifier and a password proof.