Systems and Methods for Providing Trustworthiness Scores

    公开(公告)号:US20220382838A1

    公开(公告)日:2022-12-01

    申请号:US17804814

    申请日:2022-05-31

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to computing security and privacy. In some embodiments, a computing device provides, to a service computing system, a service request that identifies an action and includes an anonymous identifier for a user of the computing device. The computing device receives, from the service computing system, a score request for a trustworthiness score indicative of the user's trustworthiness. In response to receiving the score request from the service computing system, the computing device provides information indicative of the user's identity to a scoring computing system and receives the trustworthiness score and a corresponding score signature from the scoring computing system. In response to receiving the score and the score signature from the scoring computing system, the computing device provides the score to the service computing system.

    Segmented Communication Over Wireless Networks

    公开(公告)号:US20250071581A1

    公开(公告)日:2025-02-27

    申请号:US18455880

    申请日:2023-08-25

    Applicant: Apple Inc.

    Abstract: A communications system may include user equipment (UE) that transmits data to a recipient via a network. The UE may receive user input and may generate the data based on the input. When a terrestrial network is unavailable to the UE, the UE may transmit segments of the data over a satellite constellation as the UE continues to receive input and while connectivity to the constellation exceeds a threshold. If a portion of the input includes an edit to a previous segment, the UE may include an edit flag in the corresponding segment. Once input has finished, the UE may sign the segments and may transmit a signature over the constellation. The network may store the segments as received from the constellation, may replace edited segments with more recent segments containing edit flags, and may compile and transmit all of the segments to the recipient upon receipt of the signature.

    AUTHENTICATED AND ENCRYPTED ARCHIVES

    公开(公告)号:US20220092208A1

    公开(公告)日:2022-03-24

    申请号:US17242105

    申请日:2021-04-27

    Applicant: Apple Inc.

    Abstract: Embodiments described herein provide a compressed container format that enables the container to be decrypted and decompressed in a streaming manner. One embodiment provides a container format for encrypted archives in which data is compressed and encrypted in a segmented manner. A segment of the archive can be decompressed, decrypted, and checked for integrity before the entire archive is received. Metadata for the encrypted archive is also encrypted to secure details of data stored within the archive.

    Data encryption for emergency response

    公开(公告)号:US11973859B2

    公开(公告)日:2024-04-30

    申请号:US17123856

    申请日:2020-12-16

    Applicant: Apple Inc.

    Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.

    Sharing system access using a mobile device

    公开(公告)号:US11522695B2

    公开(公告)日:2022-12-06

    申请号:US16982513

    申请日:2019-03-19

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.

    DEVICE-TO-DEVICE MESSAGING PROTOCOL
    10.
    发明申请

    公开(公告)号:US20200235929A1

    公开(公告)日:2020-07-23

    申请号:US16528532

    申请日:2019-07-31

    Applicant: Apple Inc.

    Abstract: One embodiment provides for an electronic device, comprising a network interface, a memory coupled with the network interface, at least one application processor coupled with the memory, the at least one processor to execute instructions stored in the memory, and a secure processor including a cryptographic engine, wherein the cryptographic engine is to generate a sealed encrypted message to be transmitted via the network interface, the sealed encrypted message encrypted on behalf of the at least one application processor and includes a signature to enable integrity verification of the sealed encrypted message, the signature generated based on an identity key of the electronic device and data including ciphertext of the encrypted message and a public key of a recipient of the sealed encrypted message.

Patent Agency Ranking