-
公开(公告)号:US11182349B2
公开(公告)日:2021-11-23
申请号:US16428914
申请日:2019-05-31
Applicant: Apple Inc.
Inventor: Per Love Hornquist Astrand , Van Hong , Nihar Sharma , Xixi Lu , Steven A. Myers , Michelle D. Linington , Yannick L. Sierra
IPC: H04L29/06 , G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US11847099B2
公开(公告)日:2023-12-19
申请号:US17533106
申请日:2021-11-22
Applicant: Apple Inc.
Inventor: Per Love Hornquist Astrand , Van Hong , Nihar Sharma , Xixi Lu , Steven A. Myers , Michelle D. Linington , Yannick L. Sierra
IPC: H04L29/06 , G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
CPC classification number: G06F16/178 , G06F16/1834 , H04L9/0819 , H04L9/0825 , H04L9/0891 , H04L9/12 , H04L9/30 , H04L9/3247
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-