-
公开(公告)号:US12155760B2
公开(公告)日:2024-11-26
申请号:US17937659
申请日:2022-10-03
Applicant: Apple Inc.
Inventor: Birju N. Shah , Tristan F. Schaap , James E. Zmuda , Manfred von Willich
Abstract: Techniques are disclosed relating to time synchronization in a network. In some embodiments, an apparatus includes a first circuit having a first clock configured to maintain a local time value for a node coupled to a network. The first circuit is configured to send a first message to a second circuit. The first message includes a first nonce. The second circuit has a second clock that maintains a reference time value for the network. The first circuit receives a second message from the second circuit, the second message including a second nonce and is associated with a timestamp identifying the reference time value. The first circuit compares the first nonce to the second nonce to determine whether the timestamp is valid and, in response to determining that the timestamp is valid, uses the timestamp to synchronize the first clock with the second clock.
-
公开(公告)号:US11463253B2
公开(公告)日:2022-10-04
申请号:US16329743
申请日:2017-09-08
Applicant: Apple Inc.
Inventor: Birju N. Shah , Tristan F. Schaap , James E. Zmuda , Manfred von Willich
Abstract: Techniques are disclosed relating to time synchronization in a network. In some embodiments, an apparatus includes a first circuit having a first clock configured to maintain a local time value for a node coupled to a network. The first circuit is configured to send a first message to a second circuit. The first message includes a first nonce. The second circuit has a second clock that maintains a reference time value for the network. The first circuit receives a second message from the second circuit, the second message including a second nonce and is associated with a timestamp identifying the reference time value. The first circuit compares the first nonce to the second nonce to determine whether the timestamp is valid and, in response to determining that the timestamp is valid, uses the timestamp to synchronize the first clock with the second clock.
-
公开(公告)号:US10747908B2
公开(公告)日:2020-08-18
申请号:US16128396
申请日:2018-09-11
Applicant: Apple Inc.
Inventor: Pierre-Olivier J. Martel , Jeffrey R. Wilcox , Ian P. Shaeffer , Andrew D. Myrick , Robert W. Hill , Tristan F. Schaap
Abstract: Techniques are disclosed in which a secure circuit controls a gating circuit to enable or disable other circuitry of a device (e.g., one or more input sensors). For example, the gating circuit may be a power gating circuit and the secure circuit may be configured to disable power to an input sensor in certain situations. As another example, the gating circuit may be a clock gating circuit and the secure circuit may be configured to disable the clock to an input sensor. As yet another example, the gating circuit may be configured to gate a control bus and the secure circuit may be configured to disable control signals to an input sensor. In some embodiments, hardware resources included in or controlled by the secure circuit are not accessible by other elements of the device, other than by sending requests to a predetermined set of memory locations (e.g., a secure mailbox).
-
公开(公告)号:US20230125937A1
公开(公告)日:2023-04-27
申请号:US18145454
申请日:2022-12-22
Applicant: Apple Inc.
Inventor: Tristan F. Schaap
Abstract: Techniques are disclosed securely communicating traffic over a network. In some embodiments, an apparatus includes a first circuit having a local clock configured to maintain a local time value. The first circuit is configured to determine a synchronized time value based on the local time value, the synchronized time value being an expected time value of a reference clock. The first circuit is further configured to generate a first encryption key by calculating a key derivation function based on the synchronized time value and encrypt a portion of a packet using the first encryption key, the portion of the packet being to be communicated to a second circuit. In some embodiments, the apparatus further includes a first network node coupled to the first circuit and configured to communicate the packet to a second network node coupled to the second circuit and to include the synchronized time value in the packet.
-
公开(公告)号:US20230028255A1
公开(公告)日:2023-01-26
申请号:US17937659
申请日:2022-10-03
Applicant: Apple Inc.
Inventor: Birju N. Shah , Tristan F. Schaap , James E. Zmuda , Manfred von Willich
Abstract: Techniques are disclosed relating to time synchronization in a network. In some embodiments, an apparatus includes a first circuit having a first clock configured to maintain a local time value for a node coupled to a network. The first circuit is configured to send a first message to a second circuit. The first message includes a first nonce. The second circuit has a second clock that maintains a reference time value for the network. The first circuit receives a second message from the second circuit, the second message including a second nonce and is associated with a timestamp identifying the reference time value. The first circuit compares the first nonce to the second nonce to determine whether the timestamp is valid and, in response to determining that the timestamp is valid, uses the timestamp to synchronize the first clock with the second clock.
-
公开(公告)号:US11176280B2
公开(公告)日:2021-11-16
申请号:US15720736
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Pierre-Olivier J. Martel , Jeffrey R. Wilcox , Ian P. Shaeffer , Andrew D. Myrick , Robert W. Hill , Tristan F. Schaap
IPC: H04L29/06 , G06F21/76 , G06F21/71 , G06F21/57 , G06F21/74 , G06F21/81 , G06F1/3237 , G06F21/62 , G06F1/3287
Abstract: Techniques are disclosed in which a secure circuit controls a gating circuit to enable or disable other circuity of a device (e.g., one or more input sensors). For example, the gating circuit may be a power gating circuit and the secure circuit may be configured to disable power to an input sensor in certain situations. As another example, the gating circuit may be a clock gating circuit and the secure circuit may be configured to disable the clock to an input sensor. As yet another example, the gating circuit may be configured to gate a control bus and the secure circuit may be configured to disable control signals to an input sensor. In some embodiments, hardware resources included in or controlled by the secure circuit are not accessible by other elements of the device, other than by sending requests to a predetermined set of memory locations (e.g., a secure mailbox).
-
公开(公告)号:US20170024559A1
公开(公告)日:2017-01-26
申请号:US14807609
申请日:2015-07-23
Applicant: Apple Inc.
Inventor: Gregory D. Hughes , Conrado Blasco , Gerard R. Williams, III , Jacques Anthony Vidrine , Jeffry E. Gonion , Timothy R. Paaske , Tristan F. Schaap
IPC: G06F21/54
CPC classification number: G06F21/54
Abstract: Systems, apparatuses, methods, and computer-readable mediums for preventing return oriented programming (ROP) attacks. A compiler may insert landing pads adjacent to valid return targets in an instruction sequence. When a return instruction is executed, the processor may treat the return as suspicious if the target of the return instruction does not have an adjacent landing pad. Additionally, each landing pad may be encoded with a color, and a colored launch pad may be inserted into the instruction stream next to each return instruction. When a return instruction is executed, the processor may determine if the target of the return has a landing pad with the same color as the launch pad of the return instruction. Return-target pairs with color mismatches may be treated as suspicious and the offending process may be killed.
Abstract translation: 用于防止返回定向编程(ROP)攻击的系统,装置,方法和计算机可读介质。 编译器可以在指令序列中插入与有效返回目标相邻的着陆焊盘。 当执行返回指令时,如果返回指令的目标没有相邻的着陆垫,则处理器可以将返回值视为可疑。 此外,每个着陆垫可以用颜色编码,并且彩色的发射板可以插入每个返回指令旁边的指令流中。 当执行返回指令时,处理器可以确定返回目标是否具有与返回指令的发射台相同颜色的着陆键盘。 具有颜色不匹配的返回目标对可能被视为可疑的,并且违规进程可能被杀死。
-
公开(公告)号:US11601287B2
公开(公告)日:2023-03-07
申请号:US17203560
申请日:2021-03-16
Applicant: Apple Inc.
Inventor: Tristan F. Schaap , Conrad Sauerwald , Craig Marciniak , Jerrold V. Hauck , Zachary F. Papilion , Jeffrey Lee
IPC: H04L29/06 , H04L9/32 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/40 , H04W12/04 , H04W12/06 , H04W76/14 , G06F8/654 , H04W12/50 , H04L67/00 , H04W4/80
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:US20200213133A1
公开(公告)日:2020-07-02
申请号:US16537391
申请日:2019-08-09
Applicant: Apple Inc.
Inventor: Tristan F. Schaap , Conrad Sauerwald , Craig Marciniak , Jerrold V. Hauck , Zachary F. Papilion , Jeffrey Lee
IPC: H04L9/32 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L29/06 , H04W12/04 , H04W12/06 , H04W76/14 , G06F8/654 , H04W12/00
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:US10382210B2
公开(公告)日:2019-08-13
申请号:US15274836
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Tristan F. Schaap , Conrad Sauerwald , Craig A. Marciniak , Jerrold V. Hauck , Zachary F. Papilion , Jeffrey Lee
IPC: H04L29/06 , H04L9/32 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04W12/04 , H04W12/06 , H04W76/14 , G06F8/654 , H04L29/08 , H04W4/80
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
-
-
-
-
-
-
-
-