-
公开(公告)号:US11888594B2
公开(公告)日:2024-01-30
申请号:US17479571
申请日:2021-09-20
Applicant: Apple Inc.
Inventor: Florian Galdo , Arun G. Mathias , Matthias Lerch , Najeeb M. Abdulrahiman , Onur E. Tackin , Yannick Sierra
CPC classification number: H04L9/3263 , H04L9/0841 , H04L9/3247 , H04L63/0823
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:US11770862B2
公开(公告)日:2023-09-26
申请号:US17362096
申请日:2021-06-29
Applicant: Apple Inc.
Inventor: Shivani Suresh Babu , Arun G. Mathias , Rajesh Ambati , Thanigaivelu Elangovan , Ajay Singh , Raghuveer Mallikarjunan , Rohan C. Malthankar , Vikram B. Yerrabommanahalli , Chandiramohan Vasudevan , Juergen H. Kreuchauf , Harshit Chuttani , Punit H. Awatramani , Swapna V. Iyer , Lakshmi N. Kavuri , Muthukumaran Dhanapal , Kanuganti Rajeswar Reddy , Viswanath Nagarajan , Navjot Thakral
IPC: H04W24/10 , H04W76/10 , H04W76/38 , H04M1/72454
CPC classification number: H04W76/10 , H04M1/72454 , H04W24/10 , H04W76/38
Abstract: This disclosure relates to techniques for a wireless device to determine whether to display an indicator of millimeter wave cellular availability. A wireless device may establish a radio resource control connection that includes connectivity with a fifth generation new radio millimeter wave cell. The wireless device may determine to display an indication of millimeter wave cell availability. The wireless device may determine location status information and motion status information for the wireless device. The wireless device may determine when to cease displaying the indication of millimeter wave cell availability after the radio resource control connection is released or the millimeter wave cell is deconfigured based at least in part on the location status information for the wireless device and the motion status information for the wireless device.
-
公开(公告)号:US11425104B2
公开(公告)日:2022-08-23
申请号:US16654683
申请日:2019-10-16
Applicant: Apple Inc.
Inventor: Arun G. Mathias , Thomas A. Dilligan , Matthew C. Lucas , Anush G. Nadathur , Kevin P. McLaughlin
IPC: H04L29/06 , H04L29/08 , H04L9/40 , H04L67/06 , H04L67/1095 , H04L67/10 , H04L9/12 , H04L9/08 , H04L9/32
Abstract: A data transfer process can include multiple verification features usable by a “source” device to ensure that a “destination” device is authorized to receive a requested data object. The source device and destination device can communicate via a first communication channel (which can be on a wide-area network) to exchange public keys, then use the public keys to verify their identities and establish a secure session on a second communication channel (which can be a local channel). The data object can be transferred via the secure session. Prior to sending the data object, the source device can perform secondary verification operations (in addition to the key exchange) to confirm the identity of the second device and/or the locality of the connection on the second communication channel.
-
公开(公告)号:US11283703B2
公开(公告)日:2022-03-22
申请号:US16405221
申请日:2019-05-07
Applicant: Apple Inc.
Inventor: Joe S. Abuan , Bob Bradley , Craig P. Dooley , Gregg J. Golembeski, Jr. , Andrew W. Burks , Srinivas Rama , Arun G. Mathias , Anush G. Nadathur , Kevin P. McLaughlin
IPC: H04L29/06 , H04L43/10 , G06F11/30 , H04W4/70 , H04L67/303 , H04L67/04 , H04L67/12 , H04L67/02 , H04L9/00 , H04L9/08 , H04L9/32 , G06F21/44 , H04W12/50 , H04W12/04 , H04W4/80 , H04W12/06
Abstract: A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
-
公开(公告)号:US20220078029A1
公开(公告)日:2022-03-10
申请号:US17479571
申请日:2021-09-20
Applicant: Apple Inc.
Inventor: Florian Galdo , Arun G. Mathias , Matthias Lerch , Najeeb M. Abdulrahiman , Onur E. Tackin , Yannick Sierra
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:US20210392548A1
公开(公告)日:2021-12-16
申请号:US16902095
申请日:2020-06-15
Applicant: Apple Inc.
Inventor: Raghuveer Mallikarjunan , Madhusudan Chaudary , Faraz Faheem , Rajesh Ambati , Ajay Singh , Muhammad A. Alam , Muthukumaran Dhanapal , Geoffrey R. Hall , Franco Travostino , Thanigaivelu Elangovan , Lakshmi N. Kavuri , John Y. Su , Ajoy K. Singh , Punit H. Awatramani , Arun G. Mathias , Jordan B. Schneider , Roger N. Pantos , Alan Tseng
Abstract: This disclosure relates to techniques for a wireless device to detect network bandwidth throttling and dynamically select a buffer threshold. The wireless device may establish a wireless link. Data for a downlink stream may be requested when an amount of buffered data for the stream is below a lower buffer threshold, received via the wireless link, and buffered. Data requests for the stream may be stopped when the amount of buffered data for the stream is above an upper buffer threshold. The upper buffer threshold may be selected based on characteristics of the wireless link and the stream. Throughput of the wireless link may also be monitored during multiple time windows, and the wireless device may determine whether the wireless link caps bandwidth below a bandwidth threshold based on the throughput monitoring.
-
公开(公告)号:US20200228362A1
公开(公告)日:2020-07-16
申请号:US16816709
申请日:2020-03-12
Applicant: Apple Inc.
Inventor: Anush G. Nadathur , Srinivas Rama , Matthew C. Lucas , Nathan E. Carroll , Kevin P. McLaughlin , Thomas A. Dilligan , Arun G. Mathias
Abstract: An automated environment can include multiple controller devices capable of communicating with multiple accessory devices. The controller devices can automatically elect one of their number as a coordinator device for the environment and can automatically perform a new election if an incumbent coordinator becomes unavailable or resigns. The election processes can be transparent to any users. An elected coordinator can perform various operations to facilitate management of the automated environment, including routing of communications between controllers and accessories.
-
公开(公告)号:US10664257B2
公开(公告)日:2020-05-26
申请号:US15146771
申请日:2016-05-04
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias
Abstract: Activities involving a secure element (SE) in a mobile device include a background operation. When the SE initiates the background operation, it informs the mobile device of an estimated duration. The mobile device thus recognizes that the SE is not in a stuck state, and maintains a clock signal and a power flow to the SE. Firmware updates to the SE include erasing a non-volatile (NV) memory in the SE in parallel with firmware or software updates to other processor systems in the mobile device. Needed data, for example calibration data or cryptographic key data, is preserved by storing data from some processor systems in one or more supplementary security domains (SSDs) in the SE. When a given processor system completes a firmware update, the needed data is restored to the processor system from the SSD.
-
109.
公开(公告)号:US10405181B2
公开(公告)日:2019-09-03
申请号:US15876875
申请日:2018-01-22
Applicant: Apple Inc.
Inventor: Li Li , Xiangying Yang , Jerrold Von Hauck , Christopher B. Sharp , Yousuf H. Vaid , Arun G. Mathias , David T. Haggerty , Najeeb M. Abdulrahiman
Abstract: Methods and apparatus for user authentication and human intent verification of administrative operations for eSIMs of an eUICC included in a mobile device are disclosed. Certain administrative operations, such as import, modification, and/or export, of an eSIM and/or for an eUICCs firmware can require user authentication and/or human intent verification before execution of the administrative operations are performed or completed by the mobile device. A user of the mobile device provides information to link an external user account to an eSIM upon (or subsequent to) installation on the eUICC. User credentials, such as a user name and password, and/or information generated therefrom, can be used to authenticate the user with an external server. In response to successful user authentication, the administrative operations are performed. Human intent verification can also be performed in conjunction with user authentication to prevent malware from interfering with eSIM and/or eUICC functions of the mobile device.
-
公开(公告)号:US10080119B2
公开(公告)日:2018-09-18
申请号:US15817081
申请日:2017-11-17
Applicant: Apple Inc.
Inventor: Vikram B. Yerrabommanahalli , Li Li , Arun G. Mathias , Najeeb M. Abdulrahiman , Chandiramohan Vasudevan , Rohan C. Malthankar , Francisco J. Gonzalez , Rafael L. Rivera-Barreto , Jean-Marc Padova
CPC classification number: H04W4/60 , H04L61/106 , H04W8/18 , H04W8/205 , H04W68/005
Abstract: Some embodiments relate to methods for provisioning a secondary wireless device with an eSIM for wireless communication and activating multi-SIM functionality between the secondary wireless device and a primary wireless device having a subscribed SIM. The primary wireless device may act as a proxy in obtaining the eSIM for the secondary wireless device. The primary wireless device may then provide, to the cellular network, identifiers of the SIMs of the primary and secondary wireless devices. The primary wireless device may then request initiation of multi-SIM functionality for the two SIMs, and receive an indication that the multi-SIM functionality has been initiated. As an example, the multi-SIM functionality may be implemented by mapping the SIM of the primary wireless device and the SIM of the secondary wireless device (e.g., the provisioned eSIM) to the same Mobile Directory Number (MDN).
-
-
-
-
-
-
-
-
-