Friend Key Sharing
    14.
    发明申请

    公开(公告)号:US20210250355A1

    公开(公告)日:2021-08-12

    申请号:US17251140

    申请日:2019-06-07

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.

    Secure element having multiple users

    公开(公告)号:US11074582B2

    公开(公告)日:2021-07-27

    申请号:US15709925

    申请日:2017-09-20

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.

    Countersigning updates for multi-chip devices

    公开(公告)号:US10303884B2

    公开(公告)日:2019-05-28

    申请号:US15588547

    申请日:2017-05-05

    Applicant: Apple Inc.

    Abstract: A device facilitating countersigning updates for multi-chip devices includes at least one processor configured to receive, from a collocated chip, a data item and a software update, the data item being signed using a private key corresponding to a primary entity associated with the collocated chip and the data item comprising an authentication code generated using a symmetric key corresponding to a secondary entity associated with the software update. At least one processor is further configured to verify the data item using a public key associated with the primary entity. At least one processor is further configured to verify the software update based at least in part on the authentication code and using the symmetric key corresponding to the primary entity. At least one processor is further configured to install the software update when both the data item and the software update are verified, otherwise discard the software update.

    Enhancing jitter buffer performance through radio level feedback
    17.
    发明授权
    Enhancing jitter buffer performance through radio level feedback 有权
    通过无线电级别反馈增强抖动缓冲区的性能

    公开(公告)号:US09554346B2

    公开(公告)日:2017-01-24

    申请号:US14821144

    申请日:2015-08-07

    Applicant: Apple Inc.

    Abstract: A jitter buffer in a Voice over LTE receiver may be influenced by radio level feedback (RLF) from both local and remote endpoints to preemptively adjust the jitter buffer delay in anticipation of predicted future losses that have a high probability of occurring. The radio events of the RLF and the scenarios that trigger the preemptive adjustments may be identified, and their use may be expressed in terms of mathematical formulas. Previously, the instantaneous jitter was derived from a weighted history of the media stream, and consequently only packets that had already been received were used to compute the instantaneous jitter to adjust the length of the buffer. By providing and using RLF from both local and remote endpoints, the anticipated delay—for packets that have not yet arrived—may be used to preemptively adjust the buffer, thereby minimizing packet loss without introducing unnecessary delay.

    Abstract translation: 在LTE语音接收机中的抖动缓冲器可能受来自本地和远端端点的无线电电平反馈(RLF)的影响,以预先考虑具有高概率发生的预测未来损耗的抖动缓冲器延迟。 可以识别RLF的无线电事件和触发抢先调整的场景,并且可以用数学公式来表示它们的使用。 以前,瞬时抖动是从媒体流的加权历史得出的,因此只有已经接收到的数据包被用于计算瞬时抖动以调整缓冲器的长度。 通过从本地端点和远端端点提供和使用RLF,对于尚未到达的数据包,预期的延迟可能被用于抢先调整缓冲区,从而最大限度地减少数据包丢失而不引入不必要的延迟。

    System access using a mobile device

    公开(公告)号:US11888594B2

    公开(公告)日:2024-01-30

    申请号:US17479571

    申请日:2021-09-20

    Applicant: Apple Inc.

    CPC classification number: H04L9/3263 H04L9/0841 H04L9/3247 H04L63/0823

    Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.

    System Access Using a Mobile Device

    公开(公告)号:US20220078029A1

    公开(公告)日:2022-03-10

    申请号:US17479571

    申请日:2021-09-20

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.

Patent Agency Ranking