-
公开(公告)号:US09667620B2
公开(公告)日:2017-05-30
申请号:US14291887
申请日:2014-05-30
Applicant: Apple Inc.
Inventor: Kevin N. Armstrong , Per Love Hornquist Astrand , Steven M. Williamson
CPC classification number: H04L63/083 , G06F21/45 , G06F2221/2107 , G06F2221/2117 , H04L9/0863 , H04L9/0891 , H04L9/3228 , H04L2463/061 , H04L2463/062
Abstract: The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a common user account. According to the embodiments discussed herein, the user the can update a password of the user account at one computing device, and log into another computing device using the updated password without having to provide the current password for the other computing device. The embodiments incorporate a variety of encryption and key generation methods in order to safely transmit password updates between local computing devices. Specifically, the embodiments set forth methods and apparatus for generating and storing breadcrumbs that allow for decrypting a current password of a computing device using a new password.
-
公开(公告)号:US11847099B2
公开(公告)日:2023-12-19
申请号:US17533106
申请日:2021-11-22
Applicant: Apple Inc.
Inventor: Per Love Hornquist Astrand , Van Hong , Nihar Sharma , Xixi Lu , Steven A. Myers , Michelle D. Linington , Yannick L. Sierra
IPC: H04L29/06 , G06F16/178 , G06F16/182 , H04L9/30 , H04L9/08 , H04L9/12 , H04L9/32
CPC classification number: G06F16/178 , G06F16/1834 , H04L9/0819 , H04L9/0825 , H04L9/0891 , H04L9/12 , H04L9/30 , H04L9/3247
Abstract: The subject technology may be implemented by a device that includes at least one processor configured to encrypt a data object based at least in part on an encryption key. The at least one processor may be further configured to sign the encrypted data object with a private key and transmit the signed encrypted data object to a server for retrieval by another device. The at least one processor may be further configured to generate a sharing object corresponding to the data object, wherein the sharing object includes an encryption key and a public key that corresponds to the private key. The at least one processor may be further configured to encrypt the sharing object using a key of the other device and transmit, over a secure channel, the encrypted sharing object to the other device for subsequent retrieval and verification of the signed data object from the server.
-
公开(公告)号:US11461165B2
公开(公告)日:2022-10-04
申请号:US17065492
申请日:2020-10-07
Applicant: Apple Inc.
Inventor: Bob Bradley , Per Love Hornquist Astrand
Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
-
公开(公告)号:US10802904B2
公开(公告)日:2020-10-13
申请号:US15717824
申请日:2017-09-27
Applicant: Apple Inc.
Inventor: Bob Bradley , Per Love Hornquist Astrand
Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
-
公开(公告)号:US20180352435A1
公开(公告)日:2018-12-06
申请号:US15965544
申请日:2018-04-27
Applicant: Apple Inc.
Inventor: David C. Donley , Per Love Hornquist Astrand , Chen Ganir , Craig P. Dooley , James C. Grandy , Julien A. Poumailloux , Tyler D. Hawkins , David S. Wilser , David P. Remahl
Abstract: Migration of a pairing of wearable device to a new companion electronic device is disclosed. In one embodiment, pairing migration is performed by syncing and verifying a migration key in the wearable and new companion device. Pairing migration includes moving settings and pairing data of the wearable to the new companion device in response to detecting the wearable is associated with the migration key, wherein the migration key establishes a validation of trust of the wearable relative to the companion device. The settings and pairing data can include configuration and protected data and one or more keys to establish a trust relationship between the wearable and new companion device. The settings and pairing data can also include device data such that the wearable can be discoverable by the new companion device.
-
公开(公告)号:US20170357822A1
公开(公告)日:2017-12-14
申请号:US15619519
申请日:2017-06-11
Applicant: Apple Inc.
Inventor: Lei Wei , Yannick L. Sierra , Per Love Hornquist Astrand
Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.
-
-
-
-
-