File system metadata protection
    14.
    发明授权

    公开(公告)号:US11194920B2

    公开(公告)日:2021-12-07

    申请号:US16659146

    申请日:2019-10-21

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to securely storing file system metadata in a computing device. In one embodiment, a computing device includes a processor, memory, and a secure circuit. The memory has a file system stored therein that includes metadata for accessing a plurality of files in the memory. The metadata is encrypted with a metadata encryption key that is stored in an encrypted form. The secure circuit is configured to receive a request from the processor to access the file system. In response to the request, the secure circuit is configured to decrypt the encrypted form of the metadata encryption key. In some embodiments, the computing device includes a memory controller configured to receive the metadata encryption key from the secure circuit, retrieve the encrypted metadata from the memory, and decrypt the encrypted metadata prior to providing the metadata to the processor.

    Systems and methods of context based data access control of encrypted files
    17.
    发明授权
    Systems and methods of context based data access control of encrypted files 有权
    基于上下文数据访问控制加密文件的系统和方法

    公开(公告)号:US09558363B2

    公开(公告)日:2017-01-31

    申请号:US14503244

    申请日:2014-09-30

    Applicant: Apple Inc.

    Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).

    Abstract translation: 在一些实现中,可以基于移动设备的上下文来访问(例如,解密,使得可用)存储在移动设备上的加密数据(例如,应用数据,钥匙串数据,存储的密码等)。 上下文可以包括当前设备状态(例如,锁定,解锁,在首次解锁之后等等)。 上下文可以包括当前设备设置(例如,启用/禁用密码)。 上下文可以包括已经由移动设备接收的数据(例如,指纹扫描,输入的密码,位置信息,接收的加密密钥,时间信息)。

    Secure Key Exchange
    18.
    发明申请

    公开(公告)号:US20250097018A1

    公开(公告)日:2025-03-20

    申请号:US18542176

    申请日:2023-12-15

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a first device belonging to a first device group receives a request to perform a key exchange to establish a shared secret with a second device belonging to a second device group. The first device verifies a key authorization data structure issued by a key authority, the key authorization data structure including a first public key of a first participant authority authorized to identify members of the first device group and a second public key of a second participant authority authorized to identify members of the second device group. In response to the verifying being successful, the first device performs the requested exchange using a public key pair attested to by the first participant authority as belonging to a member in the first device group.

    Multi-user storage volume encryption via secure processor

    公开(公告)号:US11455432B1

    公开(公告)日:2022-09-27

    申请号:US16895933

    申请日:2020-06-08

    Applicant: Apple Inc.

    Abstract: Embodiments described herein enable multi-user storage volume encryption via a secure enclave processor. One embodiment provides for a computing device comprising a first processor to execute a first operating system having one or more user accounts; a second processor to execute a second operating system, the second processor to receive a first encrypted key from the first processor and decrypt a volume encryption key via a key encryption key derived from the first encrypted key, the first encrypted key derived via the secure enclave without user-provided entropy; and a non-volatile memory controller to access encrypted data within non-volatile memory using the volume encryption key.

Patent Agency Ranking