-
公开(公告)号:US20220399994A1
公开(公告)日:2022-12-15
申请号:US17848922
申请日:2022-06-24
Applicant: APPLE INC.
Inventor: Yannick L. Sierra , Zhimin Chen , Thomas Icart
IPC: H04L9/08 , G01S13/76 , H04L9/40 , H04W12/03 , H04W12/041
Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.
-
公开(公告)号:US20200081785A1
公开(公告)日:2020-03-12
申请号:US16129726
申请日:2018-09-12
Applicant: Apple Inc.
Inventor: Zhimin Chen , Timothy R. Paaske , Yannick L. Sierra , Anish C. Trivedi
Abstract: A method for verifying program flow during execution of a software program in a computer system is disclosed. Program code of the software program includes multiple program instructions and checkpoint data structures, where a given checkpoint data structure is associated with a given program instruction and is linked to at least one other checkpoint data structure. A fault monitor circuit may receive a particular checkpoint data structure and compare the particular checkpoint data structure to a previously received checkpoint data structure that is associated with another program instruction. Based on results of the comparison, the software fault monitor circuit may signal a program flow error.
-
公开(公告)号:US10243990B1
公开(公告)日:2019-03-26
申请号:US15275044
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Zhimin Chen , Timothy R. Paaske , Gilbert H. Herbeck
Abstract: A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data corresponding to sensitive information are stored in off-chip memory. The security processor uses an integrity data structure, such as an integrity tree, for the blocks. The intermediate nodes of the integrity tree use nonces which have been generated independent of any value within a corresponding block. By using only the nonces to generate tags in the root at the top layer stored in on-chip memory and the nodes of the intermediate layers stored in off-chip memory, an amount of storage used is reduced for supporting the integrity tree. When the security processor detects events which create access requests for one or more blocks, the security processor uses the integrity tree to verify a replay attack has not occurred and corrupted data.
-
公开(公告)号:US20200336303A1
公开(公告)日:2020-10-22
申请号:US16643237
申请日:2018-07-03
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Zhimin Chen , Thomas Icart
Abstract: Embodiments described herein enable the generation of cryptographic material for ranging operations in a manner that reduces and obfuscates potential correlations between leaked and secret information. One embodiment provides for an apparatus including a ranging module having one or more ranging sensors. The ranging module is coupled to a secure processing system through a hardware interface to receive at least one encrypted ranging session key, the ranging module to decrypt the at least one encrypted ranging session key to generate a ranging session key, generate a sparse ranging input, derive a message session key based on the ranging session key, and derive a derived ranging key via a key derivation cascade applied to the message session key and the sparse ranging input, the derived ranging key to encrypt data transmitted during a ranging session.
-
-
-