POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL
    21.
    发明申请
    POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL 有权
    用于管理访问控制的基于策略的技术

    公开(公告)号:US20140143826A1

    公开(公告)日:2014-05-22

    申请号:US14085951

    申请日:2013-11-21

    Applicant: Apple Inc.

    CPC classification number: G06F21/604 H04L63/102 H04L63/105 H04L63/20 H04W12/08

    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.

    Abstract translation: 描述了基于策略的框架。 该基于策略的框架可以用于指定逻辑实体执行与位于电子设备中的安全元件内的访问控制元素(例如电子订户身份模块)相关联的操作的权限。 注意,对于与相同或不同的访问控制元素相关联的不同操作,不同的逻辑实体可以具有不同的权限。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的凭证的类型,使得不同类型的凭证可以用于不同的操作和/或由不同的逻辑实体使用。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的安全协议和安全级别,使得不同的安全协议和安全级别可以用于不同的操作和/或不同的逻辑实体。

    Methods and apparatus for user authentication and human intent verification in mobile devices

    公开(公告)号:US10856148B2

    公开(公告)日:2020-12-01

    申请号:US16557770

    申请日:2019-08-30

    Applicant: Apple Inc.

    Abstract: Methods and apparatus for user authentication and human intent verification of administrative operations for eSIMs of an eUICC included in a mobile device are disclosed. Certain administrative operations, such as import, modification, and/or export, of an eSIM and/or for an eUICCs firmware can require user authentication and/or human intent verification before execution of the administrative operations are performed or completed by the mobile device. A user of the mobile device provides information to link an external user account to an eSIM upon (or subsequent to) installation on the eUICC. User credentials, such as a user name and password, and/or information generated therefrom, can be used to authenticate the user with an external server. In response to successful user authentication, the administrative operations are performed. Human intent verification can also be performed in conjunction with user authentication to prevent malware from interfering with eSIM and/or eUICC functions of the mobile device.

    UNSUPERVISED ANOMALY DETECTION
    28.
    发明申请

    公开(公告)号:US20190243743A1

    公开(公告)日:2019-08-08

    申请号:US15968684

    申请日:2018-05-01

    Applicant: Apple Inc.

    CPC classification number: G06F11/3612 G06F16/2365 G06N3/0445 G06N3/0472

    Abstract: The subject technology extracts features from each log line of a log file. The subject technology determines, based on the features, a sequence of log lines. The subject technology determines probabilities of log lines occurring within a window of time from a respective log line from the sequence of log lines, and determines probabilities of periods of time within the window of time that a next log line will occur after the respective log line. The subject technology segments log lines from the log file into sequences of log lines based on the probabilities of the set of log lines occurring within the window of time and the probabilities of periods of time that the next log line occurs after the respective log line. The subject technology determines a predicted subsequent log line, and detects an anomaly when an actual subsequent log line differs from the predicted subsequent log line.

    Instantiation of multiple electronic subscriber identity module (eSIM) instances

    公开(公告)号:US10277587B2

    公开(公告)日:2019-04-30

    申请号:US15287614

    申请日:2016-10-06

    Applicant: Apple Inc.

    Abstract: Methods are provided for instantiating multiple electronic subscriber identity modules (eSIMs) to an electronic universal integrated circuit card (eUICC) using a manufacturer-installed data binary large object (data blob). An eSIM package including the data blob in encrypted form is securely installed in the eUICC in a manufacturing environment. A key encryption key (KEK) associated with the eSIM package is separately provided to an original equipment manufacturer (OEM) wireless device factory. The OEM wireless device factory provides the KEK to the eUICC within a given wireless device. The eUICC uses the KEK to decrypt the eSIM package and provide the data blob. The eUICC can receive a request to instantiate a first eSIM. The eUICC can instantiate the first eSIM using data from the data blob. A user can then access network services using the wireless device. Subsequently, a second eSIM can be instantiated by the eUICC using the data blob.

Patent Agency Ranking