Systems and methods of context based data access control of encrypted files
    24.
    发明授权
    Systems and methods of context based data access control of encrypted files 有权
    基于上下文数据访问控制加密文件的系统和方法

    公开(公告)号:US09558363B2

    公开(公告)日:2017-01-31

    申请号:US14503244

    申请日:2014-09-30

    Applicant: Apple Inc.

    Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).

    Abstract translation: 在一些实现中,可以基于移动设备的上下文来访问(例如,解密,使得可用)存储在移动设备上的加密数据(例如,应用数据,钥匙串数据,存储的密码等)。 上下文可以包括当前设备状态(例如,锁定,解锁,在首次解锁之后等等)。 上下文可以包括当前设备设置(例如,启用/禁用密码)。 上下文可以包括已经由移动设备接收的数据(例如,指纹扫描,输入的密码,位置信息,接收的加密密钥,时间信息)。

    Key management using security enclave processor
    25.
    发明授权
    Key management using security enclave processor 有权
    密钥管理使用安全飞地处理器

    公开(公告)号:US09419794B2

    公开(公告)日:2016-08-16

    申请号:US14493458

    申请日:2014-09-23

    Applicant: Apple Inc.

    Abstract: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.

    Abstract translation: SOC实现安全飞地处理器(SEP)。 SEP可以包括处理器和一个或多个安全外设。 SEP可以与SOC的其余部分隔离(例如SOC中的一个或多个中央处理单元(CPU),或SOC中的应用处理器(AP))。 对SEP的访问可以由硬件严格控制。 例如,描述了CPU / AP仅能访问SEP中的邮箱位置的机制。 CPU / AP可以向邮箱写入消息,SEP可以读取并响应。 在一些实施例中,SEP可以包括以下一个或多个:使用包装密钥的安全密钥管理,引导和/或电源管理的SEP控制以及存储器中的单独的信任区域。

    SECURING IN-APP PURCHASES
    26.
    发明申请
    SECURING IN-APP PURCHASES 审中-公开
    安全入场购买

    公开(公告)号:US20140025521A1

    公开(公告)日:2014-01-23

    申请号:US13668109

    申请日:2012-11-02

    Applicant: APPLE INC.

    Abstract: In one embodiment, a unique (or quasi unique) identifier can be received by an application store, or other on-line store, and the store can create a signed receipt that includes data desired from the unique identifier. This signed receipt is then transmitted to a device that is running the application obtained from the on-line store and the device can verify the receipt by deriving the unique (or quasi-unique) identifier from the signed receipt and comparing the derived identifier with the device identifier stored on the device, or the vendor identifier assigned to the application vendor.

    Abstract translation: 在一个实施例中,唯一的(或准唯一的)标识符可以由应用商店或其他在线商店接收,并且商店可以创建包括从唯一标识符所期望的数据的签名收据。 然后将该签名的收据发送到运行从在线商店获取的应用的设备,并且设备可以通过从签名的收据导出唯一(或准唯一)标识符来验证收据,并将导出的标识符与 存储在设备上的设备标识符或分配给应用供应商的供应商标识符。

    Secure public key acceleration
    30.
    发明授权

    公开(公告)号:US10853504B1

    公开(公告)日:2020-12-01

    申请号:US16691900

    申请日:2019-11-22

    Applicant: Apple Inc.

    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.

Patent Agency Ranking