-
公开(公告)号:US10229282B2
公开(公告)日:2019-03-12
申请号:US15275284
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Abhradeep Guha Thakurta , Umesh S. Vaishampayan , John C. Hurley , Keaton F. Mowery , Michael Brouwer
Abstract: The system described may implement a 1-bit protocol for differential privacy for a set of client devices that transmit information to a server. Implementations of the system may leverage specialized instruction sets or engines built into the hardware or firmware of a client device to improve the efficiency of the protocol. For example, a client device may utilize these cryptographic functions to randomize information sent to the server. In one embodiment, the client device may use cryptographic functions such as hashes including SHA or block ciphers including AES. Accordingly, the system provides an efficient mechanism for implementing differential privacy.
-
52.
公开(公告)号:US20190044930A1
公开(公告)日:2019-02-07
申请号:US16055892
申请日:2018-08-06
Applicant: Apple Inc.
Inventor: Julien F. Freudiger , Andrew J. Ringer , Yannick L. Sierra , Farouk Belghoul , Samuel D. Post
CPC classification number: H04L63/067 , H04L9/0643 , H04L9/0838 , H04L9/16 , H04L9/3226 , H04L9/3239 , H04L9/3297 , H04L63/0876 , H04L2209/805 , H04W12/003 , H04W12/04 , H04W12/06 , H04W76/14
Abstract: Systems, methods, and computer-readable media may be provided for securely authenticating device identification and/or user identification for low throughput device-to-device wireless communication.
-
公开(公告)号:US20170359169A1
公开(公告)日:2017-12-14
申请号:US15497203
申请日:2017-04-26
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
CPC classification number: G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04L2209/80 , H04W12/04 , H04W12/06 , H04W12/08
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20170357830A1
公开(公告)日:2017-12-14
申请号:US15275273
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Conrad Sauerwald , Mitchell D. Adler , Michael Brouwer , Timothee Geoghegan , Andrew R. Whalley , David P. Finkelstein , Yannick L. Sierra
Abstract: Techniques are disclosed relating to securely storing data in a computing device. In one embodiment, a computing device includes a secure circuit configured to maintain key bags for a plurality of users, each associated with a respective one of the plurality of users and including a first set of keys usable to decrypt a second set of encrypted keys for decrypting data associated with the respective user. The secure circuit is configured to receive an indication that an encrypted file of a first of the plurality of users is to be accessed and use a key in a key bag associated with the first user to decrypt an encrypted key of the second set of encrypted keys. The secure circuit is further configured to convey the decrypted key to a memory controller configured to decrypt the encrypted file upon retrieval from a memory.
-
公开(公告)号:US20170357820A1
公开(公告)日:2017-12-14
申请号:US15275284
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Abhradeep Guha Thakurta , Umesh S. Vaishampayan , John C. Hurley , Keaton F. Mowery , Michael Brower
CPC classification number: G06F21/6218 , G06F21/6245 , H04L9/0631 , H04L9/0861 , H04L63/0421 , H04L63/0435
Abstract: The system described may implement a 1-bit protocol for differential privacy for a set of client devices that transmit information to a server. Implementations of the system may leverage specialized instruction sets or engines built into the hardware or firmware of a client device to improve the efficiency of the protocol. For example, a client device may utilize these cryptographic functions to randomize information sent to the server. In one embodiment, the client device may use cryptographic functions such as hashes including SHA or block ciphers including AES. Accordingly, the system provides an efficient mechanism for implementing differential privacy.
-
公开(公告)号:US20170357523A1
公开(公告)日:2017-12-14
申请号:US15275203
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
CPC classification number: G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04L2209/80 , H04W12/04 , H04W12/06 , H04W12/08
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US09563765B2
公开(公告)日:2017-02-07
申请号:US14632917
申请日:2015-02-26
Applicant: Apple Inc.
Inventor: Samuel D. Post , Onur E. Tackin , Yannick L. Sierra , Peng Liu
CPC classification number: G06F21/44 , G06F9/4401 , G06F21/57 , G06F21/572 , G06F21/575 , H04W40/06
Abstract: In order to simplify and reduce the cost of an electronic device, the size of a first non-volatile memory associated with an integrated circuit is significantly reduced. Instead of using the first non-volatile memory, a second non-volatile memory associated with a processor in the electronic device is used to store an embedded operating system of the integrated circuit, as well as associated data and a configuration of the integrated circuit. To reduce the security risks associated with using this remote second non-volatile memory, the first non-volatile memory may store authorization information and anti-replay information. During a secure boot of the integrated circuit, the authorization information is used to verify that the embedded operating system, the data and the configuration are authorized. In addition, the anti-replay information is used to determine that the embedded operating system, the data and the configuration are different than previously received versions of these items.
Abstract translation: 为了简化和降低电子设备的成本,与集成电路相关联的第一非易失性存储器的尺寸显着降低。 代替使用第一非易失性存储器,与电子设备中的处理器相关联的第二非易失性存储器用于存储集成电路的嵌入式操作系统,以及相关联的数据和集成电路的配置。 为了减少与使用该远程第二非易失性存储器相关联的安全风险,第一非易失性存储器可以存储授权信息和反重放信息。 在集成电路的安全启动期间,授权信息用于验证嵌入式操作系统,数据和配置是否被授权。 此外,反重放信息用于确定嵌入式操作系统,数据和配置与先前接收到的这些项目的版本不同。
-
公开(公告)号:US20170012974A1
公开(公告)日:2017-01-12
申请号:US15273622
申请日:2016-09-22
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Mitchell D. Adler
CPC classification number: H04L9/30 , H04L9/0833 , H04L9/0863 , H04L9/14 , H04L9/3247 , H04L63/0884 , H04L63/0892 , H04L63/104 , H04L2209/80 , H04W12/08
Abstract: Some embodiments provide a method for a first device to join a group of related devices. The method receives input of a password for an account with a centralized entity and a code generated by a second device in the group. When the second device determines that the code input on the first device matches the generated code, the method receives an authentication code from the second device for authorizing the first device with the entity as a valid device for the account. The method uses the password and information regarding the first device to generate an application to the group. After sending the application to the second device, the method receives information from the second device that enables the first device to add itself to the group. The second device verifies the generated application, and the method uses the information received from the second device to join the group.
Abstract translation: 一些实施例提供了一种用于第一设备加入一组相关设备的方法。 该方法接收到具有集中实体的帐户的密码输入和由组中的第二设备生成的代码。 当第二设备确定在第一设备上输入的代码与生成的代码匹配时,该方法从第二设备接收认证代码,用于授权具有该实体的第一设备作为该帐户的有效设备。 该方法使用密码和有关第一个设备的信息来生成组的应用程序。 在将应用发送到第二设备之后,该方法从第二设备接收使第一设备能够将自身添加到组中的信息。 第二设备验证生成的应用程序,并且该方法使用从第二设备接收的信息加入该组。
-
公开(公告)号:US20150133196A1
公开(公告)日:2015-05-14
申请号:US14501573
申请日:2014-09-30
Applicant: Apple Inc.
Inventor: Abhishek Sen , Bharath Narasimha Rao , Prashant H. Vashi , Vikram B. Yerrabommanahalli , Yannick L. Sierra
IPC: H04W8/18
CPC classification number: H04W8/183
Abstract: This disclosure relates to caching SIM files at a baseband processor to reduce cellular bootup time. According to one embodiment, a wireless device may read SIM files from a SIM and store a local copy of each file in a cache of the baseband processor of the wireless device. SIM identification information for the SIM from which the cached files were read may be associated with the cache. Indicator information usable for comparing file versions may also be generated and stored in the cache for each file. Upon a subsequent SIM initialization, the wireless device may read SIM files from the cache instead of from the initialized SIM if the cached version is identical to the SIM version, which may be determined based at least in part on the SIM identification information and the indicator information for such files.
Abstract translation: 本公开涉及在基带处理器上缓存SIM文件以减少蜂窝启动时间。 根据一个实施例,无线设备可以从SIM读取SIM文件,并将每个文件的本地副本存储在无线设备的基带处理器的高速缓存中。 读取缓存文件的SIM卡的SIM识别信息可以与缓存相关联。 用于比较文件版本的指示符信息也可以被生成并存储在每个文件的高速缓存中。 在随后的SIM初始化中,如果缓存版本与SIM版本相同,则无线设备可以从高速缓存而不是从初始化的SIM读取SIM文件,其可以至少部分地基于SIM识别信息和指示符来确定 这些文件的信息。
-
公开(公告)号:US20240419842A1
公开(公告)日:2024-12-19
申请号:US18818115
申请日:2024-08-28
Applicant: Apple Inc.
Inventor: Pablo Antonio Gonzalez Cervantes , Mohan Singh Randhava , Jorge F. Pozas Trevino , Samuel A. Mussell , Isaac Pinol Catadau , Steven A. Myers , Dongsheng Zhang , Suhail Ahmad , Zhengjun Jiang , Yannick L. Sierra , Amir H. Jadidi
Abstract: Techniques for storing health data can include a multi-node data structure. A data node, a category node, and an institution node of a multi-node data structure can be generated in accordance with a configuration file. The data node can include health data and can be identified by a first unique data identifier and encrypted using a first cryptographic key. The category node can include the first unique data identifier and the first cryptographic key. The category node can be identified by a second unique data identifier and encrypted using a second cryptographic key. The institution node can include the second unique data identifier and the second cryptographic key. The institution node can be identified by a third unique data identifier and encrypted using a third cryptographic key. The data node, the category node, and the institution node can be shared with a service provider.
-
-
-
-
-
-
-
-
-