SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION
    71.
    发明申请

    公开(公告)号:US20190013939A1

    公开(公告)日:2019-01-10

    申请号:US16133645

    申请日:2018-09-17

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.

    AUTHENTICATION TECHNIQUES IN RESPONSE TO ATTEMPTS TO ACCESS SENSITIVE INFORMATION

    公开(公告)号:US20180352440A1

    公开(公告)日:2018-12-06

    申请号:US15980694

    申请日:2018-05-15

    Applicant: Apple Inc.

    Abstract: The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.

    SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE
    76.
    发明申请
    SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE 审中-公开
    处理器的安全配对和电子设备的安全元件

    公开(公告)号:US20160344710A1

    公开(公告)日:2016-11-24

    申请号:US14475308

    申请日:2014-09-02

    Applicant: Apple Inc.

    CPC classification number: H04L63/061 H04L63/0492

    Abstract: Systems, methods, and computer-readable media for securely pairing a secure element and a processor of an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter cilia, deriving a key using a processor of the electronic device, sharing the derived key with a commercial entity subsystem, and receiving the shared key from the commercial entity subsystem at a secure element of the electronic device, where the received key may be leveraged for enabling a secure communication channel between the processor and the secure element. Additional embodiments are also provided.

    Abstract translation: 提供了用于安全地配对电子设备的安全元件和处理器的系统,方法和计算机可读介质。 在一个示例实施例中,一种在电子设备处的方法包括使用电子设备的处理器导出密钥,使用商业实体子系统共享导出的密钥,以及从商业实体子系统接收共享密钥 电子设备的安全元件,其中可以利用所接收的密钥来实现处理器和安全元件之间的安全通信信道。 还提供了另外的实施例。

    Secure Escrow Service
    78.
    发明申请
    Secure Escrow Service 审中-公开
    安全托管服务

    公开(公告)号:US20160004884A1

    公开(公告)日:2016-01-07

    申请号:US14792572

    申请日:2015-07-06

    Applicant: Apple Inc.

    Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.

    Abstract translation: 一种通过使用一组服务器将第一设备的机密信息项恢复到第二设备的方法。 该方法生成公钥和私钥对,并在生成公钥和私钥时将私钥与服务器的可执行代码的哈希值相关联。 该方法在用用户特定的密钥和公钥加密的安全对象中接收加密的机密信息项。 当第二设备提供与加密安全对象的密钥相同的用户特定密钥时,该方法仅向第二设备提供机密信息,并且在访问私钥以解密时提供服务器的可执行代码的散列 安全对象匹配在生成私钥时在服务器上运行的可执行代码的散列。

    Secure escrow service
    79.
    发明授权
    Secure escrow service 有权
    安全的托管服务

    公开(公告)号:US09106411B2

    公开(公告)日:2015-08-11

    申请号:US13767847

    申请日:2013-02-14

    Applicant: Apple Inc.

    Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.

    Abstract translation: 一种通过使用一组服务器将第一设备的机密信息项恢复到第二设备的方法。 该方法生成公钥和私钥对,并在生成公钥和私钥时将私钥与服务器的可执行代码的哈希值相关联。 该方法在用用户专用密钥和公开密钥加密的安全对象中接收加密的机密信息项。 当第二设备提供与加密安全对象的密钥相同的用户特定密钥时,该方法仅向第二设备提供机密信息,并且在访问私钥以解密时提供服务器的可执行代码的散列 安全对象匹配在生成私钥时在服务器上运行的可执行代码的散列。

    Source packet bridge
    80.
    发明授权
    Source packet bridge 有权
    源数据包桥

    公开(公告)号:US09026680B2

    公开(公告)日:2015-05-05

    申请号:US13625798

    申请日:2012-09-24

    Applicant: Apple Inc.

    Inventor: Jerrold V. Hauck

    CPC classification number: H04J3/0697 H04N21/43632

    Abstract: A communication function between ports on a node that does not require a common time base to be distributed across the network is disclosed. A data stream received over a first port is placed on an interface between nodes using the time base of the first port; a second port samples the data stream on the interface and timestamps it using the time base of the second port. The data stream is timestamped by the second port and packetized before transmitted to the second node to another bridge or device. Alternatively, the first port extracts a time stamp from the data stream and calculates an offset using a cycle timer value from the bus connected to the first port. The offset is added to the cycle timer value on the bus connected to the second port and used to timestamp the data stream.

    Abstract translation: 公开了不需要通过网络分布的公共时基的节点上的端口之间的通信功能。 通过第一端口接收的数据流被放置在使用第一端口的时基的节点之间的接口上; 第二个端口使用接口的数据流进行采样,并使用第二个端口的时基对其进行时间戳。 数据流由第二个端口加时间戳,并在发送到另一个网桥或设备之前进行分组。 或者,第一端口从数据流中提取时间戳,并且使用来自连接到第一端口的总线的周期定时器值来计算偏移量。 偏移被添加到连接到第二个端口的总线上的周期定时器值,并用于对数据流进行时间戳。

Patent Agency Ranking