TECHNIQUES FOR MANUAL VERIFICATION
    3.
    发明公开

    公开(公告)号:US20230396439A1

    公开(公告)日:2023-12-07

    申请号:US18131801

    申请日:2023-04-06

    Applicant: APPLE INC.

    CPC classification number: H04L9/3226 H04L9/14 H04L9/30 H04L9/0869 H04L9/088

    Abstract: A device may include accessing first public key associated with a first user identifier for the first electronic device and a second public key associated with a second user identifier for a second electronic device. The device can generate a first random number and a first commitment using a hash function and the first random number; transmit a first message to the second electronic device via a channel between the first and second electronic devices. The device can receive a message from the second electronic device via the channel including include a second random number generated by the second electronic device. The device can extract a code via the hash function using the first public key, the second public key, the first random number, and the second random number. The device can present the code on a user interface for verification. The user interface can receive confirmation of the verification.

    SECURE DELIVERY OF ASSETS TO A TRUSTED DEVICE

    公开(公告)号:US20190227784A1

    公开(公告)日:2019-07-25

    申请号:US16147295

    申请日:2018-09-28

    Applicant: Apple Inc.

    Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.

    TECHNIQUES FOR PEER-TO-PEER KEY VERIFICATION

    公开(公告)号:US20230396414A1

    公开(公告)日:2023-12-07

    申请号:US18131327

    申请日:2023-04-05

    Applicant: APPLE INC.

    CPC classification number: H04L9/0825 H04L9/0866 H04L9/3247

    Abstract: A first electronic device can establish a communication channel with a second electronic device and receive a second signed log head of an identifier log via the communication channel. The identifier log is managed by a key transparency server and can include public keys of users registered with the server and user identifiers. The second signed log head includes a hash of the public keys and the user identifiers in the identifier log. The second signed log head can be provided to the second device by the server. In response to sending a request for a consistency-checked log head from the server, the device can receive at least one consistency-checked signed log head. The device can verify a consistency between the second signed log head and the at least one consistency-checked log head. If verified the device can maintain use of the server for verifying ownership of the keys.

    Key registration transparency for secure messaging

    公开(公告)号:US11677554B2

    公开(公告)日:2023-06-13

    申请号:US16888157

    申请日:2020-05-29

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to secure message exchanges. In some embodiments, a first computing device generates an account key associated with a user account shared by a plurality of computing devices. The first computing device signs a public key of the first computing device with the generated account key to produce a digital signature and sends the public key and the digital signature to a first server system for distributing the public key to a second computing device attempting to send an encrypted message to the first computing device. The first computing device sends the account key to an external storage external usable by others of the plurality of computing devices to obtain the account key and use the account key to sign public keys of the other computing devices. The first computing device receives, from the second computing device, the encrypted message encrypted using the public key.

    Secure delivery of assets to a trusted device

    公开(公告)号:US11144297B2

    公开(公告)日:2021-10-12

    申请号:US16147295

    申请日:2018-09-28

    Applicant: Apple Inc.

    Abstract: Embodiments described herein provide a system and method for secure delivery of assets to a trusted device. Multiple levels of verification are implemented to enable components of a software update and asset delivery system to verify other components within the system. Furthermore, updates are provided only to client devices that are authorized to receive such updates. In one embodiment, the specific assets provided to a client device during a software update can be tailored to the client device, such that individual client devices can receive updated versions of software asset at a faster or slower rate than mass market devices. For example, developer or beta tester devices can receive pre-release assets, while enterprise devices can receive updates at a slower rate relative to mass market devices.

    KEY REGISTRATION TRANSPARENCY FOR SECURE MESSAGING

    公开(公告)号:US20200382297A1

    公开(公告)日:2020-12-03

    申请号:US16888157

    申请日:2020-05-29

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to secure message exchanges. In some embodiments, a first computing device generates an account key associated with a user account shared by a plurality of computing devices. The first computing device signs a public key of the first computing device with the generated account key to produce a digital signature and sends the public key and the digital signature to a first server system for distributing the public key to a second computing device attempting to send an encrypted message to the first computing device. The first computing device sends the account key to an external storage external usable by others of the plurality of computing devices to obtain the account key and use the account key to sign public keys of the other computing devices. The first computing device receives, from the second computing device, the encrypted message encrypted using the public key.

Patent Agency Ranking