-
公开(公告)号:US12079370B2
公开(公告)日:2024-09-03
申请号:US18377478
申请日:2023-10-06
Applicant: Apple Inc.
Inventor: Pablo Antonio Gonzalez Cervantes , Mohan Singh Randhava , Jorge F. Pozas Trevino , Samuel A. Mussell , Isaac Pinol Catadau , Steven A. Myers , Dongsheng Zhang , Suhail Ahmad , Zhengjun Jiang , Yannick L. Sierra , Amir H. Jadidi
CPC classification number: G06F21/6245 , G16H10/60 , H04L9/0825 , H04L9/0866 , H04L9/14
Abstract: Techniques for storing health data can include a multi-node data structure. A data node, a category node, and an institution node of a multi-node data structure can be generated in accordance with a configuration file. The data node can include health data and can be identified by a first unique data identifier and encrypted using a first cryptographic key. The category node can include the first unique data identifier and the first cryptographic key. The category node can be identified by a second unique data identifier and encrypted using a second cryptographic key. The institution node can include the second unique data identifier and the second cryptographic key. The institution node can be identified by a third unique data identifier and encrypted using a third cryptographic key. The data node, the category node, and the institution node can be shared with a service provider.
-
公开(公告)号:US12075313B2
公开(公告)日:2024-08-27
申请号:US17818859
申请日:2022-08-10
Applicant: Apple Inc.
Inventor: Scott Lopatin , Emmanuel Lalande , Lawrence T. Lu , Robert W. Mayor , Siva Ganesh Movva , Raghunandan K. Pai , Munish K. Poonia , Tommy Rochette , Sam Schaevitz , Yannick L. Sierra , Navin Bindiganavile Suparna , Langford Wasada
CPC classification number: H04W4/029 , H04W4/80 , H04W12/126 , H04W12/50 , H04W12/63
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:US20230328635A1
公开(公告)日:2023-10-12
申请号:US18050887
申请日:2022-10-28
Applicant: Apple Inc.
Inventor: Benjamin A. Detwiler , Brent M. Ledvina , Kenneth U. Victa , Langford M. Wasada , Yannick L. Sierra
CPC classification number: H04W48/16 , H04W52/0258
Abstract: Embodiments described herein provide for a mobile electronic device including a a wireless network interface coupled to a bus, a memory device coupled to the bus, and one or more processors coupled to the bus, the one or more processors to execute instructions to perform a scan, via the wireless network interface, for a beacon advertisement that is broadcast by a wireless device within range of the wireless network interface, detect the beacon advertisement broadcast by the wireless device, retrieve an identifier broadcast within the beacon advertisement, based on a result of a comparison between the identifier to at least one expected identifier, selectively send a timer reset packet to the wireless device and an authorization token for the wireless accessory to remain in near-owner mode, and allow the one or more processors to sleep for a predetermined time.
-
公开(公告)号:US20220391534A1
公开(公告)日:2022-12-08
申请号:US17659079
申请日:2022-04-13
Applicant: Apple Inc.
Inventor: Mohan S. Randhava , Steven A. Myers , Jorge F. Pozas Trevino , Pablo Antonio Gonzalez Cervantes , Yannick L. Sierra
Abstract: A server system implemented by a service provider may store health data of a user according to a multi-node data structure. The server system may generate transaction records based on requests to access the health data. Responsive to requests for the transaction records, the server system may query a database that includes the health data and generate a data package based on the querying. The data package may be sent to a requesting system. The data package may be usable by the requesting system to identify which patient profiles were accessed by which physicians.
-
公开(公告)号:US11449343B2
公开(公告)日:2022-09-20
申请号:US16220488
申请日:2018-12-14
Applicant: Apple Inc.
Inventor: Jeffry E. Gonion , Ian D. Kountanis , Conrado Blasco , Steven Andrew Myers , Yannick L. Sierra
Abstract: A system and method for efficiently protecting branch prediction information. In various embodiments, a computing system includes at least one processor with a branch predictor storing branch target addresses and security tags in a table. The security tag includes one or more components of machine context. When the branch predictor receives a portion of a first program counter of a first branch instruction, and hits on a first table entry during an access, the branch predictor reads out a first security tag. The branch predictor compares one or more components of machine context of the first security tag to one or more components of machine context of the first branch instruction. When there is at least one mismatch, the branch prediction information of the first table entry is not used. Additionally, there is no updating of any branch prediction training information of the first table entry.
-
公开(公告)号:US11444766B2
公开(公告)日:2022-09-13
申请号:US16293541
申请日:2019-03-05
Applicant: Apple Inc.
Inventor: Yannick L. Sierra , Mitchell D. Adler
Abstract: Some embodiments provide a method for a first device to join a group of related devices. The method receives input of a password for an account with a centralized entity and a code generated by a second device in the group. When the second device determines that the code input on the first device matches the generated code, the method receives an authentication code from the second device for authorizing the first device with the entity as a valid device for the account. The method uses the password and information regarding the first device to generate an application to the group. After sending the application to the second device, the method receives information from the second device that enables the first device to add itself to the group. The second device verifies the generated application, and the method uses the information received from the second device to join the group.
-
公开(公告)号:US20220200789A1
公开(公告)日:2022-06-23
申请号:US17603562
申请日:2020-04-15
Applicant: Apple Inc.
Inventor: Emmanuel Lalande , Michael C. Laster , Scott Lopatin , Munish K. Poonia , Tommy Rochette , Yannick L. Sierra
IPC: H04L9/08 , H04W4/029 , H04W12/0431
Abstract: Embodiments described herein provide for a non-transitory machine-readable medium storing instructions to cause one or more processor to perform operations to share a set of keys used to communicate with a wireless accessory device. By sharing the set of keys, functionality of the wireless accessory device can be delegated by an owner to other individuals.
-
公开(公告)号:US11329801B2
公开(公告)日:2022-05-10
申请号:US16733515
申请日:2020-01-03
Applicant: Apple Inc.
Inventor: Dawei Zhang , Fangli Xu , Haijing Hu , Huarui Liang , Lijia Zhang , Robert K. Kitchens , Samuel D. Post , Shu Guo , Xiangying Yang , Yannick L. Sierra , Yuqin Chen
Abstract: Apparatuses, systems, and methods for generating and utilizing improved initialization vectors (IVs) when performing encryption and authentication in wireless communications. In some scenarios, a wireless communication device may generate one or more pseudorandom multi-bit values, e.g., using a respective plurality of key derivation functions (KDFs). A first portion of each value may be used as a respective key for encryption or authentication of traffic on the user plane or the control plane. A second portion of each value may be used as a nonce value in a respective IV for use with a respective key for encryption or authentication of traffic on the user plane or the control plane. In some scenarios, the nonce values may instead be generated as part of an additional pseudorandom value (e.g., by executing an additional KDF), from which all of the IVs may be drawn.
-
公开(公告)号:US11321095B2
公开(公告)日:2022-05-03
申请号:US16663621
申请日:2019-10-25
Applicant: Apple Inc.
Inventor: Steven A. Myers , Jeffry E. Gonion , Yannick L. Sierra , Thomas Icart
Abstract: Techniques are disclosed relating to protecting branch prediction information. In various embodiments, an integrated circuit includes branch prediction logic having a table that maintains a plurality of entries storing encrypted target address information for branch instructions. The branch prediction logic is configured to receive machine context information for a branch instruction having a target address being predicted by the branch prediction logic, the machine context information including a program counter associated with the branch instruction. The branch prediction logic is configured to use the machine context information to decrypt encrypted target address information stored in one of the plurality of entries identified based on the program counter. In some embodiments, the branch prediction logic decrypts the encrypted target address information by performing a cipher to encrypt the machine context information and performing a Boolean exclusive-OR operation of the encrypted machine context information and the encrypted target address information.
-
公开(公告)号:US11250118B2
公开(公告)日:2022-02-15
申请号:US16388831
申请日:2019-04-18
Applicant: Apple Inc.
Inventor: Alexander R. Ledwith , Wade Benson , Marc J. Krochmal , John J. Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra , Libor Sykora , Jiri Margaritov
Abstract: In some embodiments, a first device performs ranging operations to allow a user to perform one or more operations on the first device without providing device-access credentials. For example, when a second device is within a first distance of the first device, the first device determines that the second device is associated with a first user account that is authorized to perform operations on the first device. In response to the determination, the first device enables at least one substitute interaction (e.g., a password-less UI interaction) to allow the operations to be performed on the first device to be accessed without receiving access credentials through a user interface. In response to detecting an occurrence of the substitute interaction, the operation is authorized on the first device.
-
-
-
-
-
-
-
-
-