Diversification of Public Keys
    1.
    发明申请

    公开(公告)号:US20170359318A1

    公开(公告)日:2017-12-14

    申请号:US15275234

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.

    Diversification of public keys
    2.
    发明授权

    公开(公告)号:US10776502B2

    公开(公告)日:2020-09-15

    申请号:US15619519

    申请日:2017-06-11

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.

    Diversification of Public Keys
    3.
    发明申请

    公开(公告)号:US20170357822A1

    公开(公告)日:2017-12-14

    申请号:US15619519

    申请日:2017-06-11

    Applicant: Apple Inc.

    Abstract: Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.

Patent Agency Ranking