-
公开(公告)号:US20240406010A1
公开(公告)日:2024-12-05
申请号:US18205278
申请日:2023-06-02
Applicant: Apple Inc.
Inventor: Ravi Chotrani , Ahmer A. Khan , David W. Silver , Gianpaolo Fasoli , Ka Yang , Vishnu Janardhanan
Abstract: A computing device can generate a set of transaction keys, the computing device configured to present a digital credential to a requesting device. The computing device can generate a request bundle. The request bundle can include the set of transaction keys. The computing device can transmit, to a first server, the request bundle. The first server can be configured to verify the request bundle. The first server can be configured to send the request bundle to a second server with a request for a set of credentials. Each credential of the set of credentials can correspond to a transaction key of the set of transaction keys. Each credential can include data elements and a security object. The data elements for each credential can be the same. The security object for each credential can be different. The computing device can receive, from the first server, the set of credentials. The computing device can store the set of credentials. The computing device can be configured to generate a response based on a particular credential of the set of credentials when a requesting device requests the digital credential.
-
公开(公告)号:US20240406162A1
公开(公告)日:2024-12-05
申请号:US18205244
申请日:2023-06-02
Applicant: Apple Inc.
Inventor: Ravi Chotrani , Ahmer A. Khan , David W. Silver , Gianpaolo Fasoli , Ka Yang , Vishnu Janardhanan
IPC: H04L9/40 , H04L67/306
Abstract: A computing device can receive a request from a requesting device for one or more data elements associated with a digital credential. The computing device can store the digital credential which includes a set of data elements and a security object. The computing device can determine a subset of the data elements based at least in part on the request. The computing device can generate the response, wherein the response includes the subset of the data elements and the security object. The computing device can transmit the response to the requesting device.
-