관련 디바이스들 간의 동기화 및 검증 그룹들
    1.
    发明公开
    관련 디바이스들 간의 동기화 및 검증 그룹들 审中-公开
    相关设备之间的同步和验证组

    公开(公告)号:KR20180006397A

    公开(公告)日:2018-01-17

    申请号:KR20177034699

    申请日:2016-03-31

    Applicant: APPLE INC

    Abstract: 중첩되는기능을가진다수의디바이스들을소유한사용자가점점더 보편화되고있다. 스마트폰들, 태블릿, 및컴퓨터들은모두웹에액세스하고, 사용자가사진들등을프로세싱하게하고, 사용자들은여러개의그러한디바이스들을가지려는경향이있다. 따라서, 디바이스들사이에서데이터를공유하고다수의디바이스들상의데이터로의액세스를갖기는원하는사용자도또한점점더 보편화되고있다. 사용자들은, 통상적으로, 플래시메모리스틱들, 이메일등과같이, 디바이스들사이에서데이터를전송하기위한모든종류들의상이한기법들을사용할수 있다. 사용자의디바이스들사이에서데이터를자동으로공유하기위한더 효율적인기법들이요망된다.

    Abstract translation: 拥有多个具有重叠功能的设备的用户正变得越来越流行。 智能手机,平板电脑和计算机都倾向于访问网络,让用户处理图片等,用户可以使用多种此类设备。 因此,期望的用户在设备之间共享数据并且能够访问多个设备上的数据也变得越来越流行。 用户通常可以使用各种不同的技术在设备之间传输数据,例如闪存棒,电子邮件等。 在用户设备之间自动共享数据需要更高效的技术。

    Modifying security state with secured range detection

    公开(公告)号:AU2017286140B2

    公开(公告)日:2020-10-22

    申请号:AU2017286140

    申请日:2017-06-02

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

    Synchronization and verification groups among related devices

    公开(公告)号:AU2021200403A1

    公开(公告)日:2021-03-18

    申请号:AU2021200403

    申请日:2021-01-21

    Applicant: APPLE INC

    Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.

    Keychain synchronization
    4.
    发明专利

    公开(公告)号:AU2018274985B2

    公开(公告)日:2021-02-25

    申请号:AU2018274985

    申请日:2018-12-07

    Applicant: APPLE INC

    Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.

    Synchronization and verification groups among related devices

    公开(公告)号:AU2019201374B2

    公开(公告)日:2020-03-05

    申请号:AU2019201374

    申请日:2019-02-27

    Applicant: APPLE INC

    Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.

    Keychain synchronization
    6.
    发明专利

    公开(公告)号:AU2016269486A1

    公开(公告)日:2017-01-05

    申请号:AU2016269486

    申请日:2016-12-07

    Applicant: APPLE INC

    Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.

    Modifying security state with secured range detection

    公开(公告)号:AU2021200451B2

    公开(公告)日:2022-09-29

    申请号:AU2021200451

    申请日:2021-01-22

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

    Synchronization and verification groups among related devices

    公开(公告)号:AU2021200403B2

    公开(公告)日:2022-05-19

    申请号:AU2021200403

    申请日:2021-01-21

    Applicant: APPLE INC

    Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.

    Modifying security state with secured range detection

    公开(公告)号:AU2017286140A1

    公开(公告)日:2018-12-20

    申请号:AU2017286140

    申请日:2017-06-02

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

Patent Agency Ranking