-
公开(公告)号:AU2018228890A1
公开(公告)日:2019-09-19
申请号:AU2018228890
申请日:2018-03-01
Applicant: APPLE INC
Inventor: MATHIAS ARUN G , GALDO FLORIAN , LERCH MATTHIAS , ABDULRAHIMAN NAJEEB M , TACKIN ONUR E , SIERRA YANNICK
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:AU2017330439B2
公开(公告)日:2021-01-14
申请号:AU2017330439
申请日:2017-09-22
Applicant: APPLE INC
Inventor: SIBERT HERVE , ELRAD OREN M , HAUCK JERROLD V , TACKIN ONUR E , ROSEN ZACHARY A , LERCH MATTHIAS
Abstract: Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.
-
公开(公告)号:AU2017330439A1
公开(公告)日:2019-03-14
申请号:AU2017330439
申请日:2017-09-22
Applicant: APPLE INC
Inventor: SIBERT HERVE , ELRAD OREN M , HAUCK JERROLD V , TACKIN ONUR E , ROSEN ZACHARY A , LERCH MATTHIAS
Abstract: Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.
-
公开(公告)号:AU2018228890B2
公开(公告)日:2020-08-06
申请号:AU2018228890
申请日:2018-03-01
Applicant: APPLE INC
Inventor: GALDO FLORIAN , MATHIAS ARUN G , LERCH MATTHIAS , ABDULRAHIMAN NAJEEB M , TACKIN ONUR E , SIERRA YANNICK
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
-
-