-
公开(公告)号:AU2019201720A1
公开(公告)日:2019-04-04
申请号:AU2019201720
申请日:2019-03-13
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2017204624B2
公开(公告)日:2018-12-13
申请号:AU2017204624
申请日:2017-07-06
Applicant: APPLE INC
Inventor: WITHERSPOON NOAH A , SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2017204624A1
公开(公告)日:2017-07-27
申请号:AU2017204624
申请日:2017-07-06
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2015202649A1
公开(公告)日:2015-12-17
申请号:AU2015202649
申请日:2015-05-15
Applicant: APPLE INC
Inventor: WHALLEY ANDREW ROGER , BENSON WADE , SAUERWALD CONRAD
IPC: G06F21/30
Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).
-
公开(公告)号:AU2021200451B2
公开(公告)日:2022-09-29
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2017286140A1
公开(公告)日:2018-12-20
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2015218507B2
公开(公告)日:2017-04-06
申请号:AU2015218507
申请日:2015-08-27
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE
-
公开(公告)号:AU2015202649B2
公开(公告)日:2017-02-09
申请号:AU2015202649
申请日:2015-05-15
Applicant: APPLE INC
Inventor: WHALLEY ANDREW ROGER , BENSON WADE , SAUERWALD CONRAD
IPC: G06F21/30
Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).
-
-
-
-
-
-
-