Method of using one device to unlock another device

    公开(公告)号:AU2019201720A1

    公开(公告)日:2019-04-04

    申请号:AU2019201720

    申请日:2019-03-13

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.

    Method of using one device to unlock another device

    公开(公告)号:AU2017204624B2

    公开(公告)日:2018-12-13

    申请号:AU2017204624

    申请日:2017-07-06

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.

    Method of using one device to unlock another device

    公开(公告)号:AU2017204624A1

    公开(公告)日:2017-07-27

    申请号:AU2017204624

    申请日:2017-07-06

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.

    Context based data access control
    14.
    发明专利

    公开(公告)号:AU2015202649A1

    公开(公告)日:2015-12-17

    申请号:AU2015202649

    申请日:2015-05-15

    Applicant: APPLE INC

    Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).

    Modifying security state with secured range detection

    公开(公告)号:AU2021200451B2

    公开(公告)日:2022-09-29

    申请号:AU2021200451

    申请日:2021-01-22

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

    Modifying security state with secured range detection

    公开(公告)号:AU2017286140A1

    公开(公告)日:2018-12-20

    申请号:AU2017286140

    申请日:2017-06-02

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

    Method of using one device to unlock another device

    公开(公告)号:AU2015218507B2

    公开(公告)日:2017-04-06

    申请号:AU2015218507

    申请日:2015-08-27

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE

    Context based data access control
    18.
    发明专利

    公开(公告)号:AU2015202649B2

    公开(公告)日:2017-02-09

    申请号:AU2015202649

    申请日:2015-05-15

    Applicant: APPLE INC

    Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).

Patent Agency Ranking