-
公开(公告)号:AU2017330439A1
公开(公告)日:2019-03-14
申请号:AU2017330439
申请日:2017-09-22
Applicant: APPLE INC
Inventor: SIBERT HERVE , ELRAD OREN M , HAUCK JERROLD V , TACKIN ONUR E , ROSEN ZACHARY A , LERCH MATTHIAS
Abstract: Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.
-
公开(公告)号:AU2017250352A1
公开(公告)日:2018-10-11
申请号:AU2017250352
申请日:2017-04-14
Applicant: APPLE INC
Inventor: HAUCK JERROLD V , MARQUEZ ALEJANDRO J , PAASKE TIMOTHY R , SEN INDRANIL S , SIBERT HERVE , SIERRA YANNICK L , THIARA RAMAN S
Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
-
公开(公告)号:AU2013347993B2
公开(公告)日:2016-09-15
申请号:AU2013347993
申请日:2013-11-20
Applicant: APPLE INC
Inventor: SHARP CHRISTOPHER B , VAID YOUSUF H , LI LI , HAUCK JERROLD V , MATHIAS ARUN G , YANG XIANGYING , MCLAUGHLIN KEVIN P
Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.
-
公开(公告)号:AU2013347993A1
公开(公告)日:2015-06-04
申请号:AU2013347993
申请日:2013-11-20
Applicant: APPLE INC
Inventor: SHARP CHRISTOPHER B , VAID YOUSUF H , LI LI , HAUCK JERROLD V , MATHIAS ARUN G , YANG XIANGYING , MCLAUGHLIN KEVIN P
Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.
-
-
-