-
公开(公告)号:AU2012294770A1
公开(公告)日:2014-02-20
申请号:AU2012294770
申请日:2012-07-31
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:FR3025339B1
公开(公告)日:2020-11-13
申请号:FR1557932
申请日:2015-08-26
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: La présente invention concerne un procédé de déverrouillage d'un deuxième dispositif à l'aide d'un premier dispositif. Le procédé peut comprendre : le fait que le premier dispositif s'apparie avec le deuxième dispositif ; l'établissement d'une relation de confiance avec le deuxième dispositif ; l'authentification (403) du premier dispositif à l'aide d'une clé de dispositif (KDU1, KDU2) ; la réception (404) d'une clé secrète (S) en provenance du deuxième dispositif ; la réception (406) d'une entrée utilisateur en provenance d'un dispositif d'entrée / sortie ; et la transmission (412) de la clé secrète (S) reçue au deuxième dispositif pour déverrouiller (413) le deuxième dispositif en réponse à la réception de l'entrée utilisateur , l'établissement d'une relation de confiance avec le deuxième dispositif comprenant l'utilisation d'une clé générée à partir d'une clé matérielle associée au premier dispositif pour authentifier la clé de dispositif.
-
公开(公告)号:AU2016385445C1
公开(公告)日:2019-11-21
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:AU2016385445A1
公开(公告)日:2018-08-16
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:DE102015215120A1
公开(公告)日:2016-03-03
申请号:DE102015215120
申请日:2015-08-07
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
IPC: G06F21/00
Abstract: Es ist ein Verfahren zum Entriegeln einer zweiten Vorrichtung unter Verwendung einer ersten Vorrichtung beschrieben. Das Verfahren kann umfassen: Paaren der ersten Vorrichtung mit der zweiten Vorrichtung; Aufbauen einer vertrauenswürdigen Beziehung mit der zweiten Vorrichtung; Authentifizieren der ersten Vorrichtung unter Verwendung von einem Vorrichtungsschlüssel; Empfangen von einem geheimen Schlüssel von der zweiten Vorrichtung; Empfangen von einer Benutzereingabe von einer Eingabe/Ausgabe-Vorrichtung; und Übertragen des empfangenen geheimen Schlüssels an die zweite Vorrichtung zum Entriegeln der zweiten Vorrichtung in Ansprechen auf den Empfang der Benutzereingabe, wobei das Aufbauen einer vertrauenswürdigen Beziehung mit der zweiten Vorrichtung ein Verwenden eines Schlüssels umfasst, welcher von einem Hardwareschlüssel erzeugt ist, welcher mit der ersten Vorrichtung im Zusammenhang steht, um den Vorrichtungsschlüssel zu authentifizieren.
-
公开(公告)号:AU2021202620A1
公开(公告)日:2021-05-27
申请号:AU2021202620
申请日:2021-04-28
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:DE102015215120B4
公开(公告)日:2020-10-01
申请号:DE102015215120
申请日:2015-08-07
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
IPC: G06F21/00
Abstract: Verfahren zum Entriegeln einer zweiten Vorrichtung durch eine erste Vorrichtung, umfassend:Empfangen von einem geheimen Schlüssel von der zweiten Vorrichtung;Empfangen von einer Benutzereingabe von einer Eingabe/Ausgabe-Vorrichtung; undin Übereinstimmung mit der Feststellung, dass das erste Gerät entriegelt ist,Übertragen des empfangenen geheimen Schlüssels an die zweite Vorrichtung zum Entriegeln der zweiten Vorrichtung.
-
公开(公告)号:AU2019201720A1
公开(公告)日:2019-04-04
申请号:AU2019201720
申请日:2019-03-13
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2017204624B2
公开(公告)日:2018-12-13
申请号:AU2017204624
申请日:2017-07-06
Applicant: APPLE INC
Inventor: WITHERSPOON NOAH A , SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2016200941B2
公开(公告)日:2018-01-04
申请号:AU2016200941
申请日:2016-02-12
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
-
-
-
-
-
-
-
-