-
公开(公告)号:AU2016269486A1
公开(公告)日:2017-01-05
申请号:AU2016269486
申请日:2016-12-07
Applicant: APPLE INC
Inventor: BROUWER MICHAEL , DE ATLEY DALLAS B , ADLER MITCHELL D
Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.
-
公开(公告)号:AU2009222009B2
公开(公告)日:2013-02-07
申请号:AU2009222009
申请日:2009-03-02
Applicant: APPLE INC
Inventor: PANTHER HEIKO , COOPER SIMON , REDA MATT , ADLER MITCHELL , DE ATLEY DALLAS , BROUWER MICHAEL
IPC: G06F21/00
Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.
-
公开(公告)号:AU2009233685A1
公开(公告)日:2009-11-26
申请号:AU2009233685
申请日:2009-11-06
Applicant: APPLE INC
Inventor: KIEHTREIBER PERRY , BROUWER MICHAEL
Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key.; Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array. If the hash values do not match, then execution may be halted.
-
公开(公告)号:AU2009222009A1
公开(公告)日:2009-09-11
申请号:AU2009222009
申请日:2009-03-02
Applicant: APPLE INC
Inventor: BROUWER MICHAEL , COOPER SIMON , ATLEY DALLAS DE , REDA MATT , PANTHER HEIKO , ADLER MITCHELL
IPC: G06F21/00
Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.
-
25.
公开(公告)号:AU2009222006A1
公开(公告)日:2009-09-11
申请号:AU2009222006
申请日:2009-03-02
Applicant: APPLE INC
Inventor: PANTHER HEIKO , ADLER MITCHELL , REDA MATT , BROUWER MICHAEL , COOPER SIMON , ATLEY DALLAS DE
IPC: G06F21/00
-
公开(公告)号:AU2021200451B2
公开(公告)日:2022-09-29
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2021200403B2
公开(公告)日:2022-05-19
申请号:AU2021200403
申请日:2021-01-21
Applicant: APPLE INC
Inventor: ADLER MITCHELL D , BROUWER MICHAEL , WHALLEY ANDREW R , HURLEY JOHN C , MURPHY RICHARD F , FINKELSTEIN DAVID P
IPC: H04W4/08
Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.
-
公开(公告)号:AU2017286140A1
公开(公告)日:2018-12-20
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2016271071B2
公开(公告)日:2018-11-29
申请号:AU2016271071
申请日:2016-03-31
Applicant: APPLE INC
Inventor: ADLER MITCHELL D , BROUWER MICHAEL , WHALLEY ANDREW R , HURLEY JOHN C , MURPHY RICHARD F , FINKELSTEIN DAVID P
Abstract: A user that owns multiple devices with overlapping functionality is becoming increasingly common. Smartphones, tablets, and computers all access the web, allow a user to process photos, etc., and users tend to have several such devices. Thus, a user wanting to share data between their devices and have access to data on multiple devices is increasingly common as well. Users may commonly use all sorts of different techniques to transfer data between devices, such as flash memory sticks, e-mail, etc. More efficient techniques for automatically sharing data between a user's devices are desired.
-
公开(公告)号:CA2632076C
公开(公告)日:2015-09-08
申请号:CA2632076
申请日:2004-09-10
Applicant: APPLE INC
Inventor: KIEHTREIBER PERRY , BROUWER MICHAEL
Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array. If the hash values do not match, then execution may be halted.
-
-
-
-
-
-
-
-
-