관련 디바이스들 간의 동기화 및 검증 그룹들
    1.
    发明公开
    관련 디바이스들 간의 동기화 및 검증 그룹들 审中-公开
    相关设备之间的同步和验证组

    公开(公告)号:KR20180006397A

    公开(公告)日:2018-01-17

    申请号:KR20177034699

    申请日:2016-03-31

    Applicant: APPLE INC

    Abstract: 중첩되는기능을가진다수의디바이스들을소유한사용자가점점더 보편화되고있다. 스마트폰들, 태블릿, 및컴퓨터들은모두웹에액세스하고, 사용자가사진들등을프로세싱하게하고, 사용자들은여러개의그러한디바이스들을가지려는경향이있다. 따라서, 디바이스들사이에서데이터를공유하고다수의디바이스들상의데이터로의액세스를갖기는원하는사용자도또한점점더 보편화되고있다. 사용자들은, 통상적으로, 플래시메모리스틱들, 이메일등과같이, 디바이스들사이에서데이터를전송하기위한모든종류들의상이한기법들을사용할수 있다. 사용자의디바이스들사이에서데이터를자동으로공유하기위한더 효율적인기법들이요망된다.

    Abstract translation: 拥有多个具有重叠功能的设备的用户正变得越来越流行。 智能手机,平板电脑和计算机都倾向于访问网络,让用户处理图片等,用户可以使用多种此类设备。 因此,期望的用户在设备之间共享数据并且能够访问多个设备上的数据也变得越来越流行。 用户通常可以使用各种不同的技术在设备之间传输数据,例如闪存棒,电子邮件等。 在用户设备之间自动共享数据需要更高效的技术。

    Method and apparatus for incremental code signing
    2.
    发明专利
    Method and apparatus for incremental code signing 有权
    增加代码签名的方法和装置

    公开(公告)号:JP2008293033A

    公开(公告)日:2008-12-04

    申请号:JP2008165033

    申请日:2008-06-24

    Abstract: PROBLEM TO BE SOLVED: To quickly and easily authenticate a large computer program. SOLUTION: The computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then, the hash value array is sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array. If the hash values do not match, then execution may be halted. COPYRIGHT: (C)2009,JPO&INPIT

    Abstract translation: 要解决的问题:快速轻松地认证大型计算机程序。

    解决方案:将计算机程序分为一组页面,并为每个页面计算哈希值。 哈希值集合形成一个哈希值数组,然后哈希值数组用数字签名密封。 然后将计算机程序与哈希值数组和数字签名一起分发。 为了验证计算机程序,接收者首先用数字签名和公钥验证哈希值数组的真实性。 一旦哈希值数组已被认证,接收者就可以通过计算要加载的页面的散列值,然后与经鉴别的散列值数组中相关联的散列值进行比较来验证计算机程序的每个页面的真实性。 如果哈希值不匹配,则执行可能会停止。 版权所有(C)2009,JPO&INPIT

    Modifying security state with secured range detection

    公开(公告)号:AU2017286140B2

    公开(公告)日:2020-10-22

    申请号:AU2017286140

    申请日:2017-06-02

    Applicant: APPLE INC

    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

    Method and apparatus for incremental code signing

    公开(公告)号:AU2004275264B2

    公开(公告)日:2009-11-19

    申请号:AU2004275264

    申请日:2004-09-10

    Applicant: APPLE INC

    Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key.; Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array. If the hash values do not match, then execution may be halted.

    KEYCHAIN SYNCHRONIZATION
    5.
    发明申请
    KEYCHAIN SYNCHRONIZATION 审中-公开
    键盘同步

    公开(公告)号:WO2014113196A1

    公开(公告)日:2014-07-24

    申请号:PCT/US2013077724

    申请日:2013-12-24

    Applicant: APPLE INC

    Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.

    Abstract translation: 一些实施例提供了一种非暂时机器可读介质,其存储当设备的至少一个处理单元执行时将存储在设备上的一组密钥链与一组其他设备同步的程序。 设备和其他设备的集合通过对等(P2P)网络彼此通信地耦合。 该程序接收对存储在设备上的一组钥匙串中的钥匙串的修改。 该程序为该组其他设备中的每个设备生成更新请求,以便将存储在设备上的一组密钥链与该组其他设备同步。 该程序通过一组独立的安全通信信道通过P2P网络将该组更新请求发送到其他设备的集合。

    Keychain synchronization
    6.
    发明专利

    公开(公告)号:AU2018274985B9

    公开(公告)日:2021-07-15

    申请号:AU2018274985

    申请日:2018-12-07

    Applicant: APPLE INC

    Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.

    Synchronization and verification groups among related devices

    公开(公告)号:AU2020203360A1

    公开(公告)日:2020-06-11

    申请号:AU2020203360

    申请日:2020-05-22

    Applicant: APPLE INC

    Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.

    Synchronization and verification groups among related devices

    公开(公告)号:AU2019201374A1

    公开(公告)日:2019-03-21

    申请号:AU2019201374

    申请日:2019-02-27

    Applicant: APPLE INC

    Abstract: Some embodiments provide a method for a first device to synchronize a set of data items with a second device. The method receives a request to synchronize the set of data items stored on the first device with the second device. The method determines a subset of the synchronization data items stored on the first device that belong to at least one synchronization sub-group in which the second device participates. Participation in at least one of the synchronization sub-groups is defined based on membership in at least one verification sub-group. The first and second devices are part of a set of related devices with several different verification sub-groups. The method sends only the subset of the synchronization data items that belong to at least one synchronization sub-group in which the second device participates to the second device using a secure channel.

    Keychain synchronization
    9.
    发明专利

    公开(公告)号:AU2018274985A1

    公开(公告)日:2019-01-03

    申请号:AU2018274985

    申请日:2018-12-07

    Applicant: APPLE INC

    Abstract: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of key chains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.

Patent Agency Ranking