-
公开(公告)号:KR20180054905A
公开(公告)日:2018-05-24
申请号:KR20187013352
申请日:2015-05-15
Applicant: APPLE INC
Inventor: KHAN AHMER A , NOVICK GREGORY B , HAUCK JERROLD V , VORA SAKET R , PEREZ YEHONATAN
CPC classification number: G06Q20/3227 , G06Q20/32 , G06Q20/3278 , G06Q20/352 , G06Q20/353 , G06Q20/367 , G06Q20/382 , G06Q20/4018 , G06Q20/4097 , G06Q20/40975 , H05K999/99
Abstract: 상점단말기에서모바일결제거래를수행하도록휴대용전자디바이스를운용하는방법이제공된다. 전자디바이스는디바이스의현재의사용자에게패스코드를입력하도록요구함으로써현재의사용자가참으로인가된소유자인것을검증할수 있다. 사용자가정확한패스코드를제공할수 있으면, 디바이스는모바일결제를수행하도록부분적으로만준비된다. 사용자가결제기능을완전히활성화하기위해서는, 사용자는사용자가곧 금융거래를수행하고자한다는것을디바이스에게통지하는두번버튼누름과같은예정된결제활성화입력을공급해야할 수있다. 디바이스는사용자가근접장통신기반모바일결제거래를완료하기위해상점단말기의장 내에디바이스를유지할수 있는예정된기간동안결제애플릿을후속적으로활성화할수 있다.
-
公开(公告)号:AU2017286140B2
公开(公告)日:2020-10-22
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2017250352B2
公开(公告)日:2020-04-16
申请号:AU2017250352
申请日:2017-04-14
Applicant: APPLE INC
Inventor: HAUCK JERROLD V , MARQUEZ ALEJANDRO J , PAASKE TIMOTHY R , SEN INDRANIL S , SIBERT HERVE , SIERRA YANNICK L , THIARA RAMAN S
Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
-
公开(公告)号:AU2016385445C1
公开(公告)日:2019-11-21
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:AU2016385445A1
公开(公告)日:2018-08-16
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:AU2021200451B2
公开(公告)日:2022-09-29
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2017330439B2
公开(公告)日:2021-01-14
申请号:AU2017330439
申请日:2017-09-22
Applicant: APPLE INC
Inventor: SIBERT HERVE , ELRAD OREN M , HAUCK JERROLD V , TACKIN ONUR E , ROSEN ZACHARY A , LERCH MATTHIAS
Abstract: Techniques are disclosed relating to secure data storage. In various embodiments, a mobile device includes a wireless interface, a secure element, and a secure circuit. The secure element is configured to store confidential information associated with a plurality of users and to receive a request to communicate the confidential information associated with a particular one of the plurality of users. The secure element is further configured to communicate, via the wireless interface, the confidential information associated with the particular user in response to an authentication of the particular user. The secure circuit is configured to perform the authentication of the particular user. In some embodiments, the mobile device also includes a biosensor configured to collect biometric information from a user of the mobile device. In such an embodiment, the secure circuit is configured to store biometric information collected from the plurality of users by the biosensor.
-
公开(公告)号:AU2016385445B2
公开(公告)日:2019-06-13
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:AU2017286140A1
公开(公告)日:2018-12-20
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2021200451A1
公开(公告)日:2021-02-25
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
-
-
-
-
-
-
-
-