-
公开(公告)号:FR3101167A1
公开(公告)日:2021-03-26
申请号:FR2009689
申请日:2020-09-24
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Procédé d'utilisation d'un dispositif pour le déverrouillage d'un autre dispositif L'invention concerne un procédé de déverrouillage d'un premier dispositif, comprenant la transmission à un deuxième dispositif d'une clé de déverrouillage (Key 4) et, après cette transmission et pendant une session (701 710) de déverrouillage de dispositif respective : la transmission (707) au deuxième dispositif d'une clé à court terme (Key B), et la réception (709) d'une clé de déverrouillage cryptée (Key C) générée par cryptage de la clé de déverrouillage. En réponse à la réception de la clé de déverrouillage cryptée : s'il est déterminé que la clé de déverrouillage cryptée (Key C) a été cryptée à l'aide de la clé à court terme (Key B), le premier dispositif est déverrouillé (710), mais s'il est déterminé que la clé de déverrouillage a été cryptée à l'aide d'une clé autre que la clé à court terme, le déverrouillage du premier dispositif est abandonné. Figure à publier avec l'abrégé : Fig 7
-
公开(公告)号:FR3025339A1
公开(公告)日:2016-03-04
申请号:FR1557932
申请日:2015-08-26
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: La présente invention concerne un procédé de déverrouillage d'un deuxième dispositif à l'aide d'un premier dispositif. Le procédé peut comprendre : le fait que le premier dispositif s'apparie avec le deuxième dispositif ; l'établissement d'une relation de confiance avec le deuxième dispositif ; l'authentification (403) du premier dispositif à l'aide d'une clé de dispositif (KDU1, KDU2) ; la réception (404) d'une clé secrète (S) en provenance du deuxième dispositif ; la réception (406) d'une entrée utilisateur en provenance d'un dispositif d'entrée / sortie ; et la transmission (412) de la clé secrète (S) reçue au deuxième dispositif pour déverrouiller (413) le deuxième dispositif en réponse à la réception de l'entrée utilisateur , l'établissement d'une relation de confiance avec le deuxième dispositif comprenant l'utilisation d'une clé générée à partir d'une clé matérielle associée au premier dispositif pour authentifier la clé de dispositif.
-
公开(公告)号:AU2019201720B2
公开(公告)日:2021-01-28
申请号:AU2019201720
申请日:2019-03-13
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:AU2018202051A1
公开(公告)日:2018-04-12
申请号:AU2018202051
申请日:2018-03-22
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
公开(公告)号:AU2015218507A1
公开(公告)日:2016-03-17
申请号:AU2015218507
申请日:2015-08-27
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE
-
公开(公告)号:DE102015209241A1
公开(公告)日:2015-12-03
申请号:DE102015209241
申请日:2015-05-20
Applicant: APPLE INC
Inventor: ADLER MITCHELL D , MICHAEL L H BROUWER , SAUERWALD CONRAD
IPC: H04L9/00
Abstract: Es ist ein Verfahren und eine Vorrichtung eines Gerätes beschrieben, das einem Benutzer die Teilnahme an einer Secure-Instant-Messaging-Sitzung ermöglicht, indem es mit einer Verbindung mit niedriger Sicherheit beginnt, bevor es auf eine Verbindung mit hoher Sicherheit umschaltet. Das Gerät baut gleichzeitig eine Verbindung mit niedriger Sicherheit und eine Verbindung mit hoher Sicherheit mit einem Remoteteilnehmer der Secure-Instant-Messaging-Sitzung auf. Das Gerät sendet eine erste Nachricht an den Remoteteilnehmer über die Verbindung mit niedriger Sicherheit, während die Verbindung mit hoher Sicherheit aufgebaut wird. Außerdem stellt das Gerät fest, ob die Verbindung mit hoher Sicherheit aufgebaut ist. Falls die Verbindung mit hoher Sicherheit aufgebaut ist, kann das Gerät über die Verbindung mit hoher Sicherheit eine zweite Nachricht an den Remoteteilnehmer senden. Falls die Verbindung mit hoher Sicherheit noch nicht aufgebaut ist, kann das Gerät die zweite Nachricht über die Verbindung mit niedriger Sicherheit an den Remoteteilnehmer senden.
-
公开(公告)号:AU2016385445B2
公开(公告)日:2019-06-13
申请号:AU2016385445
申请日:2016-12-15
Applicant: APPLE INC
Inventor: SCHAAP TRISTAN F , SAUERWALD CONRAD , MARCINIAK CRAIG A , HAUCK JERROLD V , PAPILION ZACHARY F , LEE JEFFREY
Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.
-
公开(公告)号:AU2015218507B2
公开(公告)日:2017-04-06
申请号:AU2015218507
申请日:2015-08-27
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , LEDWITH ALEXANDER , IAROCCI JOHN J , KROCHMAL MARC J , BENSON WADE , NOVICK GREGORY , WITHERSPOON NOAH A
Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE
-
公开(公告)号:AU2015202649B2
公开(公告)日:2017-02-09
申请号:AU2015202649
申请日:2015-05-15
Applicant: APPLE INC
Inventor: WHALLEY ANDREW ROGER , BENSON WADE , SAUERWALD CONRAD
IPC: G06F21/30
Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).
-
公开(公告)号:AU2016200941A1
公开(公告)日:2016-03-03
申请号:AU2016200941
申请日:2016-02-12
Applicant: APPLE INC
Inventor: SAUERWALD CONRAD , BHAVSAR VRAJESH RAJESH , MCNEIL KENNETH BUFFALO , DUFFY THOMAS BROGAN , BROUWER MICHAEL LAMBERTUS HUBERTUS , BYOM MATTHEW JOHN , ADLER MITCHELL DAVID , TAMURA ERIC BRANDON
Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
-
-
-
-
-
-
-
-
-