PROCEDE D'UTILISATION D'UN DISPOSITIF POUR LE DEVERROUILLAGE D'UN AUTRE DISPOSITIF

    公开(公告)号:FR3101167A1

    公开(公告)日:2021-03-26

    申请号:FR2009689

    申请日:2020-09-24

    Applicant: APPLE INC

    Abstract: Procédé d'utilisation d'un dispositif pour le déverrouillage d'un autre dispositif L'invention concerne un procédé de déverrouillage d'un premier dispositif, comprenant la transmission à un deuxième dispositif d'une clé de déverrouillage (Key 4) et, après cette transmission et pendant une session (701 710) de déverrouillage de dispositif respective : la transmission (707) au deuxième dispositif d'une clé à court terme (Key B), et la réception (709) d'une clé de déverrouillage cryptée (Key C) générée par cryptage de la clé de déverrouillage. En réponse à la réception de la clé de déverrouillage cryptée : s'il est déterminé que la clé de déverrouillage cryptée (Key C) a été cryptée à l'aide de la clé à court terme (Key B), le premier dispositif est déverrouillé (710), mais s'il est déterminé que la clé de déverrouillage a été cryptée à l'aide d'une clé autre que la clé à court terme, le déverrouillage du premier dispositif est abandonné. Figure à publier avec l'abrégé : Fig 7

    PROCEDE D'UTILISATION D'UN DISPOSITIF POUR LE DEVERROUILLAGE D'UN AUTRE DISPOSITIF.

    公开(公告)号:FR3025339A1

    公开(公告)日:2016-03-04

    申请号:FR1557932

    申请日:2015-08-26

    Applicant: APPLE INC

    Abstract: La présente invention concerne un procédé de déverrouillage d'un deuxième dispositif à l'aide d'un premier dispositif. Le procédé peut comprendre : le fait que le premier dispositif s'apparie avec le deuxième dispositif ; l'établissement d'une relation de confiance avec le deuxième dispositif ; l'authentification (403) du premier dispositif à l'aide d'une clé de dispositif (KDU1, KDU2) ; la réception (404) d'une clé secrète (S) en provenance du deuxième dispositif ; la réception (406) d'une entrée utilisateur en provenance d'un dispositif d'entrée / sortie ; et la transmission (412) de la clé secrète (S) reçue au deuxième dispositif pour déverrouiller (413) le deuxième dispositif en réponse à la réception de l'entrée utilisateur , l'établissement d'une relation de confiance avec le deuxième dispositif comprenant l'utilisation d'une clé générée à partir d'une clé matérielle associée au premier dispositif pour authentifier la clé de dispositif.

    Method of using one device to unlock another device

    公开(公告)号:AU2019201720B2

    公开(公告)日:2021-01-28

    申请号:AU2019201720

    申请日:2019-03-13

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.

    System and method for wireless data protection

    公开(公告)号:AU2018202051A1

    公开(公告)日:2018-04-12

    申请号:AU2018202051

    申请日:2018-03-22

    Applicant: APPLE INC

    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.

    Method of using one device to unlock another device

    公开(公告)号:AU2015218507A1

    公开(公告)日:2016-03-17

    申请号:AU2015218507

    申请日:2015-08-27

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE

    EFFIZIENTES SECURE INSTANT MESSAGING (SECURE INSTANT MESSAGING = SICHERE SOFORTIGE NACHRICHTENÜBERMITTLUNG)

    公开(公告)号:DE102015209241A1

    公开(公告)日:2015-12-03

    申请号:DE102015209241

    申请日:2015-05-20

    Applicant: APPLE INC

    Abstract: Es ist ein Verfahren und eine Vorrichtung eines Gerätes beschrieben, das einem Benutzer die Teilnahme an einer Secure-Instant-Messaging-Sitzung ermöglicht, indem es mit einer Verbindung mit niedriger Sicherheit beginnt, bevor es auf eine Verbindung mit hoher Sicherheit umschaltet. Das Gerät baut gleichzeitig eine Verbindung mit niedriger Sicherheit und eine Verbindung mit hoher Sicherheit mit einem Remoteteilnehmer der Secure-Instant-Messaging-Sitzung auf. Das Gerät sendet eine erste Nachricht an den Remoteteilnehmer über die Verbindung mit niedriger Sicherheit, während die Verbindung mit hoher Sicherheit aufgebaut wird. Außerdem stellt das Gerät fest, ob die Verbindung mit hoher Sicherheit aufgebaut ist. Falls die Verbindung mit hoher Sicherheit aufgebaut ist, kann das Gerät über die Verbindung mit hoher Sicherheit eine zweite Nachricht an den Remoteteilnehmer senden. Falls die Verbindung mit hoher Sicherheit noch nicht aufgebaut ist, kann das Gerät die zweite Nachricht über die Verbindung mit niedriger Sicherheit an den Remoteteilnehmer senden.

    Secure device pairing
    7.
    发明专利

    公开(公告)号:AU2016385445B2

    公开(公告)日:2019-06-13

    申请号:AU2016385445

    申请日:2016-12-15

    Applicant: APPLE INC

    Abstract: Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.

    Method of using one device to unlock another device

    公开(公告)号:AU2015218507B2

    公开(公告)日:2017-04-06

    申请号:AU2015218507

    申请日:2015-08-27

    Applicant: APPLE INC

    Abstract: Abstract A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. BIOMETRIC KEY FING(IiERPRINT MATCH MANAGEMENT SCANNER MODULE MODULE 102 100 104 106 112 )C 105 122 116 130 ) KERNEL KERNEL APPLICATION -- ~~--- -- -- PROCESSOR AP (AP) USERLAND USERLAND PAIR FIRST AND SECOND DEVICES V201 AUTHORIZE REMOTE IJNLOCK 202 UNLOCK SECOND DEVICE 203 USING THE FIRST DEVICE

    Context based data access control

    公开(公告)号:AU2015202649B2

    公开(公告)日:2017-02-09

    申请号:AU2015202649

    申请日:2015-05-15

    Applicant: APPLE INC

    Abstract: In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information).

    System and method for wireless data protection

    公开(公告)号:AU2016200941A1

    公开(公告)日:2016-03-03

    申请号:AU2016200941

    申请日:2016-02-12

    Applicant: APPLE INC

    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.

Patent Agency Ranking