-
公开(公告)号:AU2017286140B2
公开(公告)日:2020-10-22
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2017250352B2
公开(公告)日:2020-04-16
申请号:AU2017250352
申请日:2017-04-14
Applicant: APPLE INC
Inventor: HAUCK JERROLD V , MARQUEZ ALEJANDRO J , PAASKE TIMOTHY R , SEN INDRANIL S , SIBERT HERVE , SIERRA YANNICK L , THIARA RAMAN S
Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
-
公开(公告)号:AU2021200451B2
公开(公告)日:2022-09-29
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2017286140A1
公开(公告)日:2018-12-20
申请号:AU2017286140
申请日:2017-06-02
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:AU2022268328B2
公开(公告)日:2024-10-17
申请号:AU2022268328
申请日:2022-11-09
Applicant: APPLE INC
Inventor: LOPATIN SCOTT , LALANDE EMMANUEL , LU LAWRENCE T , MAYOR ROBERT W , MOVVA SIVA GANESH , PAI RAGHUNANDAN K , POONIA MUNISH K , ROCHETTE TOMMY , SCHAEVITZ SAM , SIERRA YANNICK L , SUPARNA NAVIN BINDIGANAVILE , WASADA LANGFORD
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:AU2022268328A1
公开(公告)日:2022-12-15
申请号:AU2022268328
申请日:2022-11-09
Applicant: APPLE INC
Inventor: LOPATIN SCOTT , LALANDE EMMANUEL , LU LAWRENCE T , MAYOR ROBERT W , MOVVA SIVA GANESH , PAI RAGHUNANDAN K , POONIA MUNISH K , ROCHETTE TOMMY , SCHAEVITZ SAM , SIERRA YANNICK L , SUPARNA NAVIN BINDIGANAVILE , WASADA LANGFORD
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:AU2019350588A1
公开(公告)日:2021-02-18
申请号:AU2019350588
申请日:2019-08-29
Applicant: APPLE INC
Inventor: LOPATIN SCOTT , LALANDE EMMANUEL , LU LAWRENCE T , MAYOR ROBERT W , MOVVA SIVA GANESH , PAI RAGHUNANDAN K , POONIA MUNISH K , ROCHETTE TOMMY , SCHAEVITZ SAM , SIERRA YANNICK L , SUPARNA NAVIN BINDIGANAVILE , WASADA LANGFORD
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:DE102020200622A1
公开(公告)日:2020-07-23
申请号:DE102020200622
申请日:2020-01-21
Applicant: APPLE INC
Inventor: ZHANG DAWEI , XU FANGLI , HU HAIJING , LIANG HUARUI , ZHANG LIJIA , KITCHENS ROBERT K , POST SAMUEL D , GUO SHU , YANG XIANGYING , SIERRA YANNICK L , CHEN YUQIN
IPC: H04L9/00
Abstract: Geräte, Systeme und Verfahren zum Erzeugen und Verwenden verbesserter Initialisierungsvektoren (IVs), wenn Verschlüsselung und Authentifizierung in drahtlosen Kommunikationen durchgeführt werden. In einigen Szenarien kann eine drahtlose Kommunikationsvorrichtung einen oder mehrere Pseudozufallsmehrbitwerte erzeugen, z. B. unter Verwendung einer entsprechenden Vielzahl von Schlüsselableitungsfunktionen (KDFs). Ein erster Teil jedes Werts kann als ein jeweiliger Schlüssel zur Verschlüsselung oder Authentifizierung von Verkehr auf der Benutzerebene oder der Steuerungsebene verwendet werden. Ein zweiter Teil jedes Werts kann als ein Nonce-Wert in einem jeweiligen IV zur Verwendung mit einem entsprechenden Verschlüsselungscode zur Verschlüsselung oder Authentifizierung von Verkehr auf der Benutzerebene oder der Steuerungsebene verwendet werden. In einigen Szenarien können die Nonce-Werte stattdessen als Teil eines zusätzlichen Pseudozufallswerts (z. B. durch Ausführen einer zusätzlichen KDF) erzeugt werden, von denen alle dieser IVs entnommen werden können.
-
公开(公告)号:AU2019350588B2
公开(公告)日:2022-08-11
申请号:AU2019350588
申请日:2019-08-29
Applicant: APPLE INC
Inventor: LOPATIN SCOTT , LALANDE EMMANUEL , LU LAWRENCE T , MAYOR ROBERT W , MOVVA SIVA GANESH , PAI RAGHUNANDAN K , POONIA MUNISH K , ROCHETTE TOMMY , SCHAEVITZ SAM , SIERRA YANNICK L , SUPARNA NAVIN BINDIGANAVILE , WASADA LANGFORD
Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
-
公开(公告)号:AU2021200451A1
公开(公告)日:2021-02-25
申请号:AU2021200451
申请日:2021-01-22
Applicant: APPLE INC
Inventor: BENSON WADE , KROCHMAL MARC J , LEDWITH ALEXANDER R , IAROCCI JOHN , HAUCK JERROLD V , BROUWER MICHAEL , ADLER MITCHELL D , SIERRA YANNICK L
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
-
-
-
-
-
-
-
-