BIOMETRIC AUTHENTICATION WITH USER INPUT
    1.
    发明申请

    公开(公告)号:WO2018226261A1

    公开(公告)日:2018-12-13

    申请号:PCT/US2018/015079

    申请日:2018-01-24

    Applicant: APPLE INC.

    Abstract: Techniques are disclosed relating to biometric authentication. In one embodiment, a computing device includes a controller circuit, a camera, and a secure circuit. The controller circuit is coupled to a button and detects when the button has been pressed. The camera captures a set of biometric data of a user. The secure circuit performs an authentication of the user by confirming that a notification identifying the button being pressed was received from the controller circuit and by comparing the set of biometric data with another set of biometric data for an authorized user of the computing device. In some embodiments, the controller circuit is configured to maintain a timestamp indicative of when the button has been pressed and usable by the secure circuit to confirm that the button is pressed within a threshold time period of the authentication being performed.

    APPLICATION USAGE POLICY ENFORCEMENT
    3.
    发明申请
    APPLICATION USAGE POLICY ENFORCEMENT 审中-公开
    应用使用政策执行

    公开(公告)号:WO2012054252A2

    公开(公告)日:2012-04-26

    申请号:PCT/US2011/055653

    申请日:2011-10-10

    CPC classification number: G06F21/105 G06Q30/0601 G06Q30/0641

    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.

    Abstract translation: 这里公开了用于实施应用使用策略的系统,方法和非暂时性计算机可读介质。 作为应用程序购买交易的一部分,应用程序分销商创建一个独特的购买收据证明。 该收据可以与应用程序捆绑在一起并交付给购买者。 每台机器都可以维护一个授权文件,列出授权在该机器上使用应用程序的用户。 被配置为实践该方法的系统基于购买收据的申请证明和授权文件来验证用户被授权使用机器上的应用程序。 如果采购收据的申请凭证和授权文件都有效,系统会检查收据中的用户账户标识是否包含在授权文件中。 如果是这样,用户可以被认为有权在机器上使用该应用程序。

    SECURE CREDENTIAL STORAGE AND RETRIEVAL
    4.
    发明申请

    公开(公告)号:WO2020154224A1

    公开(公告)日:2020-07-30

    申请号:PCT/US2020/014271

    申请日:2020-01-20

    Applicant: APPLE INC.

    Abstract: Techniques are disclosed relating to securely receiving and storing credentials. In some embodiments, a computing device includes an application executable to supply a credential to an external system. A secure circuit of the computing device is configured to send, to a credential storage, a request for the credential, the request including a first certificate identifying a first public key and a stipulation to perform a user authentication before permitting use of a first private key corresponding to the first public key. The secure circuit receives, from the credential storage, the credential encrypted using the first public key and, based on the stipulation, performs the user authentication prior to decrypting the credential and supplying it to the application. In some embodiments, the secure circuit receives the first certificate by providing information about hardware included in the computing device to a hardware verification service.

    PROVIDING VERIFIED CLAIMS OF USER IDENTITY
    5.
    发明申请

    公开(公告)号:WO2020139513A1

    公开(公告)日:2020-07-02

    申请号:PCT/US2019/063756

    申请日:2019-11-27

    Applicant: APPLE INC.

    Abstract: A device implementing a system for using a verified claim of identity includes at least one processor configured to receive a verified claim including information to identify a user of a device, the verified claim being signed by a server based on verification of the information by an identity verification provider separate from the server, the verified claim being specific to the device. The at least one processor is further configured to send, to a service provider, a request for a service provided by the service provider, and receive, from the service provider and in response to the sending, a request for the verified claim. The at least one processor is further configured to send, in response to the receiving, the verified claim to the service provider.

Patent Agency Ranking