-
公开(公告)号:WO2019241047A1
公开(公告)日:2019-12-19
申请号:PCT/US2019/035937
申请日:2019-06-07
Applicant: APPLE INC.
Inventor: GALDO, Florian , MARTIN, Stephanie R. , SIERRA, Yannick L. , KRSTIC, Ivan , VOLKERT, Christopher A. , ABDULRAHIMAN, Najeeb M. , LERCH, Matthias , TACKIN, Onur E. , BROGLE, Kyle C.
IPC: H04L29/06 , G06F21/33 , H04L9/32 , H04W12/08 , H04W4/40 , H04W12/04 , B60R25/24 , G07C9/00 , B60R25/20
Abstract: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.
-
公开(公告)号:WO2018160863A1
公开(公告)日:2018-09-07
申请号:PCT/US2018/020494
申请日:2018-03-01
Applicant: APPLE INC.
Inventor: MATHIAS, Arun G. , GALDO, Florian , LERCH, Matthias , ABDULRAHIMAN, Najeeb M. , TACKIN, Onur E. , SIERRA, Yannick
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
-
公开(公告)号:EP3629544A1
公开(公告)日:2020-04-01
申请号:EP19199467.2
申请日:2019-09-25
Applicant: Apple Inc.
Inventor: LERCH, Matthias , GALDO, Florian
Abstract: A device implementing a digital credential revocation system includes at least one processor configured to maintain a valid digital credential list, a revocation list, and a synchronization counter value. The at least one processor is configured to transmit a request to synchronize the valid digital credential list with an electronic device, the request including the valid digital credential list and the revocation list. The at least one processor is further configured to, in response to receipt of an updated valid digital credential list from the electronic device: clear the revocation list, replace the valid digital credential list with the updated valid digital credential list, and increment the synchronization counter value, and fulfill a received credential maintenance request when the received credential maintenance request comprises an other synchronization counter value that is greater than or equal to the incremented synchronization counter value, otherwise deny the received credential maintenance request.
-
公开(公告)号:EP3590225A1
公开(公告)日:2020-01-08
申请号:EP18710738.8
申请日:2018-03-01
Applicant: Apple Inc.
Inventor: MATHIAS, Arun G. , GALDO, Florian , LERCH, Matthias , ABDULRAHIMAN, Najeeb M. , TACKIN, Onur E. , SIERRA, Yannick
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:EP3462396A1
公开(公告)日:2019-04-03
申请号:EP18189036.9
申请日:2018-08-14
Applicant: Apple Inc.
Inventor: LERCH, Matthias , GALDO, Florian
Abstract: The present disclosure includes an electronic device for selecting a credential based at least in part on location information. The electronic device can include a secure transaction subsystem and a processor. The secure transaction subsystem can be configured to store a plurality of credentials. The processor can be communicatively coupled to the secure transaction subsystem and configured to receive the location information from one or more radios. Further, the processor can be configured to determine that a distance between the electronic device and a terminal is less than a predetermined distance based on the location information. In response to determining the distance between the electronic device and the terminal is less than the predetermined distance, the processor can be configured to select the credential from the plurality of credentials based at least in part on the type of terminal.
-
公开(公告)号:EP3590225B1
公开(公告)日:2020-08-12
申请号:EP18710738.8
申请日:2018-03-01
Applicant: Apple Inc.
Inventor: MATHIAS, Arun G. , GALDO, Florian , LERCH, Matthias , ABDULRAHIMAN, Najeeb M. , TACKIN, Onur E. , SIERRA, Yannick
-
-
-
-
-
-