APPARATUS AND METHODS FOR SECURE ELEMENT TRANSACTIONS AND MANAGEMENT OF ASSETS
    2.
    发明申请
    APPARATUS AND METHODS FOR SECURE ELEMENT TRANSACTIONS AND MANAGEMENT OF ASSETS 审中-公开
    安全资产交易和资产管理的手段和方法

    公开(公告)号:WO2014124108A1

    公开(公告)日:2014-08-14

    申请号:PCT/US2014/015050

    申请日:2014-02-06

    Applicant: APPLE INC.

    Abstract: Methods and apparatus for the deployment of financial instruments and other assets are disclosed. In one embodiment, a security software protocol is disclosed that guarantees that the asset is always securely encrypted, that one and only one copy of an asset exists, and the asset is delivered to an authenticated and/or authorized customer. Additionally, exemplary embodiments of provisioning systems are disclosed that are capable of, among other things, handling large bursts of traffic (such as can occur on a so-called "launch day" of a device).

    Abstract translation: 披露部署金融工具和其他资产的方法和手段。 在一个实施例中,公开了一种安全软件协议,其保证资产始终被安全地加密,存在资产的一个且仅一个副本,并且该资产被传递给认证的和/或授权的客户。 此外,公开了供应系统的示例性实施例,其能够处理大量业务突发(例如可能发生在设备的所谓“启动日”)。

    SYSTEM AND METHOD FOR POLICY CONTROL FUNCTIONS MANAGEMENT MECHANISM
    5.
    发明申请
    SYSTEM AND METHOD FOR POLICY CONTROL FUNCTIONS MANAGEMENT MECHANISM 审中-公开
    政策控制功能管理机制的系统与方法

    公开(公告)号:WO2015077597A1

    公开(公告)日:2015-05-28

    申请号:PCT/US2014/066875

    申请日:2014-11-21

    Applicant: APPLE INC.

    CPC classification number: H04W8/22 G06F9/44505 G06F9/5011

    Abstract: ABSTRACT Systems and methods for validating and applying modifications to a policy control function (PCF) of a station. The methods include generating a PCF package including a modification to a PCF, and determining whether the PCF package is to be transmitted to the station by a first or second entity. The methods further include when the PCF package is to be transmitted by the first entity, including a first signature of the first entity in a deliverer field of the PCF package, and when the PCF package is to be transmitted by the second entity, including the first signature in an owner field and a second signature of the second entity in the deliverer field. The methods further include receiving the PCF package from the first or second entity, determining whether the PCF package is valid, and applying the modification when it is determined the PCF package is valid.

    Abstract translation: 摘要用于验证和应用对站的策略控制功能(PCF)的修改的系统和方法。 所述方法包括生成包括对PCF的修改的PCF包,以及确定PCF包是否被第一或第二实体发送到该站。 所述方法进一步包括当PCF包将被第一实体发送时,包括PCF包的传送器字段中的第一实体的第一签名,以及当PCF包将被第二实体发送时,包括 所有者字段中的第一个签名和提供者字段中第二个实体的第二个签名。 所述方法还包括从第一或第二实体接收PCF包,确定PCF包是否有效,以及当确定PCF包有效时应用该修改。

    DELEGATION OF TRIGGER EXECUTION IN AN AUTOMATED ENVIRONMENT
    6.
    发明申请
    DELEGATION OF TRIGGER EXECUTION IN AN AUTOMATED ENVIRONMENT 审中-公开
    代表自动化环境中的触发器执行

    公开(公告)号:WO2017023625A1

    公开(公告)日:2017-02-09

    申请号:PCT/US2016/044118

    申请日:2016-07-26

    Applicant: APPLE INC.

    CPC classification number: G06F9/54 H04L12/2803

    Abstract: Execution of a trigger (or triggered action set) can be delegated by an owner device to a delegate device. The delegate device can assume responsibility for executing the trigger without further communication from the owner device. The owner device can monitor the status of the delegate device; if the delegate device enters a state in which it is presumed to be unavailable to execute the trigger, the owner device can resume the responsibility for executing the trigger.

    Abstract translation: 可以将所有者设备的触发器(或触发的操作集)的执行委托给代理设备。 代理设备可以承担执行触发的责任,而不需要与所有者设备的进一步通信。 所有者设备可以监视委托设备的状态; 如果委托设备进入被认为无法执行触发的状态,则所有者设备可以恢复执行触发的责任。

    CONTROLLER NETWORKS FOR AN ACCESSORY MANAGEMENT SYSTEM
    7.
    发明申请
    CONTROLLER NETWORKS FOR AN ACCESSORY MANAGEMENT SYSTEM 审中-公开
    用于附件管理系统的控制器网络

    公开(公告)号:WO2015184382A3

    公开(公告)日:2015-12-03

    申请号:PCT/US2015/033369

    申请日:2015-05-29

    Applicant: APPLE INC.

    Abstract: Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network..

    Abstract translation:

    控制器可用于控制各种附件的操作。 可以将访问特定配件(或一组配件)的控制器组织到控制器网络中,以便于控制。 控制器网络可以包括各种代理设备,包括桥接和隧道代理,其可以将消息中继至附件,执行协议转换,和/或提供通信安全性。 一些代理设备可以包括判定逻辑,以便由控制器网络中的控制器对一个或多个附件进行协调控制。

    POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL
    8.
    发明申请
    POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL 审中-公开
    用于管理访问控制的基于策略的技术

    公开(公告)号:WO2014081890A1

    公开(公告)日:2014-05-30

    申请号:PCT/US2013/071099

    申请日:2013-11-20

    Applicant: APPLE INC.

    CPC classification number: G06F21/604 H04L63/102 H04L63/105 H04L63/20 H04W12/08

    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.

    Abstract translation: 描述了基于策略的框架。 该基于策略的框架可以用于指定逻辑实体执行与位于电子设备中的安全元件内的访问控制元素(例如电子订户身份模块)相关联的操作的权限。 注意,对于与相同或不同的访问控制元素相关联的不同操作,不同的逻辑实体可以具有不同的权限。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的凭证的类型,使得不同类型的凭证可以用于不同的操作和/或由不同的逻辑实体使用。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的安全协议和安全级别,使得不同的安全协议和安全级别可以用于不同的操作和/或不同的逻辑实体。

    DELEGATION OF TRIGGER EXECUTION IN AN AUTOMATED ENVIRONMENT

    公开(公告)号:EP4198733A1

    公开(公告)日:2023-06-21

    申请号:EP23153663.2

    申请日:2016-07-26

    Applicant: Apple Inc.

    Abstract: Execution of a trigger (or triggered action set) can be delegated by an owner device to a delegate device. The delegate device can assume responsibility for executing the trigger without further communication from the owner device. The owner device can monitor the status of the delegate device; if the delegate device enters a state in which it is presumed to be unavailable to execute the trigger, the owner device can resume the responsibility for executing the trigger.

Patent Agency Ranking