Dual-token authentication for electronic devices

    公开(公告)号:US10999074B2

    公开(公告)日:2021-05-04

    申请号:US16051040

    申请日:2018-07-31

    Applicant: Apple Inc.

    Abstract: An authentication process for an endpoint device uses a pair of tokens. Tokens are generated at an authentication server that maintains a data store of token states, where the states are defined to include a “normal” state sequence along which a token is expected to advance. The endpoint device can store a token pair in non-volatile local storage. To authenticate, the endpoint device can provide its stored token pair to the authentication server, which can determine whether authentication succeeds based on the states of the tokens in the token pair. After successful authentication, the authentication server can provide a new token pair to the endpoint device and advance the token states along the normal sequence. When the endpoint device confirms receipt of the new token pair, which replaces the previous token pair, the authentication server can advance the state of the tokens again.

    TECHNIQUES FOR SECURE VIDEO FRAME MANAGEMENT
    44.
    发明申请

    公开(公告)号:US20200380266A1

    公开(公告)日:2020-12-03

    申请号:US16560678

    申请日:2019-09-04

    Applicant: Apple Inc.

    Abstract: Embodiments of the present disclosure can provide devices, methods, and computer-readable medium for secure frame management. The techniques disclosed herein provide an intelligent method for detecting triggering items in one or more frames of streaming video from an Internet Protocol camera. Upon detection, the camera transmits one or more frames of the video over a network to a computing device. Upon detecting a triggering item in a frame of the video stream, the computing device can begin a streaming session with a server and stream the one or more frames of video and accompanying metadata to the server. The frames, metadata, and associated keys can all be encrypted prior to streaming to the server. For each subsequent segment of video frames that includes the triggering item, the server can append the frames of that segment to the video clip in an encrypted container. Once the triggering item is no longer detected, the streaming session can be closed.

    DUAL-TOKEN AUTHENTICATION FOR ELECTRONIC DEVICES

    公开(公告)号:US20200044849A1

    公开(公告)日:2020-02-06

    申请号:US16051040

    申请日:2018-07-31

    Applicant: Apple Inc.

    Abstract: An authentication process for an endpoint device uses a pair of tokens. Tokens are generated at an authentication server that maintains a data store of token states, where the states are defined to include a “normal” state sequence along which a token is expected to advance. The endpoint device can store a token pair in non-volatile local storage. To authenticate, the endpoint device can provide its stored token pair to the authentication server, which can determine whether authentication succeeds based on the states of the tokens in the token pair. After successful authentication, the authentication server can provide a new token pair to the endpoint device and advance the token states along the normal sequence. When the endpoint device confirms receipt of the new token pair, which replaces the previous token pair, the authentication server can advance the state of the tokens again.

    Coordinating modifications by multiple users to a shared automated environment

    公开(公告)号:US10012967B2

    公开(公告)日:2018-07-03

    申请号:US15274424

    申请日:2016-09-23

    Applicant: Apple Inc.

    CPC classification number: G05B15/02 H04L12/2809 H04L63/104

    Abstract: Modifications made by multiple controller devices to an environment model describing a shared automated environment can be coordinated. One of the controller devices can be designated as a coordinator, and any controller device other than the coordinator can send an update request to the coordinator. The coordinator can determine whether to accept or reject the requested modification and can report its determination to the requesting controller device. If the coordinator accepts the request, the coordinator can instigate operations to update the environment model across all controller devices of all users. If the coordinator rejects the request, the environment model is not updated. The controller device that made the request can update its local copy of the environment model and roll back the update if the request is rejected.

Patent Agency Ranking