Patents by Inventor Frederic Jacobs
Frederic Jacobs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12095907Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.Type: GrantFiled: June 8, 2022Date of Patent: September 17, 2024Assignee: APPLE INC.Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
-
Publication number: 20240214182Abstract: Encrypting and securely transmitting data between devices is disclosed. After a device obtains a request to purchase a prescription lens, including prescription data, to be inserted into a second electronic device, the prescription data is securely encrypted and transmitted to the lens manufacturer. The lens manufacturer may create a prescription lens and calibration data related to the lens. The calibration data can be encrypted and transmitted to a storage device for storage. The second electronic device can retrieve the encrypted calibration data from the storage device and utilize it to perform a full calibration of the device. The second electronic device can present images, in accordance with the calibration data, using a display through an optical path that include the prescription lens.Type: ApplicationFiled: December 26, 2023Publication date: June 27, 2024Inventors: Srinivas VEDULA, Qihe WANG, Kyle C. BROGLE, Frederic JACOBS, Yannick L. SIERRA, Giuliano PASQUALOTTO, Anup RATHI, Duncan A. MCROBERTS
-
Patent number: 11973859Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.Type: GrantFiled: December 16, 2020Date of Patent: April 30, 2024Assignee: APPLE INC.Inventors: Frederic Jacobs, Yannick L. Sierra
-
Patent number: 11914737Abstract: Embodiments described herein provide a compressed container format that enables the container to be decrypted and decompressed in a streaming manner. One embodiment provides a container format for encrypted archives in which data is compressed and encrypted in a segmented manner. A segment of the archive can be decompressed, decrypted, and checked for integrity before the entire archive is received. Metadata for the encrypted archive is also encrypted to secure details of data stored within the archive.Type: GrantFiled: April 27, 2021Date of Patent: February 27, 2024Assignee: APPLE INC.Inventors: Frederic Jacobs, Eric Bainville, Yannick L. Sierra
-
Patent number: 11848767Abstract: Aspects of the subject technology provide for privacy-preserving electronic publication and subscription. A publisher device may establish a publication channel with a publication server and receive a channel identifier and a channel ownership token for the channel. The publisher device may provide the channel identifier and a key for the publication channel to a subscriber device. The publisher device may publish data encrypted using the key to the publication server, the subscriber device may obtain the encrypted published data from the server using the channel identifier, and may decrypt the published data using the key obtained from the publisher device. The published data may include status information for a user of the publisher device, in some examples.Type: GrantFiled: April 15, 2022Date of Patent: December 19, 2023Assignee: Apple Inc.Inventors: Nicholas J. Circosta, Elliot T. Garner, Aniket A. Zamwar, Yevgeni Pekurovsky, Jared A. Crawford, Frederic Jacobs, Justin S Titi, Matthew E. Shepherd, Jose A. Lozano Hinojosa, Sean Geiger, Ahmed M. Bashir
-
Publication number: 20230396658Abstract: Aspects of the subject technology include receiving, by a first device, a voucher data item, from a second device that is participating in a group communication session with at least a third device and providing, by the first device, the voucher data item to at least the third device to verify that the first device is vouched for by the second device for participation in the group communication session. The voucher data item may include participant information associated with participation of the second device in the group communication session. The voucher data item may also be signed with a key associated with the second device.Type: ApplicationFiled: April 3, 2023Publication date: December 7, 2023Inventors: Nicholas J. CIRCOSTA, Adam Y. SYED, Andrew J. DALEY, Andrew J. RINGER, Frederic JACOBS, Jad OSSEIRAN, Justin R. ETZINE, Mark M. XUE, Nelson M. LEDUC, Robert B. MCINDOE, Zak C. WEGWEISER
-
Publication number: 20230394133Abstract: Aspects of the subject technology include obtaining, by a first device associated with a first user account, one or more item-specific public keys of one or more devices associated with a second user account and generating a data structure representing the one or more devices associated with the second user account based on the one or more item-specific public keys. Aspects may also include providing an identifier of the data structure to a server for association with the item and generating an invitation for the second user account to access the item. Aspects may further include providing the invitation to a second device of the one or more devices associated with the second user account to provide the second device with access to the item via the server based on at least a portion of the data structure and a respective item-specific public key of the second device.Type: ApplicationFiled: May 12, 2023Publication date: December 7, 2023Inventors: Alejandro A. RODRIGUEZ, Frederic JACOBS, Stephen M. LOTTERMOSER, Pierre J. DE FILIPPIS, Ryan A. WILLIAMS, Yannick L. SIERRA
-
Patent number: 11677554Abstract: Techniques are disclosed relating to secure message exchanges. In some embodiments, a first computing device generates an account key associated with a user account shared by a plurality of computing devices. The first computing device signs a public key of the first computing device with the generated account key to produce a digital signature and sends the public key and the digital signature to a first server system for distributing the public key to a second computing device attempting to send an encrypted message to the first computing device. The first computing device sends the account key to an external storage external usable by others of the plurality of computing devices to obtain the account key and use the account key to sign public keys of the other computing devices. The first computing device receives, from the second computing device, the encrypted message encrypted using the public key.Type: GrantFiled: May 29, 2020Date of Patent: June 13, 2023Assignee: Apple Inc.Inventors: Bailey E. Basile, Keaton F. Mowery, Yannick L. Sierra, Frederic Jacobs, Ryan W. Baker
-
Publication number: 20220393867Abstract: This Application sets forth techniques for establishing a custodial relationship between a user device and a custodian device for recovering access to a user account and/or to encrypted user data with assistance provided by the custodian device to effect access recovery. A server of a cloud network service provides an anonymous identifier to associate with the custodian device and an account recovery key to store at the custodian device. Identity of an account of the cloud network service associated with the custodian device can be hidden from the server. The user device generates a data recovery key and provides a first portion of the data recovery key to the custodian device and a second portion of the data recovery key to the server. Integrity of the stored account recovery key and portions of the data recovery key are checked regularly by the custodian device and the user device.Type: ApplicationFiled: February 3, 2022Publication date: December 8, 2022Inventors: Gokul P. THIRUMALAI, Alexandre A. AYBES, Dmitry V. BELOV, Jean-Luc GIRAUD, Kalyan C. GOPAVARAPU, Sudhakar N. MAMBAKKAM, Rebekah H. MERCER, Keaton F. MOWERY, Steven A. MYERS, Munish K. POONIA, Nihar SHARMA, Assar E. WESTERLUND, Frederic JACOBS
-
Patent number: 11522695Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.Type: GrantFiled: March 19, 2019Date of Patent: December 6, 2022Assignee: Apple Inc.Inventors: Sriram Hariharan, Yannick L. Sierra, Frederic Jacobs
-
Publication number: 20220385738Abstract: Aspects of the subject technology provide for privacy-preserving electronic publication and subscription. A publisher device may establish a publication channel with a publication server and receive a channel identifier and a channel ownership token for the channel. The publisher device may provide the channel identifier and a key for the publication channel to a subscriber device. The publisher device may publish data encrypted using the key to the publication server, the subscriber device may obtain the encrypted published data from the server using the channel identifier, and may decrypt the published data using the key obtained from the publisher device. The published data may include status information for a user of the publisher device, in some examples.Type: ApplicationFiled: April 15, 2022Publication date: December 1, 2022Inventors: Nicholas J. CIRCOSTA, Elliot T. GARNER, Aniket A. ZAMWAR, Yevgeni PEKUROVSKY, Jared A. CRAWFORD, Frederic JACOBS, Justin S. TITI, Matthew E. SHEPHERD, Jose A. LOZANO HINOJOSA, Sean GEIGER, Ahmed M. BASHIR
-
Publication number: 20220382838Abstract: Techniques are disclosed relating to computing security and privacy. In some embodiments, a computing device provides, to a service computing system, a service request that identifies an action and includes an anonymous identifier for a user of the computing device. The computing device receives, from the service computing system, a score request for a trustworthiness score indicative of the user's trustworthiness. In response to receiving the score request from the service computing system, the computing device provides information indicative of the user's identity to a scoring computing system and receives the trustworthiness score and a corresponding score signature from the scoring computing system. In response to receiving the score and the score signature from the scoring computing system, the computing device provides the score to the service computing system.Type: ApplicationFiled: May 31, 2022Publication date: December 1, 2022Inventors: Fabio Sozzani, Isabella M. Funke, Frederic Jacobs, Brandon J. Van Ryswyk
-
Publication number: 20220303120Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.Type: ApplicationFiled: June 8, 2022Publication date: September 22, 2022Applicant: Apple Inc.Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
-
Publication number: 20220247730Abstract: Aspects of the subject technology provide for secure, privacy-preserving access to electronic conferencing. In one or more implementations, a device may obtain a link that corresponds to a call with a second device, encrypt a request to join the call using a key obtained using the link, and send the encrypted request to a server for delivery to the second device. The link may also include information used to identify an alias for an account associated with the second device. The device may send the encrypted request to the server with the alias. The device may receive an encrypted response to the request from the server, obtain an identifier of the call from the encrypted response, and then receive an invitation to join the call associated with the identifier.Type: ApplicationFiled: September 24, 2021Publication date: August 4, 2022Inventors: Nicholas J. CIRCOSTA, Daniel B. POLLACK, Justin R. ETZINE, Nelson M. LEDUC, Frederic JACOBS
-
Patent number: 11405191Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.Type: GrantFiled: May 13, 2020Date of Patent: August 2, 2022Assignee: Apple Inc.Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
-
Publication number: 20220092208Abstract: Embodiments described herein provide a compressed container format that enables the container to be decrypted and decompressed in a streaming manner. One embodiment provides a container format for encrypted archives in which data is compressed and encrypted in a segmented manner. A segment of the archive can be decompressed, decrypted, and checked for integrity before the entire archive is received. Metadata for the encrypted archive is also encrypted to secure details of data stored within the archive.Type: ApplicationFiled: April 27, 2021Publication date: March 24, 2022Applicant: Apple Inc.Inventors: Frederic Jacobs, Eric Bainville, Yannick L. Sierra
-
Publication number: 20210359842Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.Type: ApplicationFiled: May 13, 2020Publication date: November 18, 2021Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
-
Patent number: 11177955Abstract: One embodiment provides for an electronic device, comprising a network interface, a memory coupled with the network interface, at least one application processor coupled with the memory, the at least one processor to execute instructions stored in the memory, and a secure processor including a cryptographic engine, wherein the cryptographic engine is to generate a sealed encrypted message to be transmitted via the network interface, the sealed encrypted message encrypted on behalf of the at least one application processor and includes a signature to enable integrity verification of the sealed encrypted message, the signature generated based on an identity key of the electronic device and data including ciphertext of the encrypted message and a public key of a recipient of the sealed encrypted message.Type: GrantFiled: July 31, 2019Date of Patent: November 16, 2021Assignee: Apple Inc.Inventors: Frederic Jacobs, Thomas Icart, Yannick L. Sierra
-
Publication number: 20210243018Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.Type: ApplicationFiled: December 16, 2020Publication date: August 5, 2021Inventors: FREDERIC JACOBS, YANNICK L. SIERRA
-
Publication number: 20210028928Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.Type: ApplicationFiled: March 19, 2019Publication date: January 28, 2021Inventors: Sriram Hariharan, Yannick L. Sierra, Frederic Jacobs