Patents by Inventor Yannick L. Sierra

Yannick L. Sierra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250119273
    Abstract: Techniques are disclosed relating to improving key management on devices. In various embodiments, a device receives, from a browser via a key-management API supported by the device, a request for a browser session to receive access to a cryptographic key managed by the device. The key-management API of the device determines whether to grant the browser session access to the cryptographic key based on verification of a signed attestation from a server corresponding to the browser session and using metadata stored about the cryptographic key. Based on the determination, the device provides access to the cryptographic key via the key-management API. In some embodiments, providing access to the cryptographic key includes performing a requested cryptographic operation using the cryptographic key and without providing the cryptographic key to the browser. In some embodiments, the cryptographic key is managed by an operating system, a secure element, or another application of the device.
    Type: Application
    Filed: October 4, 2024
    Publication date: April 10, 2025
    Inventors: Jonathan L. Choukroun, Elliot S. Briggs, Marcos Caceres, Simon J. Gornall, Michael J. Hashe, Graham S. Orndorff, Andrew M. Pace, Yannick L. Sierra, Catherine Yun
  • Publication number: 20250119411
    Abstract: Techniques are disclosed relating to improving secure message communication. In various embodiments, a message delivery server receives a request to deliver an encrypted message from a sender to a recipient. The encrypted message obfuscates the identity of the sender such that the message delivery server is unable to determine the identity of the sender. The message delivery server determines whether to deliver the encrypted message based on a signed attestation received with the request and, based on the determining, delivers the encrypted message to the recipient. In some embodiments, the determining includes verifying the signed attestation using a verification key provide by the sender. In some embodiments, the encrypted message is an email, a text message, a push notification, or a video or audio call request.
    Type: Application
    Filed: October 8, 2024
    Publication date: April 10, 2025
    Inventors: Catherine Yun, Elliot S. Briggs, Simon J. Gornall, Michael J. Hashe, Steven A. Myers, Andrew M. Pace, Yannick L. Sierra, Phillip T. Tao
  • Publication number: 20250094602
    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a computing device includes a cryptographic circuit coupled to a secure memory inaccessible to a processor of the computing device. Program instructions executing on the computing device can request performance of a key exchange to establish a shared secret with another device. The cryptographic circuit is configured to perform the key exchange including deriving the shared secret using private key material maintained in the secure memory. In some embodiments, the key exchange includes verifying a key authorization data structure issued by a key authority including a first public key of a first participant authority and a second public key of a second participant authority. In response to the verifying being successful, the exchange uses a public key pair attested to by the first participant authority as belonging to a member in the first device group.
    Type: Application
    Filed: December 15, 2023
    Publication date: March 20, 2025
    Inventors: Thomas P. Mensch, Elad Efrat, David Tamagno, Armaiti Ardeshiricham, Wade Benson, Yannick L. Sierra
  • Publication number: 20250097018
    Abstract: Techniques are disclosed relating to cryptographic key exchanges. In some embodiments, a first device belonging to a first device group receives a request to perform a key exchange to establish a shared secret with a second device belonging to a second device group. The first device verifies a key authorization data structure issued by a key authority, the key authorization data structure including a first public key of a first participant authority authorized to identify members of the first device group and a second public key of a second participant authority authorized to identify members of the second device group. In response to the verifying being successful, the first device performs the requested exchange using a public key pair attested to by the first participant authority as belonging to a member in the first device group.
    Type: Application
    Filed: December 15, 2023
    Publication date: March 20, 2025
    Inventors: Thomas P. Mensch, Elad Efrat, David Tamagno, Armaiti Ardeshiricham, Wade Benson, Yannick L. Sierra
  • Publication number: 20250005195
    Abstract: Embodiments of the present disclosure are directed to, among other things, monitoring a user device to determine whether a user associated with the device is safe. In some examples, a user (which may be referred to herein as an “initiator” establishes a device monitoring session (which may be referred to herein as “session”) with a user, or a group of users, so that the user(s) are notified either when the initiator has safely ended the device monitoring session or receives access to session data that was collected during the session. In some configurations, the session can be handed off from a first user device that is currently active to a different user device. Instead of the first user device always being the device that interacts with the server, a different first user device may be selected as the active device to interact with the server.
    Type: Application
    Filed: May 31, 2024
    Publication date: January 2, 2025
    Applicant: Apple Inc.
    Inventors: Daniel P. Shepard, Michael P. Dal Santo, Ping-Ko Chiu, Kumar Gaurav Chhokra, Yannick L. Sierra, Andrew M. Pace, Richard L. Hagy, Lindsey McAllister, Dharini Sitaraman, Andrew N. Khoury, Richard Bower Warren, Brent M. Ledvina, Siva Ganesh Movva, Ronald Keryuan Huang, Robert W. Mayor, Stacey F. Lysik, Areeba Kamal, Ryan D. Shelby, Elizabeth Caroline Furches Cranfill, Kanika Malhotra, Gillian T. Verga
  • Publication number: 20240422724
    Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
    Type: Application
    Filed: August 30, 2024
    Publication date: December 19, 2024
    Inventors: Jerrold V. HAUCK, Alejandro J. MARQUEZ, Timothy R. PAASKE, Indranil S. SEN, Herve SIBERT, Yannick L. SIERRA, Raman S. THIARA
  • Publication number: 20240419842
    Abstract: Techniques for storing health data can include a multi-node data structure. A data node, a category node, and an institution node of a multi-node data structure can be generated in accordance with a configuration file. The data node can include health data and can be identified by a first unique data identifier and encrypted using a first cryptographic key. The category node can include the first unique data identifier and the first cryptographic key. The category node can be identified by a second unique data identifier and encrypted using a second cryptographic key. The institution node can include the second unique data identifier and the second cryptographic key. The institution node can be identified by a third unique data identifier and encrypted using a third cryptographic key. The data node, the category node, and the institution node can be shared with a service provider.
    Type: Application
    Filed: August 28, 2024
    Publication date: December 19, 2024
    Applicant: Apple Inc.
    Inventors: Pablo Antonio Gonzalez Cervantes, Mohan Singh Randhava, Jorge F. Pozas Trevino, Samuel A. Mussell, Isaac Pinol Catadau, Steven A. Myers, Dongsheng Zhang, Suhail Ahmad, Zhengjun Jiang, Yannick L. Sierra, Amir H. Jadidi
  • Publication number: 20240372855
    Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.
    Type: Application
    Filed: July 18, 2024
    Publication date: November 7, 2024
    Inventors: Max M. GUNTHER, Onar VIKINGSTAD, Ramiro CALVO, Isabella M. FUNKE, Eric D. FRIEDMAN, Hervé SIBERT, David P. REMAHL, Yannick L. SIERRA, Frank B. DANCS, Sudhakar N. MAMBAKKAM
  • Publication number: 20240349042
    Abstract: Portable electronic devices can be used to perform tracking functionality through the exchange of proximity messages. Based on the payload in these messages, a mobile device can detect whether a portable electronic device is likely performing unwanted tracking. The mobile device user may wish to identify an account that is associated with the portable device. In response to a request from the mobile device, the portable electronic device can provide a partial identifier that can be used to determine an associated account. The portable electronic device can also provide information that the mobile device can use to locate disablement instructions that can show how to stop the portable device from performing tracking functionality.
    Type: Application
    Filed: April 16, 2024
    Publication date: October 17, 2024
    Applicant: Apple Inc.
    Inventors: Benjamin A. Detwiler, Brent M. Ledvina, Chen Ganir, Emmanuel Lalande, Michael C. Laster, Siva Ganesh Movva, Ernst T. Erdmann, Yannick L. Sierra
  • Patent number: 12113784
    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
    Type: Grant
    Filed: February 9, 2023
    Date of Patent: October 8, 2024
    Assignee: Apple Inc.
    Inventors: Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John Iarocci, Jerrold V. Hauck, Michael Brouwer, Mitchell D. Adler, Yannick L Sierra
  • Patent number: 12095907
    Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.
    Type: Grant
    Filed: June 8, 2022
    Date of Patent: September 17, 2024
    Assignee: APPLE INC.
    Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
  • Patent number: 12089178
    Abstract: A secure ranging system can use a secure processing system to deliver one or more ranging keys to a ranging radio on a device, and the ranging radio can derive locally at the system ranging codes based on the ranging keys. A deterministic random number generator can derive the ranging codes using the ranging key and one or more session parameters, and each device (e.g. a cellular telephone and another device) can independently derive the ranging codes and derive them contemporaneously with their use in ranging operations.
    Type: Grant
    Filed: October 6, 2023
    Date of Patent: September 10, 2024
    Assignee: APPLE INC.
    Inventors: Jerrold V. Hauck, Alejandro J. Marquez, Timothy R. Paaske, Indranil S. Sen, Herve Sibert, Yannick L Sierra, Raman S. Thiara
  • Patent number: 12089050
    Abstract: Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.
    Type: Grant
    Filed: December 22, 2022
    Date of Patent: September 10, 2024
    Assignee: Apple Inc.
    Inventors: Brent M. Ledvina, Yannick L. Sierra, Kyle C. Brogle, Steven Andrew Myers
  • Patent number: 12079370
    Abstract: Techniques for storing health data can include a multi-node data structure. A data node, a category node, and an institution node of a multi-node data structure can be generated in accordance with a configuration file. The data node can include health data and can be identified by a first unique data identifier and encrypted using a first cryptographic key. The category node can include the first unique data identifier and the first cryptographic key. The category node can be identified by a second unique data identifier and encrypted using a second cryptographic key. The institution node can include the second unique data identifier and the second cryptographic key. The institution node can be identified by a third unique data identifier and encrypted using a third cryptographic key. The data node, the category node, and the institution node can be shared with a service provider.
    Type: Grant
    Filed: October 6, 2023
    Date of Patent: September 3, 2024
    Assignee: Apple Inc.
    Inventors: Pablo Antonio Gonzalez Cervantes, Mohan Singh Randhava, Jorge F. Pozas Trevino, Samuel A. Mussell, Isaac Pinol Catadau, Steven A. Myers, Dongsheng Zhang, Suhail Ahmad, Zhengjun Jiang, Yannick L. Sierra, Amir H. Jadidi
  • Patent number: 12075313
    Abstract: Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: August 27, 2024
    Assignee: Apple Inc.
    Inventors: Scott Lopatin, Emmanuel Lalande, Lawrence T. Lu, Robert W. Mayor, Siva Ganesh Movva, Raghunandan K. Pai, Munish K. Poonia, Tommy Rochette, Sam Schaevitz, Yannick L. Sierra, Navin Bindiganavile Suparna, Langford Wasada
  • Patent number: 12074865
    Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: August 27, 2024
    Assignee: Apple Inc.
    Inventors: Max M. Gunther, Onar Vikingstad, Ramiro Calvo, Isabella M. Funke, Eric D. Friedman, Hervé Sibert, David P. Remahl, Yannick L. Sierra, Frank B. Dancs, Sudhakar N. Mambakkam
  • Publication number: 20240214182
    Abstract: Encrypting and securely transmitting data between devices is disclosed. After a device obtains a request to purchase a prescription lens, including prescription data, to be inserted into a second electronic device, the prescription data is securely encrypted and transmitted to the lens manufacturer. The lens manufacturer may create a prescription lens and calibration data related to the lens. The calibration data can be encrypted and transmitted to a storage device for storage. The second electronic device can retrieve the encrypted calibration data from the storage device and utilize it to perform a full calibration of the device. The second electronic device can present images, in accordance with the calibration data, using a display through an optical path that include the prescription lens.
    Type: Application
    Filed: December 26, 2023
    Publication date: June 27, 2024
    Inventors: Srinivas VEDULA, Qihe WANG, Kyle C. BROGLE, Frederic JACOBS, Yannick L. SIERRA, Giuliano PASQUALOTTO, Anup RATHI, Duncan A. MCROBERTS
  • Patent number: 11995446
    Abstract: Techniques are disclosed relating to protecting branch prediction information. In various embodiments, an integrated circuit includes branch prediction logic having a table that maintains a plurality of entries storing encrypted target address information for branch instructions. The branch prediction logic is configured to receive machine context information for a branch instruction having a target address being predicted by the branch prediction logic, the machine context information including a program counter associated with the branch instruction. The branch prediction logic is configured to use the machine context information to decrypt encrypted target address information stored in one of the plurality of entries identified based on the program counter.
    Type: Grant
    Filed: May 2, 2022
    Date of Patent: May 28, 2024
    Assignee: Apple Inc.
    Inventors: Steven A. Myers, Jeffry E. Gonion, Yannick L. Sierra, Thomas Icart
  • Publication number: 20240146531
    Abstract: Techniques are described herein for mobile document provisioning. An example method includes a device receiving, from an inspection system of a first jurisdiction, a request for a mobile identification document of a second jurisdiction. The device can transmit, to the inspection system, the mobile identification document based on the request, the mobile identification document comprising a mobile identification document public key. The device can receive from the inspection system, a mobile supplemental document, the mobile supplemental document comprising a mobile supplemental document public key derived from the mobile identification document public key, the inspection system being configured to derive the mobile supplemental document public key from the mobile identification document public key.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Applicant: Apple Inc.
    Inventors: Hicham Lozi, Ahmer A. Khan, Martijn T. Haring, Yannick L. Sierra
  • Patent number: 11973859
    Abstract: Embodiments described herein provide a method on a mobile electronic device to facilitate the transmission of encrypted user data to a service provider, such as an emergency service provider. An encrypted data repository stores user data to be transmitted to the service provider. A key to decrypt the encrypted data repository is wrapped using a key associated with a publicly trusted certificate for the service provider. In response a request received at the mobile device to initiate an emergency services request, the mobile device can transmit the encrypted data repository and wrapped cryptographic material to a server that is accessible by the service provider.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: April 30, 2024
    Assignee: APPLE INC.
    Inventors: Frederic Jacobs, Yannick L. Sierra