Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2018226263) AUTHENTICATION TECHNIQUES IN RESPONSE TO ATTEMPTS TO ACCESS SENSITIVE INFORMATION
Latest bibliographic data on file with the International Bureau    Submit observation

Pub. No.: WO/2018/226263 International Application No.: PCT/US2018/015503
Publication Date: 13.12.2018 International Filing Date: 26.01.2018
IPC:
G06F 21/32 (2013.01) ,H04L 9/08 (2006.01) ,H04L 9/32 (2006.01) ,H04L 29/06 (2006.01)
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30
Authentication, i.e. establishing the identity or authorisation of security principals
31
User authentication
32
using biometric data, e.g. fingerprints, iris scans or voiceprints
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
08
Key distribution
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
32
including means for verifying the identity or authority of a user of the system
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29
Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02
Communication control; Communication processing
06
characterised by a protocol
Applicants:
APPLE INC. [US/US]; 1 Infinite Loop Cupertino, California 95014, US
Inventors:
BALLARD, Lucia, E.; US
HAUCK, Jerrold, V.; US
PRAKASH, Deepti, Sunder; US
CIBULKA, Jan; CZ
KRSTIC, Ivan; US
Agent:
DAVIS, Michael, B.; US
Priority Data:
62/514,90604.06.2017US
62/556,36709.09.2017US
Title (EN) AUTHENTICATION TECHNIQUES IN RESPONSE TO ATTEMPTS TO ACCESS SENSITIVE INFORMATION
(FR) TECHNIQUES D'AUTHENTIFICATION EN RÉPONSE À DES TENTATIVES D'ACCÈS À DES INFORMATIONS SENSIBLES
Abstract:
(EN) The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant "who owns this device?" By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
(FR) La présente invention concerne des techniques permettant de modifier un type d'authentification nécessaire en fonction d'une demande d'un type particulier d'informations. Par exemple, on considère une situation dans laquelle un utilisateur a demandé à un assistant virtuel « qui possède ce dispositif ? ». Par défaut, le dispositif peut permettre une authentification biométrique pour déverrouiller. Cependant, en réponse à l'identification du propriétaire par l'assistant virtuel, le dispositif peut exiger un ou plusieurs autres types d'authentification (par exemple, la saisie manuelle d'un mot de passe) pour déverrouiller le dispositif. Dans divers modes de réalisation, les techniques de l'invention peuvent augmenter la sécurité du dispositif en rendant plus difficile pour des entités malveillantes d'obtenir les informations sensibles ou d'accéder à une fonctionnalité de dispositif une fois que les informations sensibles ont été divulguées. Dans divers modes de réalisation, cela peut empêcher ou réduire les accès non autorisés au dispositif.
front page image
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW
African Regional Intellectual Property Organization (ARIPO) (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Office (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (EPO) (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG)
Publication Language: English (EN)
Filing Language: English (EN)