18197030. PROVING MEMBERSHIP USING CRYPTOGRAPHIC IDENTITIES simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

PROVING MEMBERSHIP USING CRYPTOGRAPHIC IDENTITIES

Organization Name

Apple Inc.

Inventor(s)

Alejandro A. Rodriguez of Saratoga CA (US)

Frederic Jacobs of St. Sulpice (CH)

Stephen M. Lottermoser of San Jose CA (US)

Pierre J. De Filippis of Los Gatos CA (US)

Ryan A. Williams of Morgan Hill CA (US)

Yannick L. Sierra of San Francisco CA (US)

PROVING MEMBERSHIP USING CRYPTOGRAPHIC IDENTITIES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18197030 titled 'PROVING MEMBERSHIP USING CRYPTOGRAPHIC IDENTITIES

Simplified Explanation

The patent application describes a technology that allows users to share access to items with other users through a server. Here are the key points:

  • The technology involves obtaining public keys of devices associated with different user accounts and generating a data structure based on these keys.
  • An identifier of the data structure is provided to a server, which associates it with the item being shared.
  • An invitation is generated for the user account associated with the second device, allowing them to access the item.
  • The invitation is sent to the second device, which can then access the item through the server using the data structure and the device's public key.

Potential Applications

This technology can have various applications, including:

  • Sharing access to digital content, such as files, documents, or media, between different users.
  • Collaborative work environments where multiple users need access to the same resources.
  • Sharing access to physical items, such as smart locks or IoT devices, with authorized users.

Problems Solved

The technology addresses several problems related to sharing access to items:

  • Simplifies the process of sharing access by automatically generating and managing the necessary keys and data structures.
  • Ensures secure access by using public key cryptography to authenticate and authorize users.
  • Provides a centralized server to manage access permissions and facilitate the sharing process.

Benefits

The technology offers several benefits:

  • Convenient and efficient sharing of access to items without the need for manual setup or complex configurations.
  • Enhanced security through the use of public key cryptography and authentication mechanisms.
  • Scalability and flexibility to accommodate various types of items and multiple users.
  • Centralized management of access permissions, making it easier to control and revoke access when needed.


Original Abstract Submitted

Aspects of the subject technology include obtaining, by a first device associated with a first user account, one or more item-specific public keys of one or more devices associated with a second user account and generating a data structure representing the one or more devices associated with the second user account based on the one or more item-specific public keys. Aspects may also include providing an identifier of the data structure to a server for association with the item and generating an invitation for the second user account to access the item. Aspects may further include providing the invitation to a second device of the one or more devices associated with the second user account to provide the second device with access to the item via the server based on at least a portion of the data structure and a respective item-specific public key of the second device.