Apple Inc.
Secure secrets to mitigate against attacks on cryptographic systems

Last updated:

Abstract:

Secure secrets can be used, in one embodiment, to generate a master key. In one embodiment, a first secret value, generated and stored in a first secure element, can be used with a user's credential (e.g., a user's passcode) to generate, through a first key derivation function, a second secret value. A master key can then be generated through a second key derivation function based on the second secret value and a derived or stored secret such as a device's unique identifier.

Status:
Grant
Type:

Utility

Filling date:

30 Jan 2018

Issue date:

18 Jan 2022