Apple Inc.
Secure secrets to mitigate against attacks on cryptographic systems
Last updated:
Abstract:
Secure secrets can be used, in one embodiment, to generate a master key. In one embodiment, a first secret value, generated and stored in a first secure element, can be used with a user's credential (e.g., a user's passcode) to generate, through a first key derivation function, a second secret value. A master key can then be generated through a second key derivation function based on the second secret value and a derived or stored secret such as a device's unique identifier.
Status:
Grant
Type:
Utility
Filling date:
30 Jan 2018
Issue date:
18 Jan 2022