US 12,294,655 B2
Method of using one device to unlock another device
Conrad Sauerwald, Mountain View, CA (US); Alexander Ledwith, Santa Cruz, CA (US); John Iarocci, Los Gatos, CA (US); Marc J. Krochmal, Santa Clara, CA (US); Wade Benson, Sunnyvale, CA (US); Gregory Novick, San Francisco, CA (US); and Noah Witherspoon, San Francisco, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Nov. 7, 2022, as Appl. No. 18/053,352.
Application 18/053,352 is a continuation of application No. 14/810,395, filed on Jul. 27, 2015, abandoned.
Claims priority of provisional application 62/044,907, filed on Sep. 2, 2014.
Prior Publication US 2023/0231718 A1, Jul. 20, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); G06F 21/32 (2013.01); G06F 21/44 (2013.01); H04L 9/08 (2006.01); H04W 4/80 (2018.01); H04W 12/08 (2021.01); H04W 12/50 (2021.01)
CPC H04L 9/3234 (2013.01) [G06F 21/32 (2013.01); G06F 21/44 (2013.01); H04L 9/0822 (2013.01); H04L 9/0825 (2013.01); H04L 9/0838 (2013.01); H04L 9/0866 (2013.01); H04L 9/3226 (2013.01); H04L 9/3271 (2013.01); H04W 12/08 (2013.01); H04W 12/50 (2021.01); G06F 2221/2147 (2013.01); H04L 2209/24 (2013.01); H04W 4/80 (2018.02)] 17 Claims
OG exemplary drawing
 
1. A method for unlocking a second device with a first device, the method comprising:
during a first communication session, establishing a trusted relationship between the first device and the second device including receiving a first long-term key;
during a second communication session, different from the first communication session:
generating, at the first device, a short-term key, wherein the short-term key is generated using the first long-term key;
transmitting the short-term key to the second device;
receiving, from the second device, an encrypting key generated by the second device using the short-term key;
encrypting an unlocking key with the encrypting key; and
transmitting the encrypted unlocking key to the second device to unlock it,
wherein establishing the trusted relationship between the first device and the second device includes generating the unlocking key.