US 12,452,078 B2
Multiple-key verification information for mobile device identity document
Martijn T. Haring, Cupertino, CA (US); Ahmer A. Khan, Milpitas, CA (US); and Xiangying Yang, Cupertino, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Sep. 25, 2020, as Appl. No. 17/033,564.
Claims priority of provisional application 62/941,603, filed on Nov. 27, 2019.
Prior Publication US 2021/0160081 A1, May 27, 2021
Int. Cl. H04L 29/06 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3247 (2013.01) [H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3231 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A non-transitory computer readable medium having program instructions stored therein that are executable by a mobile device including a secure element to perform operations comprising:
receiving a request to provision the mobile device with identification information from a physical identification document issued by an authority to a user for establishing an identity of the user;
generating, by the secure element, a plurality of signature public key pairs that are each to be associated with a different respective verification in a user authentication exchange involving the identification information;
in response to the received request, issuing, to a system associated with the authority, a request for verification information signed by the authority and usable to verify the identification information, wherein the issued request identifies public keys of the plurality of signature public key pairs;
receiving the signed verification information, wherein the signed verification information includes the public keys and defines the different respective verifications associated with their corresponding signature public key pairs such that a first private key of the public key pairs is to be used to generate a signature in response to performing a first of the different respect verifications and a second private key of the public key pairs is to be used to generate a signature in response to performing a second of the different respect verifications; and
storing the identification information and the signed verification information in the secure element to cause the secure element to restrict access to the stored information based on a user authentication.