IPhone 12 launched.News 

Apple is finally working on a feature Android phones have had for years

It looks like Apple is finally working on a feature that has been around in Android smartphones for years. The company has obtained a new patent entitled “Providing Domains in a Secure Enclave to Support Multiple Users”. This means that the iPhone maker is developing its secure enclave technology that can allow multiple users to share an iPhone or iPad, without revealing their private information to other users. In short, it means multiple users support user accounts in iOS.

The patent doesn’t specifically mention iOS or any other version of the operating system, Appleinsider reports.

In the patent, the company even refers to both single-user mobile computing devices and multi-user laptops and desktops .

It should be noted that macOS already supports multiple users. However, the patent could indicate that this feature could be primarily for iPhones.

A computing device can use multiple passcodes and associated encryption keys, where multiple passcodes or encryption keys can be associated with each different user account on the system, the patent states.

From the patent, it appears that Apple is trying to solve the problem where every user would need to secure personal information, logins to Apple Pay details, while using some shared functionality such as the web browser.

Apple also mentioned a Secure Enclave or SEP processor, which appears to be the future version of the T2 security chip found in Mac devices. And this processor could also appear in iPhones in the future.

It is also mentioned that the technology can deliberately slow down the process of getting multiple failed login attempts, after which you are usually logged out.

Passcode limitation can be enabled on some single-user mobile computing devices, such as smartphones or tablets, he says, to limit the rate at which an unauthorized user can attempt to enter data. incorrect access codes. “

The patent states that “the access code entry rate may also be limited after the predetermined number of incorrect authentication attempts”. The advantages of this can be that it can prevent accidental locking and can also frustrate the malicious attacker in a brute force code attack.

Related posts

Leave a Comment