Apple patent sends password secrets to adapters

January 6, 2012 by Nancy Owano, report

( -- First-time computer users in the early days, pre-hacking security traumas, were confronted with a new life requirement: creating and remembering system passwords. Not too easy, users were warned, to protect their privacy against snooping brothers and sisters, but not too tough, so they can easily remember it all times. This is no longer good advice, and Apple has filed a patent that says, no, make your password as tough as you want.

The filed by Apple seeks to help users recover their information with use of a charger peripheral that doubles as the user’s security key for password recovery.

Apple says in the patent application, dated July 2010 and made public this month, that too often users choose to make their passwords simple, which just makes the work of thieves all that easier. Instead, Apple is suggesting that a user’s MacBook or smartphone or any iOS device password recovery information could be stored inside its charging adapter.

The idea is to shift the security information to the adapter, in the event that the user’s laptop or smartphone or tablet is stolen or otherwise missing. In so doing, the user can make it tough for thieves because the user can feel free to construct more complex password strings.

Once the user plugs in the peripheral, the recovery process for password retrieval and display is done.The patent application is titled, “System and Method for Storing a Password Recovery Secret,” and the inventor is named as Guy Tribble, of Hillsborough, California. Apple is proposing that a small memory module built into the unit holds the password or recovery question.

For users really concerned about security complex enough to thwart thieves skilled in working out passwords, Apple suggests the user might want to use multiple peripherals as an alternative scenario, where the adapter could hold part of the information and the other could reside elsewhere, as on some remote network server.

The patent application’s idea seems useful obviously in instances where one is travelling with the laptop or other mobile computing device but not the charger. is assuming the user taking advantage of this password-retrieval approach leaves the charging device behind, at home or in some desk or locker, before going out on the road.

While many reactions have been favorable to the patent idea, others note that the assumption may be too easily drawn. Some laptop users always carry their chargers with them because of limited battery life, though tablets and smartphones last a long time. A heist that includes both charger and computer places the user out of luck, say some detractors, who also note that cyber thieves eventually will figure out password information on the charger too. Detractors also note that as soon as the time would come for such a device to go commercial, thieves would start seeking out such chargers as worthy for stealing.

Explore further: Better passwords get with the beat

More information: Patent text online:

Related Stories

Better passwords get with the beat

May 17, 2011

No password is 100% secure. There are always ways and means for those with malicious intent to hack, crack or socially engineer access to a password. Indeed, there are more and more websites and databases compromised on a ...

Apple seeks patents for display and noise-out systems

December 11, 2011

( -- Apple made patent news this week in two directions, toward a Kinect like system and toward a quest for excellence in sound quality on phones. It’s been reported that Apple has filed patent applications ...

Apple moves to stop kids racking up iTunes bills

March 16, 2011

(AP) -- After customers complained that their kids were racking up hundreds of dollars worth of purchases inside iPhone and iPad games, Apple has changed how these purchases are authorized.

Are you any good at creating passwords?

January 30, 2010

There's an interesting little study that's been done by security firm Imperva, which analyzed some 32 million passwords posted online in December by some enterprising hacker.

Recommended for you

Permanent, wireless self-charging system using NIR band

October 8, 2018

As wearable devices are emerging, there are numerous studies on wireless charging systems. Here, a KAIST research team has developed a permanent, wireless self-charging platform for low-power wearable electronics by converting ...

Facebook launches AI video-calling device 'Portal'

October 8, 2018

Facebook on Monday launched a range of AI-powered video-calling devices, a strategic revolution for the social network giant which is aiming for a slice of the smart speaker market that is currently dominated by Amazon and ...

Artificial enzymes convert solar energy into hydrogen gas

October 4, 2018

In a new scientific article, researchers at Uppsala University describe how, using a completely new method, they have synthesised an artificial enzyme that functions in the metabolism of living cells. These enzymes can utilize ...


Adjust slider to filter visible comments by rank

Display comments: newest first

3.7 / 5 (6) Jan 06, 2012
IMHO, this is another useless patent that Apple will attempt to market to "uneducated" computer users.

Believe it or not, by making your password 12 or more characters long, have it contain at least one number or non-alphanumeric character, and by having it not be a word easily looked up in a dictionary, your password will be uncrackable by the average hacker with current computing technology.

See http://www.tomsha...5-6.html

Now government or DOD with enough funding could potentially purchase enough GPGPU enabled computers to cut the time of cracking such a password from thousands of years.
5 / 5 (2) Jan 06, 2012
Why not a tiny memory chip in your tooth filling, dentures, fancy nose or ear ring, glasses, watch, belt buckle... No doubt the patents are out there and like this just scape paper.
1 / 5 (2) Jan 06, 2012
We have to take the entire password process out of the human's hands. Scanning devices and adapters for older systems should be the way to go. Also there should be intervals or access ports that require re-authorization during usages, only manufactures know the algorithm not the users. If a unit like a monitor unit scanned the user's face, for instance, and there were adaptors for older monitors to simulate then the system can come up with login routines and re-authorization schedules on all types of units. Users can registar as checkout and then add others to the system. If it doesn't recoginze you you won't get in. Pnones, desktops, etc can be adapted to this type of authorization.
3 / 5 (2) Jan 06, 2012
How about a USB password card key? You can go to Office-Max and buy a pack of two (the minimum) or more. Each key has the same password and can be put on key-chain or necklace. The key is bought based on your Op/Sys. Plug the key into a USB and the Op/Sys goes into action. It reads the key and you must verify on the screen that its the key you entered by entering a bar-code number or some number on the purchase box during initial install. Just don't let others get your USB keys. During set up the user picks a secret photo and name it. If their key is stolen the person can't get in because they don't know the secret photo. Once authorization completes the user doesn't have to re-authorize the machine does it for them. If the secret photo fails then authorization doesn't complete, lock the system until the real person clears access. Online sites use this Op/Sys system and their visual secret layer. Initial authorization is quick, subsequent faster and by machine to machine.
5 / 5 (1) Jan 06, 2012
I use a program called 1Password that stores all my passwords in one place. I only have to remember one password. It's for Mac but I'm sure there are similar things for Linux and Windows. But it is more secure to use 2-factor authentication, involving a simple password combined with a physical source.
not rated yet Jan 06, 2012
situation is ectoplasmic onslaught from without, maybe applied phrenology; piecing things together still; WOW to the rest of them . . . . . . . . . hey, Jesus lives on that, repackages as 'salvation'?? (if successfully pulled off)
not rated yet Jan 07, 2012
like a 6 month old charger of my mates which, just last week, blew up :/
not rated yet Jan 08, 2012
I guess that you want an iPad 2, as I wanted, and I want to announce that I have found a method by which you will receive a free ipad2. All you have to do to enjoy this super gadget is to fill in your real data. Just so. You do not have to give bank account or credit card data,only your personal information, and soon you will receive a free ipad2.
All you have to do is to go on and fill the form with your data in order to get a free ipad2.
It is that simple? don`t believe me? what do you have to lose? Just fill in your real data and soon you will enjoy your free ipad2.I'm telling you this because I have nothing to lose,I just want to help others. Think abaut it, you can lose max 2 minutes, but think what you can win, so what do you say, does it worth?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.