Apple is researching and developing its secure enclave technology to safely allow multiple users to share an iPhone or iPad without disclosing personal information to other users. Apple recently won a patent called & quot; to provide domains in secure enclaves to support multiple users. It’s very specific about safely allowing multiple users to use a device. It could be MAC or IOS. Apple even mentioned that it includes not only single user mobile computing devices, but also multi-user notebook and desktop computing devices. < / P > < p > however, given that MAC already has multi-user support, the patent is more likely to be aimed at bringing the feature to IOS devices. And the most important thing is to be safe. Apple said in the patent that a computing device can use multiple passwords and related encryption keys, among which multiple passwords or encryption keys may be associated with each different user account on the system. < / P > < p > Apple said that before users can access the data stored on the computing device, they may be required to authenticate successfully through the login screen. However, if the data is stored in an unencrypted way, they may still be able to access the data stored on the computing system without knowing the user name / password. Therefore, in addition to identifying multiple users through multiple passwords and related encryption keys, Apple also hopes that these keys can protect the data security in the computing system. < / P > < p > if Apple really applies this to IOS devices, then naturally every user needs to protect his personal information, from the details of logging in to Apple pay. However, each user also needs to access some shared functions of the device, such as its web browser, otherwise they have no sense of using the iPhone at all. Therefore, in order to achieve multi-user access to the data processing system, group keys can be created, so that different levels of access to the system can be achieved through group membership (such as administrators, users, etc.) in the system. < / P > < p > most of the details of the patent focus on the use of a peripheral processor or processing system separate from the system processor. The peripheral processor is a system on chip (SOC) integrated circuit, which can implement a variety of secure peripheral and input / output (I / O) operations. As part of it, the patent details how an authorized user sets what another user can see. In addition, if the user fails to log in many times, the password restriction function can be enabled to limit the rate of unauthorized users trying to enter the wrong password. This method has many advantages, including limiting the possibility of accidental locking, and preventing malicious attackers from performing violent password attacks. Global Tech