-
公开(公告)号:US10972459B2
公开(公告)日:2021-04-06
申请号:US16122329
申请日:2018-09-05
Applicant: Apple Inc.
Inventor: Achim Pantfoerder , Daniel R. Borges , Irene M. Graff , Johan O. Bergerengen , Subash Marri Sridhar , Thomas Elliott
Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identity credential may be secured using biometric information associated with a user, the biometric information being obtained using a first biometric input method of a plurality of biometric input methods. When the user is later authenticated, the authentication may be based at least in part on determining that the user has selected a biometric input method that matches the biometric input method used to secure the credential as well as providing biometric information that matches the biometric information used to secure the identity credential.
-
公开(公告)号:US20240371252A1
公开(公告)日:2024-11-07
申请号:US18773257
申请日:2024-07-15
Applicant: Apple Inc.
Inventor: Benjamin A. Detwiler , Siva Ganesh Movva , Katherine K. Ernst , Richard Akira Heru , Johan O. Bergerengen , Langford M. Wasada , Ernst Thomas Erdmann, IV
Abstract: Methods to provide separation notifications are described. In an embodiment, movement is detected beyond a threshold distance from a trusted location, in response to the detecting, receiving an indication that at least one accessory device is nearby the electronic device and storing information on a status of a wireless connection with the at least one accessory device, receiving an indication that the electronic device is in transit, monitoring the wireless connection for the at least one accessory device, and upon detection of a lost wireless connection for the at least one accessory device, send a separation notification
-
公开(公告)号:US20220358830A1
公开(公告)日:2022-11-10
申请号:US17525779
申请日:2021-11-12
Applicant: Apple Inc.
Inventor: Benjamin A. Detwiler , Siva Ganesh Movva , Katherine K. Ernst , Richard Akira Heru , Johan O. Bergerengen , Langford M. Wasada , Ernst Thomas Erdmann, IV
Abstract: Methods to provide separation notifications are described. In an embodiment, movement is detected beyond a threshold distance from a trusted location, in response to the detecting, receiving an indication that at least one accessory device is nearby the electronic device and storing information on a status of a wireless connection with the at least one accessory device, receiving an indication that the electronic device is in transit, monitoring the wireless connection for the at least one accessory device, and upon detection of a lost wireless connection for the at least one accessory device, send a separation notification.
-
公开(公告)号:US12073705B2
公开(公告)日:2024-08-27
申请号:US17525779
申请日:2021-11-12
Applicant: Apple Inc.
Inventor: Benjamin A. Detwiler , Siva Ganesh Movva , Katherine K. Ernst , Richard Akira Heru , Johan O. Bergerengen , Langford M. Wasada , Ernst Thomas Erdmann, IV
Abstract: Methods to provide separation notifications are described. In an embodiment, movement is detected beyond a threshold distance from a trusted location, in response to the detecting, receiving an indication that at least one accessory device is nearby the electronic device and storing information on a status of a wireless connection with the at least one accessory device, receiving an indication that the electronic device is in transit, monitoring the wireless connection for the at least one accessory device, and upon detection of a lost wireless connection for the at least one accessory device, send a separation notification.
-
公开(公告)号:US20190325125A1
公开(公告)日:2019-10-24
申请号:US16122321
申请日:2018-09-05
Applicant: Apple Inc.
Inventor: Achim Pantfoerder , Daniel R. Borges , Irene M. Graff , Johan O. Bergerengen , Subash Marri Sridhar , Thomas Elliott
Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (e.g., via a short-range communications protocol such as iBeacon) by a first device from a second device. The credential may be associated with a second user of the second device. The first device may verify the credential and, if valid, an additional option to approve a secure communications channel may be presented at the first device. If the additional option is selected, a secure communications channel may be established between the first device and the second device.
-
公开(公告)号:US11093597B2
公开(公告)日:2021-08-17
申请号:US16122321
申请日:2018-09-05
Applicant: Apple Inc.
Inventor: Achim Pantfoerder , Daniel R. Borges , Irene M. Graff , Johan O. Bergerengen , Subash Marri Sridhar , Thomas Elliott
Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (e.g., via a short-range communications protocol such as iBeacon) by a first device from a second device. The credential may be associated with a second user of the second device. The first device may verify the credential and, if valid, an additional option to approve a secure communications channel may be presented at the first device. If the additional option is selected, a secure communications channel may be established between the first device and the second device.
-
公开(公告)号:US20190327228A1
公开(公告)日:2019-10-24
申请号:US16122329
申请日:2018-09-05
Applicant: Apple Inc.
Inventor: Achim Pantfoerder , Daniel R. Borges , Irene M. Graff , Johan O. Bergerengen , Subash Marri Sridhar , Thomas Elliott
Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identity credential may be secured using biometric information associated with a user, the biometric information being obtained using a first biometric input method of a plurality of biometric input methods. When the user is later authenticated, the authentication may be based at least in part on determining that the user has selected a biometric input method that matches the biometric input method used to secure the credential as well as providing biometric information that matches the biometric information used to secure the identity credential.
-
-
-
-
-
-