-
公开(公告)号:US11876806B2
公开(公告)日:2024-01-16
申请号:US17808799
申请日:2022-06-24
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Alexander D. Sanciangco , Brent M. Ledvina , Chelsea E. Pugh , Kyle C. Brogle , Marc J. Krochmal , Maureen G. Daum , Reza Abbasian , Richard J. Mondello , Jacob S. Klapper
CPC classification number: H04L63/107 , G06F21/43 , G06F21/45 , H04W4/80
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:US11593082B2
公开(公告)日:2023-02-28
申请号:US17030287
申请日:2020-09-23
Applicant: Apple Inc.
Inventor: Reza Abbasian , Steven J. Falkenburg , Yongjun Zhang , Charles H. Ying , Nyla Khan , Grant Ritchie , Patrick L. Coffman
IPC: G06F8/61 , G06F9/445 , G06Q30/00 , G06Q20/32 , G06K7/14 , G06F21/30 , G06F11/30 , G06F11/34 , G06F21/57 , G06Q30/018
Abstract: The subject technology provides a portion of the functionality of an application on an electronic device on which the application is not installed. The portion of the functionality of the application is provided by a clip of the application that can be obtained, installed, and launched on the user device, at the time the functionality is desired by a user, and without authenticating information for the user. The clip of the application can provide the user with access to a purchase function, an ordering function, or any other sub-function of the application. When the application itself is installed on the device, the clip of the application can be deleted while preserving access, by the application, to data generated on the device by the clip.
-
公开(公告)号:US11568039B2
公开(公告)日:2023-01-31
申请号:US16146567
申请日:2018-09-28
Applicant: Apple Inc.
Inventor: Reza Abbasian , Richard J. Mondello , David P. Quesada , Kyle C. Brogle , Patrick L. Coffman
Abstract: Techniques are disclosed relating to credential managers. In some embodiments, a computing device maintains a credential manager that stores, in a protected manner, a set of credentials for authenticating a user and metadata about the credentials. The computing device stores an instance of the metadata externally to the credential manager. The computing device uses the externally stored metadata to determine whether the set of credentials includes a particular credential associated with a service and, in response to determining that the set of credentials includes the particular credential, displays an indication of the particular credential. In some embodiments, the computing device receives a selection of the displayed indication by the user and, in response to the selection, sends a request for the particular credential to the credential manager.
-
公开(公告)号:US11556631B2
公开(公告)日:2023-01-17
申请号:US16888507
申请日:2020-05-29
Applicant: Apple Inc.
Inventor: Elaine Y. Knight , Chelsea E. Pugh , Reza Abbasian , Richard Houle , Richard J. Mondello , Zhuo Li , Patrick L. Coffman
Abstract: In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface.
-
公开(公告)号:US20230008448A1
公开(公告)日:2023-01-12
申请号:US17808799
申请日:2022-06-24
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Alexander D. Sanciangco , Brent M. Ledvina , Chelsea E. Pugh , Kyle C. Brogle , Marc J. Krochmal , Maureen G. Daum , Reza Abbasian , Richard J. Mondello , Jacob S. Klapper
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:US11233779B2
公开(公告)日:2022-01-25
申请号:US16147688
申请日:2018-09-29
Applicant: Apple Inc.
Inventor: Alexander D. Sanciangco , Maureen G. Daum , Richard J. Mondello , Reza Abbasian
Abstract: Techniques are disclosed relating to credential sharing for user authentication. In some embodiments, a first computing device maintains a credential manager that stores a plurality of user credentials usable to authenticate a user. The first computing device receives a request from the user to send one of the plurality of user credentials to a second computing device. In response to the request, the first computing device sends the user credential to the second computing device. The second computing device is configured to determine whether an application of the second computing device is presenting an authentication prompt to a user and, in response to determining that the authentication prompt is being presented, populate one or more fields of the authentication prompt with the user credential. In some embodiments, the second computing device is configured to store the user credential in a credential manager maintained by the second computing device.
-
-
-
-
-