Techniques for repairing an inoperable auxiliary device using another device

    公开(公告)号:US11461165B2

    公开(公告)日:2022-10-04

    申请号:US17065492

    申请日:2020-10-07

    Applicant: Apple Inc.

    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.

    Payment handoff system
    64.
    发明授权

    公开(公告)号:US11120445B2

    公开(公告)日:2021-09-14

    申请号:US15922795

    申请日:2018-03-15

    Applicant: Apple Inc.

    Abstract: A device in a payment transaction handoff system may include at least one processor configured to receive a request to perform a payment transaction and identify, using a first communication protocol, a respective device identifier of each of a plurality of proximate devices. The at least one processor is configured to select, based at least in part on a payment factor, a default payment device from the plurality of proximate devices. The at least one processor is configured to transmit, via a second communication protocol, a message to perform the payment transaction, the message comprising the device identifier of the default payment device. In one or more implementations, a first device of the plurality of proximate devices may be associated with a first user account and a second device of the plurality of proximate devices may be associated with a second user account, different from the first user account.

    Direct input from a remote device
    65.
    发明授权

    公开(公告)号:US11061744B2

    公开(公告)日:2021-07-13

    申请号:US16147486

    申请日:2018-09-28

    Applicant: Apple Inc.

    Abstract: The subject technology provides a system of devices, at least one of which includes an application configured to receive data directly from another one of the devices. The application is configured to obtain a list of available devices and associated features and provide input options for display based on the list. When one of the input options is selected, the application activates a component and/or an application of the other device for generation of the desired data. When the desired data has been generated by the other device, the generated data is directly input from the other device into the running application, without storage of the generated data at the other device, and without operation of the same application on the other device.

    Techniques for repairing an inoperable auxiliary device using another device

    公开(公告)号:US10802904B2

    公开(公告)日:2020-10-13

    申请号:US15717824

    申请日:2017-09-27

    Applicant: Apple Inc.

    Abstract: The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.

    Configuring wireless accessory devices

    公开(公告)号:US10257705B2

    公开(公告)日:2019-04-09

    申请号:US14288616

    申请日:2014-05-28

    Applicant: Apple Inc.

    Abstract: This document describes, inter alia, techniques for configuring or setting up a wireless device. As an example of the features described herein, a first wireless device may be used to configure a second wireless device as follows: the first wireless device may detect that the second wireless device is available and is configurable; the first wireless device may connect to the second wireless device and transmit configuration information to the second wireless device, where the configuration information includes credentials that may be used to access a wireless network (e.g., a password to access a Wi-Fi network); the first wireless device and the second wireless device may then both connect to the wireless network, using the credentials; once both devices are connected to the wireless network, the first wireless device may verify that the second wireless device has been correctly configured.

    Proximity pairing based on signal strength

    公开(公告)号:US10187919B2

    公开(公告)日:2019-01-22

    申请号:US15686083

    申请日:2017-08-24

    Applicant: Apple Inc.

    Abstract: Proximity of a responder device to an initiator device can be used to determine user intent for pairing the responder device with the initiator device. For example, the initiator device can measure a signal strength of an advertisement signal from the responder device. When the signal strength is sufficiently strong, a pairing process can be initiated, e.g., the user of the initiator device can automatically be prompted to begin pairing. The determination of whether the signal strength is sufficiently high can be determined based on a human interaction model, which can use measurements from various geometrical configurations of the two types of devices. Measurements at expected configurations that users would place the two devices to initiate pairing can be used to determine a threshold value for the signal strength to identify user intent with a new pair of devices.

Patent Agency Ranking