Generating Suggestions For Scenes And Triggers

    公开(公告)号:US20180091381A1

    公开(公告)日:2018-03-29

    申请号:US15275342

    申请日:2016-09-24

    Applicant: Apple Inc.

    Abstract: In some implementations, a user device can automatically generate scene suggestions and/or trigger suggestions. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the user device can cause the accessories associated with the scene to assume the corresponding accessory states. The user device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The user device can automatically determine triggers for automatically invoking scenes based on historical patterns of use. For example, the user device can analyze historical context (e.g., location, time, accessory state, etc.) data associated with accessory state transitions to determine triggers for automatically invoking a scene. The user device can present suggest scenes and/or triggers to the user of the user device.

    Anomaly Detection By Resident Device
    72.
    发明申请

    公开(公告)号:US20180091327A1

    公开(公告)日:2018-03-29

    申请号:US15275344

    申请日:2016-09-24

    Applicant: Apple Inc.

    Abstract: In some implementations, a user device (or resident device) can notify the user of anomalous accessory states. For example, the user device can determine which accessory states and contexts represent normal accessory states in the respective contexts. Similarly to scene suggestions, the user device can analyze historical accessory state data and context data to determine an accessory state pattern that indicates a normal state of an accessory for a given context. The user device can compare the current state and/or context of an accessory to historical accessory state data to determine when the current state of the accessory is abnormal for the current context. If the current accessory state is abnormal for the current context, the user device can present a notification to the user informing the user of the anomalous accessory state.

    AGGREGATING USER ROUTINES IN AN AUTOMATED ENVIRONMENT
    75.
    发明申请
    AGGREGATING USER ROUTINES IN AN AUTOMATED ENVIRONMENT 有权
    在自动环境中聚合用户程序

    公开(公告)号:US20160132030A1

    公开(公告)日:2016-05-12

    申请号:US14856265

    申请日:2015-09-16

    Applicant: Apple Inc.

    Abstract: Automated behaviors in an environment can be implemented based on aggregation of individual user routines. For example, mobile devices used by users in the environment can provide information about the users' behavior patterns to a coordinator device that can be located in the environment. The coordinator device can analyze the information to detect an aggregate pattern that involves multiple mobile devices and/or multiple users. Based on a detected aggregate patterns, the coordinator can identify behaviors to automate.

    Abstract translation: 环境中的自动行为可以基于单个用户例程的聚合来实现。 例如,环境中的用户使用的移动设备可以向可以位于环境中的协调器设备提供关于用户行为模式的信息。 协调器设备可以分析信息以检测涉及多个移动设备和/或多个用户的聚合模式。 基于检测到的聚合模式,协调器可以识别自动化的行为。

    Policy-based techniques for managing access control
    77.
    发明授权
    Policy-based techniques for managing access control 有权
    用于管理访问控制的基于策略的技术

    公开(公告)号:US09098714B2

    公开(公告)日:2015-08-04

    申请号:US14085951

    申请日:2013-11-21

    Applicant: Apple Inc.

    CPC classification number: G06F21/604 H04L63/102 H04L63/105 H04L63/20 H04W12/08

    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.

    Abstract translation: 描述了基于策略的框架。 该基于策略的框架可以用于指定逻辑实体执行与位于电子设备中的安全元件内的访问控制元素(例如电子订户身份模块)相关联的操作的特权。 注意,对于与相同或不同的访问控制元素相关联的不同操作,不同的逻辑实体可以具有不同的权限。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的凭证的类型,使得不同类型的凭证可以用于不同的操作和/或由不同的逻辑实体使用。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的安全协议和安全级别,使得不同的安全协议和安全级别可以用于不同的操作和/或不同的逻辑实体。

Patent Agency Ranking