-
71.
公开(公告)号:US11115818B2
公开(公告)日:2021-09-07
申请号:US16428683
申请日:2019-05-31
Applicant: Apple Inc.
Inventor: Bob Bradley , Marc J. Krochmal
Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
-
公开(公告)号:US11019195B2
公开(公告)日:2021-05-25
申请号:US16586281
申请日:2019-09-27
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Marc J. Krochmal , Robert W. Brumley , Sriram Hariharan
IPC: H04W4/02 , H04W12/06 , H04M1/72457 , G06F3/0481 , H04L9/30 , H04L29/06 , H04W4/12 , H04W8/18 , H04M1/72436 , H04W12/033
Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
-
公开(公告)号:US20210067429A1
公开(公告)日:2021-03-04
申请号:US16673223
申请日:2019-11-04
Applicant: Apple Inc.
Inventor: Marc J. Krochmal
Abstract: Methods and systems are provided for detecting network device configurations using a single device. The methods and system include establishing a first connection to a network device using a first device identifier. Upon detecting that a condition has been satisfied; a second connection to the network device can be established. A data packet can be transmitted over one of the first connection or the second connection, the data packet being addressed to the network address associated with the other connection. Upon detecting whether the data packet is received over the other connection, an error message can be transmitted when the data packet is not received over the other connection.
-
公开(公告)号:US20210006652A1
公开(公告)日:2021-01-07
申请号:US17025160
申请日:2020-09-18
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Marc J. Krochmal , Robert W. Brumley , Sriram Hariharan
IPC: H04M1/725 , H04W12/00 , G06F3/0481 , H04L9/30 , H04L29/06 , H04W4/02 , H04W4/12 , H04W8/18 , H04W12/06
Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
-
75.
公开(公告)号:US10715609B2
公开(公告)日:2020-07-14
申请号:US16403340
申请日:2019-05-03
Applicant: Apple Inc.
Inventor: Matthew E. Shepherd , Benjamin T. Sherratt , Marc J. Krochmal , Bob Bradley , Kritarth Jain , Michele Campeotto
Abstract: The embodiments set forth a technique for dynamically adjusting a manner in which notifications are output on a computing device. According to some embodiments, a technique can include (1) identifying that at least one different computing device satisfies a physical proximity threshold relative to the computing device, (2) determining that the at least one different computing device is included in a list of known computing devices associated with the computing device, (3) determining, based on a configuration associated with the at least one computing device, that the at least one different computing device is associated with a respective notification profile maintained by the computing device, and (4) activating the respective notification profile at the computing device to adjust the manner in which notifications are output by the computing device.
-
公开(公告)号:US10680997B2
公开(公告)日:2020-06-09
申请号:US16108576
申请日:2018-08-22
Applicant: Apple Inc.
Inventor: Alexander Ledwith , Christopher C. Jensen , John J. Iarocci , Marc J. Krochmal , Ziv Wolkowicki , Daniel B. Pollack , Darin B. Adler
Abstract: Messaging between a companion device and an accessory device is controlled such that different modes of communication may be utilized. The different modes can implement different messaging strategies, each of which is intended for efficient power management, in view of the limited electrical power that is typically available at the accessory device. A received request message for sending from the companion device to the accessory device is sent if predetermined conditions apply, and similarly for messages from the accessory device to the companion device.
-
77.
公开(公告)号:US10667109B2
公开(公告)日:2020-05-26
申请号:US16218104
申请日:2018-12-12
Applicant: Apple Inc.
Inventor: Marc J. Krochmal , Daniel M. Vinegrad
Abstract: The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device and broadcasts an activity advertisement comprising an activity identifier for the activity. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device acquires extended activity data from the source electronic device and uses the extended activity data to configure the second application and commence performing the activity with the second application at the companion electronic device. The source electronic device may also forward activity-related information (e.g., information from a copy and paste clipboard in the source electronic device) to the companion electronic device.
-
公开(公告)号:US10575355B2
公开(公告)日:2020-02-25
申请号:US14632735
申请日:2015-02-26
Applicant: Apple Inc.
Inventor: Daniel M. Vinegrad , John J. Iarocci , Marc J. Krochmal
Abstract: Application processes executing on a mobile device can interact with interfaces (e.g., routines of an application programming interface) exposed on that mobile device in order to establish a wireless connection either directly to a network (e.g., the Internet) or directly to an intermediary device through which the application processes can then communicate with the network indirectly. The intermediary device can communicate with the network on behalf of the mobile device. The application processes can remain unaware, in either case, of whether the interfaces are communicating with the network through the intermediary device or not. The interfaces can insulate the application processes from that fact. The use of the intermediary device can be transparent to the application processes, such that the manner in which the application processes transmit and receive data using the interfaces remains constant regardless of whether the intermediary device is involved.
-
公开(公告)号:US20170359797A1
公开(公告)日:2017-12-14
申请号:US15179747
申请日:2016-06-10
Applicant: APPLE INC.
Inventor: Bob Bradley , James B. Cary , Marc J. Krochmal , Matthew E. Shepherd , Neil G. Crane
CPC classification number: H04W68/005 , H04L51/24 , H04L51/38 , H04L67/22 , H04L67/306 , H04M1/6066 , H04M2250/02 , H04W4/38 , H04W4/80 , H04W68/10
Abstract: A device may broadcast an indication of an activity level of the device. The device may also receive a notification of an incoming message and receive at least one broadcast from at least one additional device also receiving the notification of the incoming message including an indication of at least one activity level of the at least one additional device. The device may compare its own activity level with the received at least one activity level. In response to determining that the activity level of the device is equal to or greater than a highest received at least one activity level, the device may display the notification of the incoming message.
-
公开(公告)号:US20170359169A1
公开(公告)日:2017-12-14
申请号:US15497203
申请日:2017-04-26
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
CPC classification number: G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/08 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04L2209/80 , H04W12/04 , H04W12/06 , H04W12/08
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
-
-
-
-
-
-
-
-