-
公开(公告)号:US20250055936A1
公开(公告)日:2025-02-13
申请号:US18926834
申请日:2024-10-25
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Marc J. Krochmal , Robert W. Brumley , Sriram Hariharan
IPC: H04M1/72457 , G06F3/04817 , H04L9/30 , H04L69/18 , H04M1/72436 , H04W4/02 , H04W4/12 , H04W8/18 , H04W12/033 , H04W12/06 , H04W12/63
Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As another example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
-
公开(公告)号:US12113784B2
公开(公告)日:2024-10-08
申请号:US18107982
申请日:2023-02-09
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L Sierra
IPC: H04L9/08 , G06F9/445 , H04L9/14 , H04L9/32 , H04L9/40 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086
CPC classification number: H04L63/08 , G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086 , H04L2209/80
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11693946B2
公开(公告)日:2023-07-04
申请号:US17103883
申请日:2020-11-24
Applicant: Apple Inc.
Inventor: Bob Bradley , William M. Bumgarner , Vijay Sundaram , Marc J. Krochmal
IPC: G06F21/44 , G06F21/60 , H04W4/00 , H04L9/32 , H04W12/02 , H04W12/03 , H04W12/50 , H04W12/065 , H04W12/06 , H04W12/069 , H04W12/082 , H04W12/084 , H04L65/61 , H04W76/14 , H04L9/40 , H04W84/12 , H04W4/80 , H04W4/06 , H04W12/55 , H04W12/71
CPC classification number: G06F21/44 , G06F21/604 , H04L9/32 , H04L9/3247 , H04L63/0876 , H04L65/61 , H04W4/00 , H04W12/02 , H04W12/03 , H04W12/065 , H04W12/068 , H04W12/069 , H04W12/082 , H04W12/084 , H04W12/50 , H04W76/14 , H04L63/083 , H04L63/10 , H04L63/105 , H04W4/06 , H04W4/80 , H04W12/55 , H04W12/71 , H04W84/12
Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
-
公开(公告)号:US11516337B2
公开(公告)日:2022-11-29
申请号:US17025160
申请日:2020-09-18
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Marc J. Krochmal , Robert W. Brumley , Sriram Hariharan
IPC: H04W4/02 , H04W4/12 , H04W12/06 , H04M1/72457 , G06F3/04817 , H04L9/30 , H04L69/18 , H04W8/18 , H04M1/72436 , H04W12/033 , H04W12/63
Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
-
公开(公告)号:US11468162B2
公开(公告)日:2022-10-11
申请号:US16677500
申请日:2019-11-07
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Richard J. Mondello , Reza Abbasian , Ivan Krstic , Darin Adler , Charilaos Papadopoulos , Maureen Grace Daum , Guillaume Borios , Patrick Robert Burns , Alexander David Sanciangco , Brent Michael Ledvina , Chelsea Elizabeth Pugh , Kyle Brogle , Marc J. Krochmal , Jacob Klapper , Paul Russell Knight , Connor David Graham , Shengkai Wu , I-Ting Liu , Steven Jon Falkenburg
IPC: G06F21/46 , G06F3/0482 , G06F3/04886 , G06F21/31
Abstract: In accordance with some embodiments, the method includes: detecting, via the one or more input devices, a request to display information for password protected accounts; and, in response to detecting the request, concurrently displaying, on the display device: a representation of a first password protected account that is associated with a credential having one or more security issues, wherein the representation of the first password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the first password protected account; and a representation of a second password protected account that is associated with a credential having one or more security issues, wherein the representation of the second password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the second password protected account.
-
公开(公告)号:US11438322B2
公开(公告)日:2022-09-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11176237B2
公开(公告)日:2021-11-16
申请号:US15996413
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Wade Benson , Alexander R. Ledwith , Marc J. Krochmal , John J. Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra , Libor Sykora
Abstract: In some embodiments, a first device performs ranging operations to allow a user to access the first device under one of several user accounts without providing device-access credentials. For example, when a second device is within a first distance of the first device, the first device determines that the second device is associated with a first user account under which a user can access (e.g., can log into) the first device. In response to the determination, the first device enables at least one substitute interaction (e.g., a password-less UI interaction) to allow the first device to be accessed without receiving access credentials through a user interface. In response to detecting an occurrence of the substitute interaction, the user is allowed to access the first device under the first user account. In some embodiments, the substitute interaction occurs while the first device is logged into under a second user account.
-
公开(公告)号:US10936358B2
公开(公告)日:2021-03-02
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-Man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F1/3212 , G06F11/34 , G06F11/30 , H04M1/725
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US20190317800A1
公开(公告)日:2019-10-17
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F11/34 , G06F1/3212
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US10165391B2
公开(公告)日:2018-12-25
申请号:US15369785
申请日:2016-12-05
Applicant: APPLE INC.
Inventor: Marc J. Krochmal , Christopher S. Linn , John J. Iarocci , Geoffrey G. Stahl , Jaques P. Gasselin de Richebourg , Alexander R. Ledwith
Abstract: The described embodiments augment an activity performed in a first application at a source electronic device using a controller at a companion electronic device. The source electronic device receives controller information describing a controller that the activity performed in the first application accepts controller data from, determines a controller identifier for the controller information, and broadcasts a controller advertisement comprising the controller identifier. Upon receiving the controller advertisement, the companion electronic device determines whether a second application that can provide the controller data is available at the companion electronic device. If the second application is available, the companion electronic device establishes a cooperative-activity communication channel with the source electronic device. The companion electronic device uses the cooperative-activity communication channel to provide controller data to the source electronic device. The source electronic device provides the controller data to the first application to cause a corresponding action to be performed.
-
-
-
-
-
-
-
-
-