IDENTITY CREDENTIAL VERIFICATION TECHNIQUES
    1.
    发明申请

    公开(公告)号:US20190325125A1

    公开(公告)日:2019-10-24

    申请号:US16122321

    申请日:2018-09-05

    Applicant: Apple Inc.

    Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (e.g., via a short-range communications protocol such as iBeacon) by a first device from a second device. The credential may be associated with a second user of the second device. The first device may verify the credential and, if valid, an additional option to approve a secure communications channel may be presented at the first device. If the additional option is selected, a secure communications channel may be established between the first device and the second device.

    Many to many ranging techniques
    2.
    发明授权

    公开(公告)号:US11057743B2

    公开(公告)日:2021-07-06

    申请号:US16784022

    申请日:2020-02-06

    Applicant: Apple Inc.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. Ranging between multiple mobile devices can present challenges due to clock drift between the devices resulting in missed messages due to collisions between ranging messages. Techniques can be implemented to reduce the number of collisions by designating time slots for ranging sessions based on timing from a coordinator mobile device. Alternative techniques allow for splitting up channels at different time amount different pairs of devices. The ranging techniques can be used to share information between devices with a predefined distance for applications such as augmented reality.

    Identity credential verification techniques

    公开(公告)号:US10972459B2

    公开(公告)日:2021-04-06

    申请号:US16122329

    申请日:2018-09-05

    Applicant: Apple Inc.

    Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identity credential may be secured using biometric information associated with a user, the biometric information being obtained using a first biometric input method of a plurality of biometric input methods. When the user is later authenticated, the authentication may be based at least in part on determining that the user has selected a biometric input method that matches the biometric input method used to secure the credential as well as providing biometric information that matches the biometric information used to secure the identity credential.

    MANY TO MANY RANGING TECHNIQUES
    4.
    发明申请

    公开(公告)号:US20210076163A1

    公开(公告)日:2021-03-11

    申请号:US16784022

    申请日:2020-02-06

    Applicant: Apple Inc.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. Ranging between multiple mobile devices can present challenges due to clock drift between the devices resulting in missed messages due to collisions between ranging messages. Techniques can be implemented to reduce the number of collisions by designating time slots for ranging sessions based on timing from a coordinator mobile device. Alternative techniques allow for splitting up channels at different time amount different pairs of devices. The ranging techniques can be used to share information between devices with a predefined distance for applications such as augmented reality.

    PROXIMITY ESTIMATION FOR UNIVERSAL CONTROL
    5.
    发明公开

    公开(公告)号:US20230308994A1

    公开(公告)日:2023-09-28

    申请号:US17931842

    申请日:2022-09-13

    Applicant: APPLE INC.

    CPC classification number: H04W48/16 H04W28/26 H04W28/18

    Abstract: In some aspects a first electronic device may detect a triggering condition for enabling control of a second electronic device. Upon detection of the triggering condition, the method can include determining an increased rate of transmission of advertising signals of a wireless protocol transmitted from a wireless transceiver of the first electronic device. The method can include transmitting a plurality of advertising wireless signals at the increased rate using the wireless protocol. The method can include receiving, from the second electronic device, one or more responses to the advertising wireless signals. The method can include determining a distance measurement based on the one or more responses. Responsive to the distance measurement being less than a threshold value, the method can include enabling control of one or more components of the first electronic device or the second electronic device by the other device. Numerous other aspects are described.

    Many to many ranging techniques
    6.
    发明授权

    公开(公告)号:US11758364B2

    公开(公告)日:2023-09-12

    申请号:US17368215

    申请日:2021-07-06

    Applicant: APPLE INC.

    CPC classification number: H04W4/029 H04W4/023

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. Ranging between multiple mobile devices can present challenges due to clock drift between the devices resulting in missed messages due to collisions between ranging messages. Techniques can be implemented to reduce the number of collisions by designating time slots for ranging sessions based on timing from a coordinator mobile device. Alternative techniques allow for splitting up channels at different time amount different pairs of devices. The ranging techniques can be used to share information between devices with a predefined distance for applications such as augmented reality.

    MANY TO MANY RANGING TECHNIQUES
    7.
    发明申请

    公开(公告)号:US20210337360A1

    公开(公告)日:2021-10-28

    申请号:US17368215

    申请日:2021-07-06

    Applicant: APPLE INC.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. Ranging between multiple mobile devices can present challenges due to clock drift between the devices resulting in missed messages due to collisions between ranging messages. Techniques can be implemented to reduce the number of collisions by designating time slots for ranging sessions based on timing from a coordinator mobile device. Alternative techniques allow for splitting up channels at different time amount different pairs of devices. The ranging techniques can be used to share information between devices with a predefined distance for applications such as augmented reality.

    Identity credential verification techniques

    公开(公告)号:US11093597B2

    公开(公告)日:2021-08-17

    申请号:US16122321

    申请日:2018-09-05

    Applicant: Apple Inc.

    Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (e.g., via a short-range communications protocol such as iBeacon) by a first device from a second device. The credential may be associated with a second user of the second device. The first device may verify the credential and, if valid, an additional option to approve a secure communications channel may be presented at the first device. If the additional option is selected, a secure communications channel may be established between the first device and the second device.

    IDENTITY CREDENTIAL VERIFICATION TECHNIQUES
    9.
    发明申请

    公开(公告)号:US20190327228A1

    公开(公告)日:2019-10-24

    申请号:US16122329

    申请日:2018-09-05

    Applicant: Apple Inc.

    Abstract: Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identity credential may be secured using biometric information associated with a user, the biometric information being obtained using a first biometric input method of a plurality of biometric input methods. When the user is later authenticated, the authentication may be based at least in part on determining that the user has selected a biometric input method that matches the biometric input method used to secure the credential as well as providing biometric information that matches the biometric information used to secure the identity credential.

Patent Agency Ranking