-
公开(公告)号:US12113784B2
公开(公告)日:2024-10-08
申请号:US18107982
申请日:2023-02-09
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L Sierra
IPC: H04L9/08 , G06F9/445 , H04L9/14 , H04L9/32 , H04L9/40 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086
CPC classification number: H04L63/08 , G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086 , H04L2209/80
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11438322B2
公开(公告)日:2022-09-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US10936358B2
公开(公告)日:2021-03-02
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-Man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F1/3212 , G06F11/34 , G06F11/30 , H04M1/725
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US20190317800A1
公开(公告)日:2019-10-17
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F11/34 , G06F1/3212
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US20140365673A1
公开(公告)日:2014-12-11
申请号:US13913113
申请日:2013-06-07
Applicant: Apple Inc.
Inventor: Amit K. Vyas , Joshua V. Graessley , John Iarocci , Darren Litzinger , Andrew C. Lam , Ray Ling Chang , Steven Douglas Parker , Justin Wood , Matthew Scott Klahn , Daniel B. Pollack
IPC: H04L29/06
CPC classification number: H04L65/1069 , H04L67/141 , H04W76/10
Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract translation: 在一些实现中,网络守护进程可以管理对移动设备的网络接口的访问。 网络守护进程(例如,网络连接管理进程)可以在一个或多个接口上监视移动设备的网络连接的状况。 网络守护程序可以监控移动设备上的许多条件。 网络守护进程可以从指定用于启动网络连接的标准的网络客户端(例如,进程,应用程序)接收后台网络请求。 网络守护进程可以根据客户端请求中接收到的网络条件,移动设备条件和/或客户端标准来智能地管理网络连接。 这可以帮助减少电池寿命的影响,内存使用情况,呼叫丢失的可能性,数据使用成本以及网络运营商的负担。
-
公开(公告)号:US11178127B2
公开(公告)日:2021-11-16
申请号:US15497203
申请日:2017-04-26
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: H04W12/08 , H04L29/06 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11582215B2
公开(公告)日:2023-02-14
申请号:US15275203
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11329827B2
公开(公告)日:2022-05-10
申请号:US15286505
申请日:2016-10-05
Applicant: Apple Inc.
Inventor: Conrad Sauerwald , Alexander Ledwith , John Iarocci , Marc J. Krochmal , Wade Benson , Gregory Novick , Noah Witherspoon
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:US10187430B2
公开(公告)日:2019-01-22
申请号:US13913113
申请日:2013-06-07
Applicant: Apple Inc.
Inventor: Amit K. Vyas , Joshua V. Graessley , John Iarocci , Darren Litzinger , Andrew C. Lam , Ray Ling Chang , Steven Douglas Parker , Justin Wood , Matthew Scott Klahn , Daniel B. Pollack
IPC: G06F15/177 , G06F15/16 , H04L29/06 , H04W76/10 , H04L29/08
Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
-
公开(公告)号:US09294359B2
公开(公告)日:2016-03-22
申请号:US13645415
申请日:2012-10-04
Applicant: Apple Inc.
Inventor: Pavel Cisler , Yan Arrouye , John Iarocci , Marc Jason Krochmal , Christopher Brooke Sharp , Christopher Scott Linn , Mikhail Gonodanov , Simon P. Cooper , Richard Murphy
CPC classification number: H04L41/22 , G06F17/30126 , G06F17/30197 , G06F21/33
Abstract: This disclosure relates to methods and systems to allow, in one embodiment, automatic access from one system to other systems which include an operating system that includes a user login process. In one embodiment, a method includes logging into, automatically in response to starting a first data processing system, a second data processing system at least as a guest user of the second data processing system which has a storage volume storing data and displaying a user interface object on a display device of the first data processing system, the user interface object corresponding to at least one of the second data processing system and the storage volume to allow at least one of a search to be performed or a browsing to be performed of the data stored on the storage volume.
Abstract translation: 本公开涉及在一个实施例中允许从一个系统到包括包括用户登录过程的操作系统的其他系统的自动访问的方法和系统。 在一个实施例中,一种方法包括:响应于启动第一数据处理系统自动登录第二数据处理系统,至少作为具有存储数据的存储卷并显示用户界面的第二数据处理系统的访客用户 对象在第一数据处理系统的显示装置上,所述用户界面对象对应于所述第二数据处理系统和所述存储卷中的至少一个,以允许对所述第二数据处理系统和所述存储卷中的至少一个执行搜索或执行所述浏览 存储在存储卷上的数据。
-
-
-
-
-
-
-
-
-