-
公开(公告)号:US09900767B2
公开(公告)日:2018-02-20
申请号:US15599088
申请日:2017-05-18
Applicant: Apple Inc.
Inventor: Tyler Hawkins , Christopher Wilson , Conrad Sauerwald , Gregory Novick , Neil G. Crane , Rudolph Van Der Merwe , Samuel Noble , Paul William Chinn
Abstract: A method of establishing communications with a first device is disclosed. The method includes: the first device presenting connection information to a second device; receiving a response from a second device; establishing an association with the second device; transmitting, in response to a determination that the first device and the second device are connected for data, first data to the second device, the first data comprising addressing information for a server; receiving second data from the second device, the second data comprising second information for establishing communications with the first device; and configuring the first device to receive third data from a location remote to the first device using the second information from the second data.
-
公开(公告)号:US12177207B2
公开(公告)日:2024-12-24
申请号:US17356487
申请日:2021-06-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US11050737B2
公开(公告)日:2021-06-29
申请号:US16579712
申请日:2019-09-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US10349270B2
公开(公告)日:2019-07-09
申请号:US16024370
申请日:2018-06-29
Applicant: Apple Inc.
Inventor: Tyler Hawkins , Christopher Wilson , Conrad Sauerwald , Gregory Novick , Neil G. Crane , Rudolph Van Der Merwe , Samuel Noble , Paul William Chinn
Abstract: A method of establishing communications with a first device is disclosed. The method includes: the first device presenting connection information to a second device; receiving a response from a second device; establishing an association with the second device; transmitting, in response to a determination that the first device and the second device are connected for data, first data to the second device, the first data comprising addressing information for a server; receiving second data from the second device, the second data comprising second information for establishing communications with the first device; and configuring the first device to receive third data from a location remote to the first device using the second information from the second data.
-
公开(公告)号:US10015668B2
公开(公告)日:2018-07-03
申请号:US15872801
申请日:2018-01-16
Applicant: Apple Inc.
Inventor: Tyler Hawkins , Christopher Wilson , Conrad Sauerwald , Gregory Novick , Neil G. Crane , Rudolph Van Der Merwe , Samuel Noble , Paul William Chinn
CPC classification number: H04W8/265 , G06K7/1447 , H04W4/80 , H04W8/005 , H04W8/18 , H04W12/0023 , H04W12/003 , H04W12/04
Abstract: A method of establishing communications with a first device is disclosed. The method includes: the first device presenting connection information to a second device; receiving a response from a second device; establishing an association with the second device; transmitting, in response to a determination that the first device and the second device are connected for data, first data to the second device, the first data comprising addressing information for a server; receiving second data from the second device, the second data comprising second information for establishing communications with the first device; and configuring the first device to receive third data from a location remote to the first device using the second information from the second data.
-
公开(公告)号:USRE49044E1
公开(公告)日:2022-04-19
申请号:US16147348
申请日:2018-09-28
Applicant: Apple Inc.
Inventor: Alex Nelson , Cedric Bray , Thomas Goossens , Rudolph Van Der Merwe , Richard E. Crandall , Bertrand Serlet
IPC: G06K9/00 , H04N21/442
Abstract: A three-dimensional (“3D”) avatar can be automatically created that resembles the physical appearance of an individual captured in one or more input images or video frames. The avatar can be further customized by the individual in an editing environment and used in various applications, including but not limited to gaming, social networking and video conferencing.
-
公开(公告)号:US10432614B2
公开(公告)日:2019-10-01
申请号:US15721301
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US09661495B2
公开(公告)日:2017-05-23
申请号:US14474716
申请日:2014-09-02
Applicant: Apple Inc.
Inventor: Tyler Hawkins , Christopher Wilson , Conrad Sauerwald , Gregory Novick , Neil G. Crane , Rudolph Van Der Merwe , Samuel Noble , Paul William Chinn
Abstract: A method of activating a first device is disclosed. The method includes: the first device pairing with a second device; receiving a connection request from a second device; connecting to the second device; opening a communication channel to the second device; transmitting an activation package to the second device; receiving an activation payload from the second device; and performing an activation using information from the activation payload.
-
-
-
-
-
-
-