Protocol for managing a controllable power adapter accessory
    1.
    发明授权
    Protocol for managing a controllable power adapter accessory 有权
    用于管理可控电源适配器附件的协议

    公开(公告)号:US09588563B2

    公开(公告)日:2017-03-07

    申请号:US14669857

    申请日:2015-03-26

    Applicant: Apple Inc.

    Abstract: A host device can manage a controllable power adapter accessory using a communication protocol. Based on information provided by the controllable power adapter accessory as to its power capabilities and the power needs and preferences of the host device, the host device can determine a desired power profile and request power from the accessory conforming to the desired profile. The desired power profile can also depend in part on the power-carrying capability of one or more cables connected between the host device and the accessory. In some instances, the host device and controllable power adapter accessory can be connected via an intermediary accessory that can siphon power from the controllable power adapter accessory, and the host device can manage the power siphoning behavior of the intermediary accessory using the communication protocol.

    Abstract translation: 主机设备可以使用通信协议管理可控电源适配器附件。 基于由可控电力适配器附件提供的关于其功率能力和主机设备的功率需求和偏好的信息,主机设备可以根据期望的配置文件确定期望的功率分布和请求功率。 期望的功率分布也可以部分地取决于连接在主机设备和附件之间的一个或多个电缆的功率承载能力。 在一些情况下,主机设备和可控电源适配器附件可以经由可从可控电源适配器附件虹吸电力的中间附件连接,并且主机设备可以使用通信协议来管理中间配件的功率虹吸行为。

    PRIVACY ENHANCEMENTS FOR WIRELESS DEVICES
    2.
    发明申请
    PRIVACY ENHANCEMENTS FOR WIRELESS DEVICES 审中-公开
    无线设备的隐私增强

    公开(公告)号:US20170034215A1

    公开(公告)日:2017-02-02

    申请号:US14933709

    申请日:2015-11-05

    Applicant: Apple Inc.

    Abstract: A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include network access information for a wireless network (e.g., SSID and password) and a usage policy specifying conditions under which the wireless device should search for the wireless network (e.g., temporal and/or spatial conditions). The wireless device can implement the usage policy by searching for the wireless network only when the conditions are satisfied. In some instances, the network access information can include instructions for dynamically generating time-varying network access information, and the wireless device can use the instructions to generate network access information during a search for wireless networks.

    Abstract translation: 无线设备可以从作为证书源操作的另一设备获得网络信息记录。 网络信息记录可以包括无线网络的网络接入信息(例如,SSID和密码)以及指定无线设备应该搜索无线网络的条件的使用策略(例如,时间和/或空间条件)。 无线设备只有满足条件时才能通过搜索无线网络实现使用策略。 在一些情况下,网络接入信息可以包括用于动态生成时变网络接入信息的指令,并且无线设备可以在搜索无线网络期间使用该指令来生成网络接入信息。

    COMMUNICATION BETWEEN HOST AND ACCESSORY DEVICES USING ACCESSORY PROTOCOLS VIA WIRELESS TRANSPORT
    3.
    发明申请
    COMMUNICATION BETWEEN HOST AND ACCESSORY DEVICES USING ACCESSORY PROTOCOLS VIA WIRELESS TRANSPORT 有权
    通过无线传输使用附件协议的主机和附件设备之间的通信

    公开(公告)号:US20140365694A1

    公开(公告)日:2014-12-11

    申请号:US14296302

    申请日:2014-06-04

    Applicant: Apple Inc.

    Abstract: An accessory can communicate wirelessly with a host device such as a portable electronic device. Existing accessory protocols developed for wired communication can be used without modification, and a wireless network connecting the two devices can provide a transport or channel connecting the two devices. Establishing a wireless channel can involve the active participation of both devices. For instance, the host device can create and identify virtual port to be used by the accessory, after which the accessory can initiate communication on that virtual port. A host device can be configured to automatically connect to certain accessories upon detection of that accessory on a wireless network under various specific conditions. Encryption of accessory-protocol communications between an accessory and a host device is also provided.

    Abstract translation: 附件可以与诸如便携式电子设备的主机设备进行无线通信。 可以使用现有的用于有线通信的附件协议,而无需修改,并且连接两个设备的无线网络可以提供连接两个设备的传输或信道。 建立无线频道可能涉及两台设备的积极参与。 例如,主机设备可以创建和识别要由附件使用的虚拟端口,之后配件可以启动该虚拟端口上的通信。 可以将主机设备配置为在各种特定条件下在无线网络上检测到该附件时自动连接到某些附件。 还提供了附件和主机之间的附件协议通信的加密。

    SELECTING INFORMATIVE PRESENTATIONS BASED ON NAVIGATION CUES AND USER INTENT
    4.
    发明申请
    SELECTING INFORMATIVE PRESENTATIONS BASED ON NAVIGATION CUES AND USER INTENT 审中-公开
    基于导航和用户信息选​​择信息呈现

    公开(公告)号:US20140180820A1

    公开(公告)日:2014-06-26

    申请号:US14109773

    申请日:2013-12-17

    Applicant: APPLE INC.

    Abstract: Promotional or informational materials are selected for presentation to mobile device users based at least in part on knowledge about where those users intend to go. If a user performs a points-of-interest search that evinces a particular intent, then the mobile device can select informational materials that are associated with that particular intent, and then display those informational materials. The informational materials selected can be limited to those that are mapped to a point of interest that the searching user selected from a list of points of interest that are relevant to the user's specified intent. Additionally or alternatively, the mobile device might display only the informational materials that are mapped to a particular point of interest in response to detecting that the user has entered within a specified proximity of that particular point of interest, as determined through a global positioning system of the user's mobile device.

    Abstract translation: 至少部分地基于关于这些用户打算去哪里的知识选择促销或信息材料来呈现给移动设备用户。 如果用户执行表示特定意图的兴趣点搜索,则移动设备可以选择与该特定意图相关联的信息材料,然后显示这些信息材料。 所选择的信息材料可以限于映射到搜索用户从与用户指定意图相关的兴趣点列表中选择的兴趣点的那些。 另外或替代地,移动设备可以仅显示映射到特定兴趣点的信息材料,以响应于检测到用户已经在该特定兴趣点的指定接近度内输入,如通过全球定位系统 用户的移动设备。

    Privacy enhancements for wireless devices

    公开(公告)号:US10587654B2

    公开(公告)日:2020-03-10

    申请号:US16048934

    申请日:2018-07-30

    Applicant: Apple Inc.

    Abstract: A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include network access information for a wireless network (e.g., SSID and password) and a usage policy specifying conditions under which the wireless device should search for the wireless network (e.g., temporal and/or spatial conditions). The wireless device can implement the usage policy by searching for the wireless network only when the conditions are satisfied. In some instances, the network access information can include instructions for dynamically generating time-varying network access information, and the wireless device can use the instructions to generate network access information during a search for wireless networks.

    Privacy enhancements for wireless devices

    公开(公告)号:US10051003B2

    公开(公告)日:2018-08-14

    申请号:US14933709

    申请日:2015-11-05

    Applicant: Apple Inc.

    Abstract: A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include network access information for a wireless network (e.g., SSID and password) and a usage policy specifying conditions under which the wireless device should search for the wireless network (e.g., temporal and/or spatial conditions). The wireless device can implement the usage policy by searching for the wireless network only when the conditions are satisfied. In some instances, the network access information can include instructions for dynamically generating time-varying network access information, and the wireless device can use the instructions to generate network access information during a search for wireless networks.

    PRIVACY ENHANCEMENTS FOR WIRELESS DEVICES
    9.
    发明申请

    公开(公告)号:US20180337956A1

    公开(公告)日:2018-11-22

    申请号:US16048934

    申请日:2018-07-30

    Applicant: Apple Inc.

    Abstract: A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include network access information for a wireless network (e.g., SSID and password) and a usage policy specifying conditions under which the wireless device should search for the wireless network (e.g., temporal and/or spatial conditions). The wireless device can implement the usage policy by searching for the wireless network only when the conditions are satisfied. In some instances, the network access information can include instructions for dynamically generating time-varying network access information, and the wireless device can use the instructions to generate network access information during a search for wireless networks.

Patent Agency Ranking