-
公开(公告)号:US10050960B1
公开(公告)日:2018-08-14
申请号:US15245530
申请日:2016-08-24
Applicant: Google LLC
Inventor: Alexei Czeskis , Dirk Balfanz
Abstract: A method of adding a user account to an unassociated device may include detecting, by an associated device that is associated with a user account, an audio signal broadcast by an unassociated device that is not associated with the user account, where the audio signal includes a token. The method may include sending the token to a computing device associated with a service provider of the user account, receiving, by the associated device, a command, determining that the received command is an authorization command, and in response to determining that the received command is an authorization command, sending one or more authorization instructions to the computing device. The one or more authorization instructions may instruct the computing device to send one or more credentials associated with the user.
-
2.
公开(公告)号:US10402294B1
公开(公告)日:2019-09-03
申请号:US14309176
申请日:2014-06-19
Applicant: Google LLC
Inventor: Alexei Czeskis , Michal Levin , Josh Woodward , Nishit Shah
IPC: G06F11/30
Abstract: In an embodiment, a method of differentiating between at least two peripheral electronic devices may include, by a primary electronic device, receiving a request from a user to identify a desired peripheral electronic device associated with the user, identifying a plurality of peripheral electronic devices associated with the user, receiving an image associated with each of the identified peripheral electronic devices, displaying one or more of the received images, receiving a selection of one of the displayed images, identifying the peripheral electronic device associated with the selected displayed image as the desired peripheral electronic device, and causing one or more settings of the desired peripheral electronic device to be changed.
-
公开(公告)号:US20180131683A1
公开(公告)日:2018-05-10
申请号:US15862578
申请日:2018-01-04
Applicant: GOOGLE LLC
Inventor: Joshua Woodward , Jay Pierre Civelli , Dirk Balfanz , Marco Fucci , Alexei Czeskis , Nishit Shah , Kan Liu , Michal Levin
Abstract: The subject technology provides for detecting, by a first computing device, a second computing device being within a predetermined distance of the first computing device, the first computing device being in a locked mode. The subject technology receives an access key from the second computing device. Additionally, the subject technology exits, by the first computing device, the locked mode based on the access key from the second computing device.
-
-