-
公开(公告)号:US11720504B2
公开(公告)日:2023-08-08
申请号:US17231635
申请日:2021-04-15
Applicant: Apple Inc.
Inventor: Venkateswara Rao Manepalli , Amit Gulia , Andrei Tudorancea , Dominic Spill , Jesus A. Gutierrez Gomez , Kahraman D. Akdemir , Aaron M. Sigel , William K. Estes , Kyle C. Brogle
IPC: G06F12/14 , G06F21/79 , H04L12/24 , H04L15/16 , G06F21/00 , G06F21/44 , G06F9/455 , H04L29/06 , G06F13/38 , H04L9/08 , H04L41/12
CPC classification number: G06F12/1491 , G06F12/145 , G06F21/79 , H04L41/12 , G06F2212/1052 , G06F2212/154
Abstract: Some aspects of this disclosure relate to implementing a thread device that can associate with a thread network. The thread device includes a network processor, a first memory, and a host processor communicatively coupled to the network processor and the first memory. The first memory can be a nonvolatile memory with a first level security protection, and configured to store a first dataset including thread network parameters for the network processor to manage network functions for the thread device associated with the thread network. The network processor can be coupled to a second memory to store a second dataset having a same content as the first dataset. The network processor is configured to manage the network functions based on the second dataset. The second memory can be a volatile memory with a second level security protection that is less than the first level security protection.
-
公开(公告)号:US11374937B2
公开(公告)日:2022-06-28
申请号:US16147686
申请日:2018-09-29
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Alexander D. Sanciangco , Brent M. Ledvina , Chelsea E. Pugh , Kyle C. Brogle , Marc J. Krochmal , Maureen G. Daum , Reza Abbasian , Richard J. Mondello , Jacob S. Klapper
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:US20200336897A1
公开(公告)日:2020-10-22
申请号:US16835057
申请日:2020-03-30
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Yannick L. Sierra , Kyle C. Brogle , Steven Andrew Myers
Abstract: Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.
-
公开(公告)号:US12210603B2
公开(公告)日:2025-01-28
申请号:US17685039
申请日:2022-03-02
Applicant: Apple Inc.
Inventor: Jiaying Deng , Benjamin Biron , Kyle C. Brogle , Tomislav Suchan
Abstract: The present disclosure generally relates to enrolling a biometric feature for use with a peripheral device. While a computer system is connected to an external device, the computer system receives a first request to enroll a biometric feature. In response to receiving the request and in accordance with a determination that the request satisfies a first set of one or more criteria, the computer system displays a user interface object prompting a user to provide an authorization input to one or more input devices physically connected to the computer system. While displaying the first user interface object, the computer system receives user input. In response to receiving the user input and in accordance with a determination that the user input includes the authentication input, the computer system initiates a process to enroll the biometric feature using a biometric sensor that is integrated with the external device.
-
公开(公告)号:US12089050B2
公开(公告)日:2024-09-10
申请号:US18145793
申请日:2022-12-22
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Yannick L. Sierra , Kyle C. Brogle , Steven Andrew Myers
IPC: H04W12/50 , H04L9/08 , H04L9/32 , H04W4/02 , H04W12/037 , H04W12/06 , H04W12/37 , H04W12/64 , H04W76/14 , H04W4/80
CPC classification number: H04W12/50 , H04L9/0866 , H04L9/32 , H04W4/023 , H04W12/037 , H04W12/06 , H04W12/64 , H04W76/14 , H04W4/80
Abstract: Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.
-
公开(公告)号:US11876806B2
公开(公告)日:2024-01-16
申请号:US17808799
申请日:2022-06-24
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Alexander D. Sanciangco , Brent M. Ledvina , Chelsea E. Pugh , Kyle C. Brogle , Marc J. Krochmal , Maureen G. Daum , Reza Abbasian , Richard J. Mondello , Jacob S. Klapper
CPC classification number: H04L63/107 , G06F21/43 , G06F21/45 , H04W4/80
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:US20230147041A1
公开(公告)日:2023-05-11
申请号:US18145793
申请日:2022-12-22
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Yannick L. Sierra , Kyle C. Brogle , Steven Andrew Myers
IPC: H04W12/50 , H04W76/14 , H04W12/037
CPC classification number: H04W12/50 , H04W76/14 , H04W12/037
Abstract: Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.
-
公开(公告)号:US11568039B2
公开(公告)日:2023-01-31
申请号:US16146567
申请日:2018-09-28
Applicant: Apple Inc.
Inventor: Reza Abbasian , Richard J. Mondello , David P. Quesada , Kyle C. Brogle , Patrick L. Coffman
Abstract: Techniques are disclosed relating to credential managers. In some embodiments, a computing device maintains a credential manager that stores, in a protected manner, a set of credentials for authenticating a user and metadata about the credentials. The computing device stores an instance of the metadata externally to the credential manager. The computing device uses the externally stored metadata to determine whether the set of credentials includes a particular credential associated with a service and, in response to determining that the set of credentials includes the particular credential, displays an indication of the particular credential. In some embodiments, the computing device receives a selection of the displayed indication by the user and, in response to the selection, sends a request for the particular credential to the credential manager.
-
公开(公告)号:US20230008448A1
公开(公告)日:2023-01-12
申请号:US17808799
申请日:2022-06-24
Applicant: Apple Inc.
Inventor: Conrad A. Shultz , Alexander D. Sanciangco , Brent M. Ledvina , Chelsea E. Pugh , Kyle C. Brogle , Marc J. Krochmal , Maureen G. Daum , Reza Abbasian , Richard J. Mondello , Jacob S. Klapper
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:US20200267552A1
公开(公告)日:2020-08-20
申请号:US16789990
申请日:2020-02-13
Applicant: Apple Inc.
Inventor: Wayne A. Lee , Zaka Ur Rehman Ashraf , Daniel R. Borges , Kyle C. Brogle , Srinivas Rama , Benjamin S. Turner , Hung Q. Le , Devin E. Gund , Keith W. Rauenbuehler , Praveen Chegondi
Abstract: A controller device within a home network (or any suitable network) can be configured to manage network access tokens for various accessory devices within the home network. These network access tokens can be used by the accessory devices to access the home network without needing the network owner's network password. The network access tokens can be revocable and/or for a limited time. The controller device can generate the network access tokens, and can provide them to the accessory devices (or other user devices) as well as to an access device on the home network. Once the access device is provisioned with the accessory device's network access token, the router can control whether the accessory device is to be granted access to the home network and for how long.
-
-
-
-
-
-
-
-
-