-
公开(公告)号:US20240388917A1
公开(公告)日:2024-11-21
申请号:US18787965
申请日:2024-07-29
Applicant: Apple Inc.
Inventor: Natalia A. FORNSHELL , Aarti KUMAR , Akshay MANGALAM SRIVATSA , Ariane COTTE , Bob BRADLEY , Chen GANIR , Kang SUN , Marc J. KROCHMAL , Robert D. WATSON , Sarang S. RANADE
IPC: H04W12/50 , H04W4/80 , H04W12/041 , H04W12/0471 , H04W12/61 , H04W12/63
Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
-
公开(公告)号:US20240007863A1
公开(公告)日:2024-01-04
申请号:US18368543
申请日:2023-09-14
Applicant: Apple Inc.
Inventor: Natalia A. FORNSHELL , Aarti KUMAR , Robert D. WATSON , Ariane COTTE , Bob BRADLEY , Marc J. KROCHMAL , Kang SUN , Chen GANIR , Sarang S. RANADE , Akshay MANGALAM SRIVATSA
IPC: H04W12/50 , H04W4/80 , H04W12/041 , H04W12/61 , H04W12/63 , H04W12/0471
CPC classification number: H04W12/50 , H04W4/80 , H04W12/041 , H04W12/61 , H04W12/63 , H04W12/0471
Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
-
公开(公告)号:US20230300122A1
公开(公告)日:2023-09-21
申请号:US18107982
申请日:2023-02-09
Applicant: Apple Inc.
Inventor: Wade BENSON , Marc J. KROCHMAL , Alexander R. LEDWITH , John IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA
IPC: H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
CPC classification number: H04L63/08 , H04L63/107 , H04L63/1466 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/44505 , H04L63/06 , H04L63/083 , H04W12/06 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/108 , H04L2209/80
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20230289430A1
公开(公告)日:2023-09-14
申请号:US18320171
申请日:2023-05-18
Applicant: Apple Inc.
Inventor: Bob BRADLEY , William M. BUMGARNER , Vijay SUNDARAM , Marc J. KROCHMAL
IPC: G06F21/44 , G06F21/60 , H04W4/00 , H04L9/32 , H04W12/02 , H04W12/03 , H04W12/50 , H04W12/065 , H04W12/06 , H04W12/069 , H04W12/082 , H04W12/084 , H04L65/61 , H04W76/14 , H04L9/40
CPC classification number: G06F21/44 , G06F21/604 , H04W4/00 , H04L9/3247 , H04W12/02 , H04W12/03 , H04W12/50 , H04W12/065 , H04W12/068 , H04W12/069 , H04W12/082 , H04W12/084 , H04L65/61 , H04W76/14 , H04L9/32 , H04L63/0876 , H04L63/105 , H04W84/12
Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
-
公开(公告)号:US20220171451A1
公开(公告)日:2022-06-02
申请号:US17651532
申请日:2022-02-17
Applicant: Apple Inc.
Inventor: Varaprasad V. LINGUTLA , Kartik R. VENKATRAMAN , Marc J. KROCHMAL
IPC: G06F1/3231 , G06F1/3287 , G06F1/3209 , G06F1/3206
Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to enter either a low-power sleep state or a high-power sleep state.
-
16.
公开(公告)号:US20220007188A1
公开(公告)日:2022-01-06
申请号:US17446828
申请日:2021-09-02
Applicant: Apple Inc.
Inventor: Bob BRADLEY , Marc J. KROCHMAL
IPC: H04W12/06 , H04L29/06 , H04L9/32 , H04W8/00 , H04W12/062
Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
-
公开(公告)号:US20200380108A1
公开(公告)日:2020-12-03
申请号:US16888482
申请日:2020-05-29
Applicant: Apple Inc.
Inventor: Felipe Marin CYPRIANO , Marc J. KROCHMAL , Gokul P. THIRUMALAI , Bob BRADLEY , Dmitry V. BELOV
Abstract: A method and apparatus of a device that endorses a proximity authorization for an authorization requesting device is described. In an exemplary embodiment, the device receives a proximity authorization request from the authorization requesting device, wherein the authorization requesting device is in proximity with the authorization endorsing device. The device additionally presents a local authorization request to a user of the authorization endorsing device and receives a set of user credentials for the local authorization request. The device further performs a local authorization on the device using at least the set of user credentials. In addition, the device sends a server authorization request to an identity management server, receives an authorization response from the identity management server, and returns the authorization response.
-
公开(公告)号:US20250106636A1
公开(公告)日:2025-03-27
申请号:US18974673
申请日:2024-12-09
Applicant: Apple Inc.
Inventor: Natalia A. FORNSHELL , Aarti KUMAR , Robert D. WATSON , Ariane COTTE , Bob BRADLEY , Marc J. KROCHMAL , Kang SUN , Chen GANIR , Sarang S. RANADE , Akshay MANGALAM SRIVATSA
IPC: H04W12/50 , H04W4/80 , H04W12/041 , H04W12/0471 , H04W12/61 , H04W12/63
Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
-
公开(公告)号:US20210406886A1
公开(公告)日:2021-12-30
申请号:US17473993
申请日:2021-09-13
Applicant: Apple Inc.
Inventor: Bob BRADLEY , Marc J. KROCHMAL , William M. BUMGARNER , Vijay SUNDARAM , Margaret A. MOORE , Nicholas J. SHEARER , Brandon J. KIEFT
Abstract: A device in a payment transaction handoff system may include at least one processor configured to receive a request to perform a payment transaction and identify, using a first communication protocol, a respective device identifier of each of a plurality of proximate devices. The at least one processor is configured to select, based at least in part on a payment factor, a default payment device from the plurality of proximate devices. The at least one processor is configured to transmit, via a second communication protocol, a message to perform the payment transaction, the message comprising the device identifier of the default payment device. In one or more implementations, a first device of the plurality of proximate devices may be associated with a first user account and a second device of the plurality of proximate devices may be associated with a second user account, different from the first user account.
-
公开(公告)号:US20210081522A1
公开(公告)日:2021-03-18
申请号:US17103883
申请日:2020-11-24
Applicant: Apple Inc.
Inventor: Bob BRADLEY , William M. BUMGARNER , Vijay SUNDARAM , Marc J. KROCHMAL
IPC: G06F21/44 , G06F21/60 , H04W4/00 , H04W12/00 , H04L9/32 , H04W12/06 , H04W12/08 , H04W12/02 , H04W76/14 , H04L29/06
Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
-
-
-
-
-
-
-
-
-