-
公开(公告)号:US20210026437A1
公开(公告)日:2021-01-28
申请号:US17068788
申请日:2020-10-12
Applicant: Apple Inc.
Inventor: Varaprasad V. LINGUTLA , Kartik R. VENKATRAMAN , Cyril de la CROPTE de CHANTERAC , Bob BRADLEY , Marc J. KROCHMAL , Matthew D. PERKINS , Christopher S. LINN , Akshay MANGALAM SRIVATSA
IPC: G06F1/3287 , G06F1/3296 , H04B17/318 , G06F1/3209 , G06F1/3215
Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to immediately enter either a low-power sleep state or a high-power sleep state.
-
公开(公告)号:US20200382950A1
公开(公告)日:2020-12-03
申请号:US16428652
申请日:2019-05-31
Applicant: Apple Inc.
Inventor: Natalia A. FORNSHELL , Aarti KUMAR , Robert D. WATSON , Ariane COTTE , Bob BRADLEY , Marc J. KROCHMAL , Kang SUN , Chen GANIR , Sarang S. RANADE , Akshay MANGALAM SRIVATSA
Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
-
公开(公告)号:US20190171465A1
公开(公告)日:2019-06-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade BENSON , Marc J. KROCHMAL , Alexander R. LEDWITH , John IAROCCI , Jerrold V. HAUCK , Michael BROUWER , Mitchell D. ADLER , Yannick L. SIERRA
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US20180348849A1
公开(公告)日:2018-12-06
申请号:US15720783
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Varaprasad V. LINGUTLA , Kartik R. VENKATRAMAN , Cyril de la CROPTE de CHANTERAC , Bob BRADLEY , Marc J. KROCHMAL , Matthew D. PERKINS , Christopher S. LINN , Akshay MANGALAM SRIVATSA
IPC: G06F1/32 , H04B17/318
CPC classification number: G06F1/3287 , G06F1/3209 , G06F1/3215 , G06F1/3296 , H04B17/318 , H04W4/023 , H04W4/80
Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to immediately enter either a low-power sleep state or a high-power sleep state.
-
公开(公告)号:US20180348844A1
公开(公告)日:2018-12-06
申请号:US15996372
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Varaprasad V. LINGUTLA , Kartik R. VENKATRAMAN , Marc J. KROCHMAL
IPC: G06F1/32
Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to enter either a low-power sleep state or a high-power sleep state.
-
公开(公告)号:US20180337785A1
公开(公告)日:2018-11-22
申请号:US15721133
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Alexander D. SANCIANGCO , Bob BRADLEY , Marc J. KROCHMAL , Nathan A. KRALIAN , Welly KASTEN , Patrick L. COFFMAN
CPC classification number: H04L9/3226 , H04B17/318 , H04L9/14 , H04L63/06 , H04L63/083 , H04L63/10 , H04L2209/80 , H04W12/06 , H04W12/08
Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
-
公开(公告)号:US20180206122A1
公开(公告)日:2018-07-19
申请号:US15805034
申请日:2017-11-06
Applicant: Apple Inc.
Inventor: Bob BRADLEY , William M. BUMGARNER , Vijay SUNDARAM , Marc J. KROCHMAL
Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
-
-
-
-
-
-