-
公开(公告)号:US12207283B2
公开(公告)日:2025-01-21
申请号:US18669298
申请日:2024-05-20
Applicant: Apple Inc.
Inventor: Madhusudan Chaudhary , Arun G. Mathias , Rajesh Ambati , Ajay Singh , Franco Travostino , Muthukumaran Dhanapal , Lakshmi N. Kavuri , Ajoy K. Singh , Thanigaivelu Elangovan , Ioannis Pefkianakis , Raghuveer Mallikarjunan , Faraz Faheem , Geoffrey R. Hall , Harshit Chuttani , Rohan C. Malthankar , Prashant H. Vashi , Hisham A. Mahmoud , Henri S. Berger , Divyaprakash P. Bhojkumar
IPC: H04W72/51 , H04L65/61 , H04W52/02 , H04W72/0453
Abstract: Embodiments described herein relate to managing access to 5G cellular baseband resources for 5G-capable wireless devices. A wireless device can monitor application workloads by analyzing communication network performance requirements for a given application in-use or launching for future use along with system-level indications of overall device usage, battery level, and mobility status to determine whether access to 5G cellular baseband resources is recommended for an application. A 5G cellular baseband resource recommendation is provided for an application indicating a level of bandwidth in current use or expected for future use as well as a confidence metric in the bandwidth level indication. The 5G cellular baseband resource recommendation is used with additional device criteria to determine whether access to one or more 5G radio frequency bands is allowed.
-
2.
公开(公告)号:US11553561B2
公开(公告)日:2023-01-10
申请号:US17074549
申请日:2020-10-19
Applicant: Apple Inc.
Inventor: Rohan C. Malthankar , Paresh B. Sawant , Delziel J. Fernandes , Sergey Sitnikov , Arun G. Mathias , Jason A. Novak , Krisztian Kiss , Rafael L. Rivera-Barreto , Chandiramohan Vasudevan , Vladimir M. Appel
IPC: H04W88/06 , H04W12/06 , H04W76/12 , H04W12/037 , H04W12/0471 , H04W84/12 , H04L101/654
Abstract: This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
-
公开(公告)号:US20220360748A1
公开(公告)日:2022-11-10
申请号:US17874095
申请日:2022-07-26
Applicant: APPLE INC.
Inventor: Cyrus D. Irani , Kevin P. McLaughlin , Anush G. Nadathur , Arun G. Mathias , Vinay A. Ramaswamy , Christopher D. Soli , Patrick L. Coffman , Stephen O. Lemay
IPC: H04N7/18 , H04L67/125 , H04L12/28 , H04L65/61 , G07C9/00 , G08B21/18 , H04N5/232 , H04N5/77 , H04W76/11 , H04L43/0864 , H04L47/283 , H04L65/1069 , H04L67/141 , H04L67/146 , G06F3/048
Abstract: An integrated accessory control system can integrate functionality (services) of multiple disparate accessories and provide a unified user interface for interacting with the system via a controller device. An integrated accessory control system can include one accessory that can detect an event or action and send a notification to the controller device and at least one other accessory, such as an Internet Protocol (IP) camera, that can be operated in response to the notification. In response to the notification, a controller device can generate an integrated user interface for interacting with the accessories in the integrated accessory control system. The interface can include a live feed from the IP camera, which can provide a media stream responsive to instructions from the controller.
-
公开(公告)号:US11385603B2
公开(公告)日:2022-07-12
申请号:US16594473
申请日:2019-10-07
Applicant: Apple Inc.
Inventor: Lukas M. Marti , Robert W. Mayor , Arun G. Mathias , Ronald Keryuan Huang
Abstract: An automated environment can include an accessory device that operates according to an automation rule, to take a prescribed action when a triggering condition occurs. A controller device for the automated environment can determine a user's regular routine and can detect when the user is deviating from the regular routine. The controller device can communicate with accessory devices in the automated environment to modify their behavior relative to the automation rules.
-
公开(公告)号:US11374926B2
公开(公告)日:2022-06-28
申请号:US16780621
申请日:2020-02-03
Applicant: Apple Inc.
Inventor: Li Li , Yousuf H. Vaid , Christopher B. Sharp , Arun G. Mathias , David T. Haggerty , Jerrold Von Hauck
IPC: H04L29/06 , H04L9/40 , H04B1/3816 , H04B1/3827 , H04L41/0806 , H04W8/18 , H04W8/20 , H04W12/06 , H04W12/069
Abstract: Representative embodiments described herein set forth techniques for optimizing large-scale deliveries of electronic Subscriber Identity Modules (eSIMs) to mobile devices. Specifically, instead of generating and assigning eSIMs when mobile devices are being activated—which can require significant processing overhead—eSIMs are pre-generated with a basic set of information, and are later-assigned to the mobile devices when they are activated. This can provide considerable benefits over conventional approaches that involve generating and assigning eSIMs during mobile device activation, especially when new mobile devices (e.g., smartphones, tablets, etc.) are being launched and a large number of eSIM assignment requests are to be fulfilled in an efficient manner.
-
6.
公开(公告)号:US20210037604A1
公开(公告)日:2021-02-04
申请号:US17074549
申请日:2020-10-19
Applicant: Apple Inc.
Inventor: Rohan C. Malthankar , Paresh B. Sawant , Delziel J. Fernandes , Sergey Sitnikov , Arun G. Mathias , Jason A. Novak , Krisztian Kiss , Rafael L. Rivera-Barreto , Chandiramohan Vasudevan , Vladimir M. Appel
Abstract: This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
-
公开(公告)号:US10785645B2
公开(公告)日:2020-09-22
申请号:US14868257
申请日:2015-09-28
Applicant: Apple Inc.
Inventor: Li Li , Jerrold Von Hauck , Arun G. Mathias
Abstract: Disclosed herein are different techniques for enabling a mobile device to dynamically support different authentication algorithms. A first technique involves configuring an eUICC included in the mobile device to implement various authentication algorithms that are utilized by MNOs (e.g., MNOs with which the mobile device can interact). Specifically, this technique involves the eUICC storing executable code for each of the various authentication algorithms. According to this technique, the eUICC is configured to manage at least one eSIM, where the eSIM includes (i) an identifier that corresponds to one of the various authentication algorithms implemented by the eUICC, and (ii) authentication parameters that are compatible with the authentication algorithm. A second technique involves configuring the eUICC to interface with an eSIM to extract (i) executable code for an authentication algorithm used by an MNO that corresponds to the eSIM, and (ii) authentication parameters that are compatible with the authentication algorithm.
-
公开(公告)号:US10764066B2
公开(公告)日:2020-09-01
申请号:US15598220
申请日:2017-05-17
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias
Abstract: Secure reception of a certificate revocation list (CRL) is determined. In some embodiments, a device initiates a CRL update by sending a message with a timestamp to an embedded universal integrated circuit card (eUICC). The eUICC generates a session identifier, nonce, or random number and builds a payload including an internal time value based on a server time, and an internal time value based on a past message received from the device. The eUICC cryptographically signs over the payload and sends it to the device. The device obtains a CRL from a host server, checks the CRL, and, if the CRL passes the device check, sends it to the eUICC along with a second device timestamp and the nonce. The eUICC then performs checks based on the timestamps, the nonce, the CRL and the internal time values to determine whether the CRL has been securely received.
-
公开(公告)号:US10681665B2
公开(公告)日:2020-06-09
申请号:US15995636
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Ajoy K. Singh , Rohan C. Malthankar , Arun G. Mathias
IPC: H04W72/04 , H04W60/04 , H04W60/06 , H04W76/30 , H04W88/04 , H04W76/10 , H04W76/23 , H04W48/16 , H04W76/14 , H04W8/18 , H04W76/38
Abstract: Methods and apparatus to enable and disable cellular services for one or more cellular capable secondary wireless devices associated with a primary wireless device are disclosed. The primary wireless device, in response to detecting a status change of an in use state of a cellular capable secondary wireless device can provide a notification to a network server of a wireless network to disable cellular wireless services for previously enabled cellular capable secondary wireless devices and to enable cellular wireless services for the cellular capable secondary wireless device. Control of cellular wireless services for cellular capable secondary wireless devices can be based on a combination of registration for services, activation and deactivation of eSIMs on the cellular capable secondary wireless devices, and/or changes to eSIM states or contexts maintained by the network server.
-
公开(公告)号:US10554487B2
公开(公告)日:2020-02-04
申请号:US15157332
申请日:2016-05-17
Applicant: Apple Inc.
Inventor: Li Li , Yousuf H. Vaid , Christopher B. Sharp , Arun G. Mathias , David T. Haggerty , Jerrold Von Hauck
IPC: H04L29/06 , H04L12/24 , H04B1/3816 , H04B1/3827
Abstract: Representative embodiments described herein set forth techniques for optimizing large-scale deliveries of electronic Subscriber Identity Modules (eSIMs) to mobile devices. Specifically, instead of generating and assigning eSIMs when mobile devices are being activated—which can require significant processing overhead—eSIMs are pre-generated with a basic set of information, and are later-assigned to the mobile devices when they are activated. This can provide considerable benefits over conventional approaches that involve generating and assigning eSIMs during mobile device activation, especially when new mobile devices (e.g., smartphones, tablets, etc.) are being launched and a large number of eSIM assignment requests are to be fulfilled in an efficient manner.
-
-
-
-
-
-
-
-
-