-
公开(公告)号:US20210352512A1
公开(公告)日:2021-11-11
申请号:US17383321
申请日:2021-07-22
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US20200382981A1
公开(公告)日:2020-12-03
申请号:US16886524
申请日:2020-05-28
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US09681370B2
公开(公告)日:2017-06-13
申请号:US14311135
申请日:2014-06-20
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten
Abstract: A wireless device may automatically connect to a preferred wireless network, such as a preferred Wi-Fi network. The wireless device may order a plurality of wireless networks according to initial criteria, such as the time the wireless device last connected to each wireless network. Preference rules may then be applied to reorder the wireless networks. Each preference rule may be applied only if an associated score meets a threshold. A scan may be performed to determine which of the wireless networks are available for connection. The wireless device may automatically connect to the highest-ordered available wireless network. The scores associated with the preference rules may be modified in response to events that indicate a user preference for one or more of the wireless networks, such as manually switching from one network to another.
-
公开(公告)号:US11832100B2
公开(公告)日:2023-11-28
申请号:US15721133
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Alexander D. Sanciangco , Bob Bradley , Marc J. Krochmal , Nathan A. Kralian , Welly Kasten , Patrick L Coffman
IPC: H04W12/069 , H04L9/32 , H04B17/318 , H04L9/40 , H04W12/08 , H04L9/14 , H04W12/50 , H04W12/63 , H04W12/06 , H04B17/23 , H04W12/64 , H04B17/02
CPC classification number: H04W12/069 , H04B17/318 , H04L9/14 , H04L9/3226 , H04L63/06 , H04L63/083 , H04L63/10 , H04W12/068 , H04W12/08 , H04W12/50 , H04W12/63 , H04B17/02 , H04L2209/80 , H04W12/64
Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
-
公开(公告)号:US11641596B2
公开(公告)日:2023-05-02
申请号:US17383321
申请日:2021-07-22
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US11109258B2
公开(公告)日:2021-08-31
申请号:US16886524
申请日:2020-05-28
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US10033760B2
公开(公告)日:2018-07-24
申请号:US15227391
申请日:2016-08-03
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten
IPC: G06F11/00 , H04L29/06 , H04L29/08 , H04W12/12 , G01S5/02 , H04W4/02 , H04W64/00 , H04W4/80 , H04W84/12 , H04W88/02
Abstract: Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement request and a first random identifier from a first wireless communication device at a second wireless communication device. The embodiments also includes deriving a transient key using the first random identifier, a second random identifier (generated by the second device), and a pre-shared key. The first and second random identifiers, the pre-shared key, and the transient key derived therefrom are shared between the first and second devices, but are not known to any other devices. The embodiments further include encrypting measurement data exchanged between the two devices using the transient key, and using the encrypted measurement data to calculate and verify a separation distance between the devices. The embodiments thus prevent dishonest wireless communication devices from intercepting communications and spoofing a location of one of the two honest devices.
-
公开(公告)号:US20150373633A1
公开(公告)日:2015-12-24
申请号:US14311135
申请日:2014-06-20
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten
Abstract: A wireless device may automatically connect to a preferred wireless network, such as a preferred Wi-Fi network. The wireless device may order a plurality of wireless networks according to initial criteria, such as the time the wireless device last connected to each wireless network. Preference rules may then be applied to reorder the wireless networks. Each preference rule may be applied only if an associated score meets a threshold. A scan may be performed to determine which of the wireless networks are available for connection. The wireless device may automatically connect to the highest-ordered available wireless network. The scores associated with the preference rules may be modified in response to events that indicate a user preference for one or more of the wireless networks, such as manually switching from one network to another.
Abstract translation: 无线设备可以自动连接到优选的无线网络,诸如优选的Wi-Fi网络。 无线设备可以根据诸如无线设备最后连接到每个无线网络的时间的初始标准来订购多个无线网络。 然后可以应用优先规则来重新排序无线网络。 只有当相关分数满足阈值时,才可以应用每个偏好规则。 可以执行扫描以确定哪个无线网络可用于连接。 无线设备可以自动连接到最高有效的可用无线网络。 可以响应于指示用户对一个或多个无线网络的偏好的事件来修改与偏好规则相关联的分数,诸如从一个网络手动切换到另一个网络。
-
公开(公告)号:US12041478B2
公开(公告)日:2024-07-16
申请号:US18187003
申请日:2023-03-21
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US20230308921A1
公开(公告)日:2023-09-28
申请号:US18187003
申请日:2023-03-21
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
-
-
-
-
-
-
-
-