-
公开(公告)号:US11050737B2
公开(公告)日:2021-06-29
申请号:US16579712
申请日:2019-09-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US10432614B2
公开(公告)日:2019-10-01
申请号:US15721301
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US12177207B2
公开(公告)日:2024-12-24
申请号:US17356487
申请日:2021-06-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
-