-
公开(公告)号:US11050737B2
公开(公告)日:2021-06-29
申请号:US16579712
申请日:2019-09-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US10432614B2
公开(公告)日:2019-10-01
申请号:US15721301
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US20180338086A1
公开(公告)日:2018-11-22
申请号:US15978128
申请日:2018-05-12
Applicant: Apple Inc.
Inventor: Sebastien Marineau-Mes , Charles A. Mezak , Arwen Bradley , Alex T. Nelson , Douglas P. Mitchell , Claus Moelgaard , Jason Klivington , Rudolph van der Merwe , Zahra Sadeghipoor Kermani , Farhan Baqai , Todd Sachs , Paul Hubel
Abstract: In various implementations a method includes obtaining a plurality of source images, stabilizing the plurality of source images to generate a plurality of stabilized images, and averaging the plurality of stabilized image to generate a synthetic long exposure image. In various implementations, stabilizing the plurality of source images includes: selecting one of the plurality of source images to serve as a reference frame; and registering others of the plurality of source images to the reference frame by applying a perspective transformation to others of the plurality of the source images.
-
公开(公告)号:US20170193282A1
公开(公告)日:2017-07-06
申请号:US15445623
申请日:2017-02-28
Applicant: Apple Inc.
Inventor: Edward Allen Valko , Matthew C. Waldon , Rudolph Van der Merwe , William Matthew Vieta , Myra M. Haggerty , Alex T. Nelson
CPC classification number: G06K9/00255 , G06T7/20 , G06T2207/20076 , G09G5/00 , G09G2330/022 , G09G2354/00
Abstract: One embodiment may take the form of a method of operating a computing device to provide presence based functionality. The method may include operating the computing device in a reduced power state and collecting a first set of data from a first sensor. Based on the first set of data, the computing device determines if an object is within a threshold distance of the computing device and, if the object is within the threshold distance, the device activates a secondary sensor to collect a second set of data. Based on the second set of data, the device determines if the object is a person. If the object is a person, the device determines a position of the person relative to the computing device and executes a change of state in the computing device based on the position of the person relative to the computing device. If the object is not a person, the computing device remains in a reduced power state.
-
公开(公告)号:US12177207B2
公开(公告)日:2024-12-24
申请号:US17356487
申请日:2021-06-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US10715727B2
公开(公告)日:2020-07-14
申请号:US15978128
申请日:2018-05-12
Applicant: Apple Inc.
Inventor: Sebastien Marineau-Mes , Charles A. Mezak , Arwen Bradley , Alex T. Nelson , Douglas P. Mitchell , Claus Moelgaard , Jason Klivington , Rudolph van der Merwe , Zahra Sadeghipoor Kermani , Farhan Baqai , Todd Sachs , Paul Hubel
Abstract: In various implementations a method includes obtaining a plurality of source images, stabilizing the plurality of source images to generate a plurality of stabilized images, and averaging the plurality of stabilized image to generate a synthetic long exposure image. In various implementations, stabilizing the plurality of source images includes: selecting one of the plurality of source images to serve as a reference frame; and registering others of the plurality of source images to the reference frame by applying a perspective transformation to others of the plurality of the source images.
-
公开(公告)号:US10402624B2
公开(公告)日:2019-09-03
申请号:US15445623
申请日:2017-02-28
Applicant: Apple Inc.
Inventor: Edward Allen Valko , Matthew C. Waldon , Rudolph Van der Merwe , William Matthew Vieta , Myra M. Haggerty , Alex T. Nelson
Abstract: One embodiment may take the form of a method of operating a computing device to provide presence based functionality. The method may include operating the computing device in a reduced power state and collecting a first set of data from a first sensor. Based on the first set of data, the computing device determines if an object is within a threshold distance of the computing device and, if the object is within the threshold distance, the device activates a secondary sensor to collect a second set of data. Based on the second set of data, the device determines if the object is a person. If the object is a person, the device determines a position of the person relative to the computing device and executes a change of state in the computing device based on the position of the person relative to the computing device. If the object is not a person, the computing device remains in a reduced power state.
-
-
-
-
-
-