-
公开(公告)号:US20210392129A1
公开(公告)日:2021-12-16
申请号:US17356487
申请日:2021-06-23
Applicant: Apple Inc.
Inventor: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US20180337911A1
公开(公告)日:2018-11-22
申请号:US15721301
申请日:2017-09-29
Applicant: Apple Inc.
Inventor: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
CPC classification number: H04L63/083 , G06F21/45 , H04L63/18 , H04W12/003 , H04W12/06
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US20200076788A1
公开(公告)日:2020-03-05
申请号:US16579712
申请日:2019-09-23
Applicant: Apple Inc.
Inventor: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
-