Configuring Context-based Restrictions for a Computing Device

    公开(公告)号:US20220405411A1

    公开(公告)日:2022-12-22

    申请号:US17896439

    申请日:2022-08-26

    申请人: Apple Inc.

    IPC分类号: G06F21/62 H04L9/40

    摘要: In some implementations, a computing device can restrict the use of another computing device in certain contexts. For example, a parent may wish to use the parent's computing device to restrict her children's use of the children's computing devices while the children are in school while the children should be participating in some other activity. For example, the parent's controller device may be enabled to remotely configure and control the usage of the satellite device(s) without needing to physically access the satellite device. The parent may implement limitations, permissions, or different policies that may govern, for example, the ability of the satellite device to communicate with other devices, execute various application functionalities, run any particular software, and manage its own settings.

    ESTABLISHMENT AND DETECTION OF BREAKAGE OF WIRELESS LEASH BETWEEN DEVICES
    4.
    发明申请
    ESTABLISHMENT AND DETECTION OF BREAKAGE OF WIRELESS LEASH BETWEEN DEVICES 审中-公开
    建立和检测设备之间的无线垃圾的破坏

    公开(公告)号:US20170039837A1

    公开(公告)日:2017-02-09

    申请号:US15331734

    申请日:2016-10-21

    申请人: APPLE INC.

    发明人: Tyler D. Hawkins

    IPC分类号: G08B21/24

    摘要: Companion and accessory devices can be wirelessly leashed together in a manner that enables the devices to estimate their proximities to each other. One device can periodically attempt to detect a signal from the other device. For each attempt, the attempting device can store an indication of whether the signal was detected. If a number of times that the signal was undetected exceeds a threshold, then the attempting device can perform specified operations, such as alerting a user that the wireless leash was broken. As another example, one device can detect that a strength of a signal from the other device exceeds a threshold. In response, the detecting device can measure signal strengths more frequently. If the measuring device then detects that the signal strength exceeds another threshold, then the measuring device can cause specified operations to be performed, such as data synchronization between the devices or unlocking a device.

    摘要翻译: 伴侣和附件设备可以以能够使设备估计彼此接近度的方式无线地捆绑在一起。 一个设备可以周期性地尝试检测来自另一设备的信号。 对于每次尝试,尝试设备可以存储是否检测到信号的指示。 如果信号未被发现的次数超过阈值,则尝试设备可以执行指定的操作,例如告知用户无线皮带已损坏。 作为另一示例,一个设备可以检测到来自另一设备的信号的强度超过阈值。 作为响应,检测装置可以更频繁地测量信号强度。 如果测量装置检测到信号强度超过另一阈值,则测量装置可以执行指定的操作,例如设备之间的数据同步或解锁设备。

    Configuring context-based restrictions for a computing device

    公开(公告)号:US11468197B2

    公开(公告)日:2022-10-11

    申请号:US16862313

    申请日:2020-04-29

    申请人: Apple Inc.

    IPC分类号: G06F21/62 H04L9/40 G06F21/00

    摘要: In some implementations, a computing device can restrict the use of another computing device in certain contexts. For example, a parent may wish to use the parent's computing device to restrict her children's use of the children's computing devices while the children are in school while the children should be participating in some other activity. For example, the parent's controller device may be enabled to remotely configure and control the usage of the satellite device(s) without needing to physically access the satellite device. The parent may implement limitations, permissions, or different policies that may govern, for example, the ability of the satellite device to communicate with other devices, execute various application functionalities, run any particular software, and manage its own settings.

    Establishment and detection of breakage of wireless leash between devices

    公开(公告)号:US10600310B2

    公开(公告)日:2020-03-24

    申请号:US16142991

    申请日:2018-09-26

    申请人: Apple Inc.

    发明人: Tyler D. Hawkins

    摘要: Companion and accessory devices can be wirelessly leashed together in a manner that enables the devices to estimate their proximities to each other. One device can periodically attempt to detect a signal from the other device. For each attempt, the attempting device can store an indication of whether the signal was detected. If a number of times that the signal was undetected exceeds a threshold, then the attempting device can perform specified operations, such as alerting a user that the wireless leash was broken. As another example, one device can detect that a strength of a signal from the other device exceeds a threshold. In response, the detecting device can measure signal strengths more frequently. If the measuring device then detects that the signal strength exceeds another threshold, then the measuring device can cause specified operations to be performed, such as data synchronization between the devices or unlocking a device.