PROXIMITY CREDENTIAL SHARING
    4.
    发明申请

    公开(公告)号:WO2019236356A1

    公开(公告)日:2019-12-12

    申请号:PCT/US2019/034424

    申请日:2019-05-29

    申请人: APPLE INC.

    摘要: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.

    FRIEND KEY SHARING
    5.
    发明申请
    FRIEND KEY SHARING 审中-公开

    公开(公告)号:WO2019241047A1

    公开(公告)日:2019-12-19

    申请号:PCT/US2019/035937

    申请日:2019-06-07

    申请人: APPLE INC.

    摘要: Techniques are disclosed relating to sharing access to electronically-secured property. In some embodiments, a first computing device having a first secure element receives, from a second computing device associated with an owner of the electronically-secured property, an indication that the second computing device has transmitted a token to server computing system, the token permitting a user of the first computing device access to the electronically-secured property. Based on the received indication, the first computing device sends a request for the transmitted token to the server computing system and, in response to receiving the requested token, securely stores the received token in the first secure element of the first computing device. The first computing device subsequently transmits the stored token from the first secure element of the first device to the electronically-secured property to obtain access to the electronically-secured property based on the token.