RANGING BETWEEN MOBILE DEVICES
    11.
    发明公开

    公开(公告)号:EP4221149A1

    公开(公告)日:2023-08-02

    申请号:EP23168293.1

    申请日:2019-09-27

    Applicant: Apple Inc.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.

    ACTIVITY CONTINUATION BETWEEN ELECTRONIC DEVICES

    公开(公告)号:EP3832463A1

    公开(公告)日:2021-06-09

    申请号:EP21153860.8

    申请日:2015-04-07

    Applicant: Apple Inc.

    Abstract: The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device. Then, the companion electronic device uses the extended activity data to configure the second application and commences performing the activity with the second application at the companion electronic device.

    SHARING CONTENT BASED ON PROXIMITY
    14.
    发明公开

    公开(公告)号:EP4221265A1

    公开(公告)日:2023-08-02

    申请号:EP23168304.6

    申请日:2019-09-27

    Applicant: Apple Inc.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.

    SECURE PASSWORD SHARING FOR WIRELESS NETWORKS

    公开(公告)号:EP4465591A2

    公开(公告)日:2024-11-20

    申请号:EP24203793.5

    申请日:2018-05-11

    Applicant: Apple Inc.

    Abstract: A method for controlling access to a wireless network, the method comprising, by a computing device: providing, to a nearby computing device, an encrypted request to access the wireless network; and in response to the nearby computing device: (1) determining, based on a satisfaction of a signal strength threshold associated with the encrypted request, that the nearby computing device and the computing device are proximate to one another, and (2) identifying, among a plurality of encryption keys received by the computing device, an encryption key for decrypting the encrypted request: receiving, from the nearby computing device, a password for the wireless network, and utilizing the password to access the wireless network.

    SUGGESTION OF RECIPIENTS BASED ON PROXIMITY
    17.
    发明公开

    公开(公告)号:EP3910460A1

    公开(公告)日:2021-11-17

    申请号:EP21180099.0

    申请日:2019-09-27

    Applicant: Apple Inc.

    Abstract: Communication applications, e.g., email and text messaging, typically have an input window for specifying a recipient of the communication. A user can enter characters (e.g., alphanumeric and certain special characters, such as '@') into the input window so as to identify the recipient(s). When the user enters a first character, such communication applications may provide a list of suggested recipients. But, such communication applications require that at least one character is entered before providing the suggested recipients. It would be desirable to provide a reliable list of suggested recipients without the user having to enter some input, thereby making the experience easier and more efficient for the user. It is also desirable to use additional criteria (e.g., other than common recipients) that is specific to a particular situation to determine potential recipients to suggest. The present application incorporates the detection of neighboring mobile devices via wireless communications in the vicinity around the mobile device as a criteria for determining recipients to suggest.

    TEMPORARY PAIRING FOR WIRELESS DEVICES
    18.
    发明公开

    公开(公告)号:EP3687208A3

    公开(公告)日:2020-09-30

    申请号:EP20170822.9

    申请日:2020-04-22

    Applicant: Apple Inc.

    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.

    MODIFYING SECURITY STATE WITH SECURED RANGE DETECTION

    公开(公告)号:EP4284046A2

    公开(公告)日:2023-11-29

    申请号:EP23202648.4

    申请日:2017-06-02

    Applicant: Apple Inc.

    Abstract: There is provided a method comprising announcing, by a proxy device (830), an availability of a trusted device (520); in response to the announced availability, receiving, by the proxy device (830), a first request (850) from a target device (510); and upon receiving the first request from the target device (510), sending, by the proxy device (830), a second request to the trusted device (520), wherein the second request (855) comprises a request for the trusted device (520) to announce its availability directly to the target device (510) from which the first request was received, and the trusted device (520) establishes a communication connection with the target device (510) based on the second request.

    TEMPORARY PAIRING FOR WIRELESS DEVICES
    20.
    发明公开

    公开(公告)号:EP3687208A2

    公开(公告)日:2020-07-29

    申请号:EP20170822.9

    申请日:2020-04-22

    Applicant: Apple Inc.

    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.

Patent Agency Ranking