Fast GPS recovery using map vector data

    公开(公告)号:US10955556B2

    公开(公告)日:2021-03-23

    申请号:US15788533

    申请日:2017-10-19

    Applicant: Apple Inc.

    Abstract: Methods and apparatuses to assist a global positioning system (GPS) module to determine GPS position estimates for a wireless communication device is disclosed. Processing circuitry in the wireless communication device determines a potential or an actual inaccuracy in a GPS position estimate obtained from a GPS module. The processing circuitry obtains a set of map vector data stored in or associated with the wireless communication device. The processing circuitry determines a location estimate of the wireless communication device based on at least a portion of the set of map vector data. The processing circuitry provides the location estimate to the GPS module and obtains an updated GPS position estimate from the GPS module, the updated GPS position estimate based at least in part on the location estimate provided to the GPS module.

    Location source control
    52.
    发明授权

    公开(公告)号:US10939486B2

    公开(公告)日:2021-03-02

    申请号:US15275236

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: Techniques for location source control for paired devices are described. Location source control selects a location source for a mobile device. The mobile device can receive, from an application program, a request for determining a location of the mobile device. The mobile device can determine a first location estimate using a location subsystem of the mobile device. The mobile device can determine whether to provide the first location estimate as input to the application program, or to provide a second location estimate as input to the application program. The second location estimate can be an estimated location of the companion device and determined by the companion device.

    Location Service Management
    53.
    发明申请

    公开(公告)号:US20200076942A1

    公开(公告)日:2020-03-05

    申请号:US16433523

    申请日:2019-06-06

    Applicant: Apple Inc.

    Abstract: An application manager of a mobile device can provide a user with the ability to control whether an application can use location information provided by a location subsystem of the mobile device. The application can request to be notified by the location subsystem when the mobile device crosses a geofence. When the mobile device crosses the geofence, the location subsystem provides a notice to the application. The application manager can intercept the notice to the application, and present an alert on a user interface. The application manager can then provide the notice to the application only upon receiving an input through the user interface confirming that the application still has permission to use location information.

    LOCATION SERVICE AUTHORIZATION AND INDICATION

    公开(公告)号:US20190289423A1

    公开(公告)日:2019-09-19

    申请号:US16435218

    申请日:2019-06-07

    Applicant: Apple Inc.

    Abstract: An application can specify a location service authorization type to be enforced by a mobile device. After the user authorizes the location service through an authorization dialog, the application can receive location service according to the authorization type. A first authorization type allows the application to receive continuous location updates and location events from a location service on the mobile device only when the application is in use. A second authorization type allows the application to always receive continuous location updates and location events when the application is running in a foreground or background. The text of the authorization dialog can be customized by the application to provide more detail on how the location data will be used by the application.

    LOCATION SERVICE AUTHORIZATION AND INDICATION

    公开(公告)号:US20190215642A1

    公开(公告)日:2019-07-11

    申请号:US16270898

    申请日:2019-02-08

    Applicant: Apple Inc.

    Abstract: An application can specify a location service authorization type to be enforced by a mobile device. After the user authorizes the location service through an authorization dialog, the application can receive location service according to the authorization type. A first authorization type allows the application to receive continuous location updates and location events from a location service on the mobile device only when the application is in use. A second authorization type allows the application to always receive continuous location updates and location events when the application is running in a foreground or background. The text of the authorization dialog can be customized by the application to provide more detail on how the location data will be used by the application.

    Location service authorization and indication

    公开(公告)号:US10244344B2

    公开(公告)日:2019-03-26

    申请号:US15273479

    申请日:2016-09-22

    Applicant: Apple Inc.

    Abstract: An application can specify a location service authorization type to be enforced by a mobile device. After the user authorizes the location service through an authorization dialog, the application can receive location service according to the authorization type. A first authorization type allows the application to receive continuous location updates and location events from a location service on the mobile device only when the application is in use. A second authorization type allows the application to always receive continuous location updates and location events when the application is running in a foreground or background. The text of the authorization dialog can be customized by the application to provide more detail on how the location data will be used by the application.

    Providing memory usage analysis by attributing memory allocations to development components

    公开(公告)号:US09990135B2

    公开(公告)日:2018-06-05

    申请号:US15275306

    申请日:2016-09-23

    Applicant: Apple Inc.

    CPC classification number: G06F9/546 G06F9/5016

    Abstract: Described are a system and technique for collecting stack trace information of devices and analyzing this information to provide metrics with respect to memory usage. The memory analysis includes attributing the memory usage to particular development components by traversing a stack trace. For example, the development components may correspond to a classification used for a particular development effort such as a group of classes, a sub-project, or a development team. As a result, the system may produce various metrics that produce memory usage information attributable to a more meaningful conceptual unit rather than, for example, function names. Accordingly, these attributions may be analyzed for forensic purposes to get a more meaningful picture of sources and causes of memory usage.

Patent Agency Ranking