-
1.
公开(公告)号:WO2017218208A1
公开(公告)日:2017-12-21
申请号:PCT/US2017/035601
申请日:2017-06-02
Applicant: APPLE INC.
Inventor: BENSON, Wade , KROCHMAL, Marc, J. , LEDWITH, Alexander, R. , IAROCCI, John , HAUCK, Jerrold, V. , BROUWER, Michael , ADLER, Mitchell, D. , SIERRA, Yannick, L.
IPC: H04L29/06
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
Abstract translation: 本发明的一些实施例提供一种用于可信任(或发起者)设备基于安全测距操作来修改目标设备的安全状态(例如,解锁设备)的方法(例如,确定 距离,接近度等)。 一些实施例的方法交换消息作为测距操作的一部分,以便在允许可信设备修改目标设备的安全状态之前确定可信设备和目标设备是否在彼此的指定范围内。 在一些实施例中,消息是由两个设备基于共享秘密导出的并且被用于验证用于测距操作的测距信号源。 在一些实施例中,该方法使用多个不同的频带来执行。 p>
-
公开(公告)号:WO2011126499A3
公开(公告)日:2011-10-13
申请号:PCT/US2010/049816
申请日:2010-09-22
Applicant: APPLE INC. , ALBERT, Eric , BALLARD, Lucia , CHAPMAN, Gregory, R. , CRANE, Neil, Gareth , DUFFY, Thomas, Brogan , FORSTALL, Scott , FREEDMAN, Gordon, J. , GOODWIN, David, William , IAROCCI, John , LITZINGER, Darren , MARCELLINO, Christopher , MASON, Henry, Graham , MASPUTRA, Cahya , MYSZEWSKI, David , NOVICK, Gregory , ROTHERT, Curtis , SCHREYER, Richard , SOKOL, Joseph , SORRESSO, Damien , SRISUWANANUKORN, Charles , VAN MILLIGAN, Michael , WASTON, Matthew, G.
Inventor: ALBERT, Eric , BALLARD, Lucia , CHAPMAN, Gregory, R. , CRANE, Neil, Gareth , DUFFY, Thomas, Brogan , FORSTALL, Scott , FREEDMAN, Gordon, J. , GOODWIN, David, William , IAROCCI, John , LITZINGER, Darren , MARCELLINO, Christopher , MASON, Henry, Graham , MASPUTRA, Cahya , MYSZEWSKI, David , NOVICK, Gregory , ROTHERT, Curtis , SCHREYER, Richard , SOKOL, Joseph , SORRESSO, Damien , SRISUWANANUKORN, Charles , VAN MILLIGAN, Michael , WASTON, Matthew, G.
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. A consequence of such restrictions may be that a process will not be able to do in the background state, what it may be able to do if it were in the foreground state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation
-
公开(公告)号:WO2014200655A4
公开(公告)日:2014-12-18
申请号:PCT/US2014/038116
申请日:2014-05-15
Applicant: APPLE INC.
Inventor: CHAN, David Michael , IAROCCI, John , KAPOOR, Gaurav , WAN, Kit-man , STANLEY-MARBELL, Phillip , ANDREWS, Jonathan J. , SHEPHERD, Matthew E. , VYAS, Amit K. , RAMADURAI, Anand , RUSSELL, Lee , HUGHES, Brittany D. , MYSZEWSKI, David , MATUSCHAK, Andrew M. , GRAESSLEY, Joshua V. , KROCHMAL, Marc , VINEGRAD,, Daniel , PETERS, Stephen C.
IPC: G06F9/48
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:EP3449611A1
公开(公告)日:2019-03-06
申请号:EP17731348.3
申请日:2017-06-02
Applicant: Apple Inc.
Inventor: BENSON, Wade , KROCHMAL, Marc, J. , LEDWITH, Alexander, R. , IAROCCI, John , HAUCK, Jerrold, V. , BROUWER, Michael , ADLER, Mitchell, D. , SIERRA, Yannick, L.
IPC: H04L29/06
-
公开(公告)号:EP4284046A2
公开(公告)日:2023-11-29
申请号:EP23202648.4
申请日:2017-06-02
Applicant: Apple Inc.
Inventor: BENSON, Wade , KROCHMAL, Marc J. , LEDWITH, Alexander R. , IAROCCI, John , HAUCK, Jerrold V. , BROUWER, Michael , ADLER, Mitchell D. , SIERRA, Yannick L.
IPC: H04W12/086
Abstract: There is provided a method comprising announcing, by a proxy device (830), an availability of a trusted device (520); in response to the announced availability, receiving, by the proxy device (830), a first request (850) from a target device (510); and upon receiving the first request from the target device (510), sending, by the proxy device (830), a second request to the trusted device (520), wherein the second request (855) comprises a request for the trusted device (520) to announce its availability directly to the target device (510) from which the first request was received, and the trusted device (520) establishes a communication connection with the target device (510) based on the second request.
-
公开(公告)号:EP2556432A2
公开(公告)日:2013-02-13
申请号:EP10763518.7
申请日:2010-09-22
Applicant: Apple Inc.
Inventor: ALBERT, Eric , BALLARD, Lucia , CHAPMAN, Gregory, R. , CRANE, Neil, Gareth , DUFFY, Thomas, Brogan , FORSTALL, Scott , FREEDMAN, Gordon, J. , GOODWIN, David, William , IAROCCI, John , LITZINGER, Darren , MARCELLINO, Christopher , MASON, Henry, Graham , MASPUTRA, Cahya , MYSZEWSKI, David , NOVICK, Gregory , ROTHERT, Curtis , SCHREYER, Richard , SOKOL, Joseph , SORRESSO, Damien , SRISUWANANUKORN, Charles , VAN MILLIGAN, Michael , WASTON,Matthew, G.
CPC classification number: G06F9/485 , G06F9/5011 , G06F9/542
Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, an application that may normally be placed into the background state may instead be terminated if it controls a lock on a shared system resource.
Abstract translation: 提供个人电子设备的服务,支持后台处理或多任务的形式。 所公开的服务允许用户应用程序利用后台处理,而不会对用户对前台进程或个人电子设备的电源资源的体验产生显着的负面影响。 为了实现所公开的多任务,可以执行一些或多个操作限制。 作为示例,如果控制对共享系统资源的锁定,则通常可以放置到后台状态的应用可以被终止。
-
公开(公告)号:EP4284046A3
公开(公告)日:2024-01-17
申请号:EP23202648.4
申请日:2017-06-02
Applicant: Apple Inc.
Inventor: BENSON, Wade , KROCHMAL, Marc J. , LEDWITH, Alexander R. , IAROCCI, John , HAUCK, Jerrold V. , BROUWER, Michael , ADLER, Mitchell D. , SIERRA, Yannick L.
IPC: H04W8/00 , H04W12/086 , H04W12/06 , H04W12/0431 , H04W12/041 , H04L9/40
Abstract: There is provided a method comprising announcing, by a proxy device (830), an availability of a trusted device (520); in response to the announced availability, receiving, by the proxy device (830), a first request (850) from a target device (510); and upon receiving the first request from the target device (510), sending, by the proxy device (830), a second request to the trusted device (520), wherein the second request (855) comprises a request for the trusted device (520) to announce its availability directly to the target device (510) from which the first request was received, and the trusted device (520) establishes a communication connection with the target device (510) based on the second request.
-
-
-
-
-
-