RANGING BETWEEN MOBILE DEVICES
    1.
    发明申请

    公开(公告)号:WO2020069311A1

    公开(公告)日:2020-04-02

    申请号:PCT/US2019/053448

    申请日:2019-09-27

    Applicant: APPLE INC.

    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.

    SECURE PASSWORD SHARING FOR WIRELESS NETWORKS

    公开(公告)号:WO2018213142A1

    公开(公告)日:2018-11-22

    申请号:PCT/US2018/032426

    申请日:2018-05-11

    Applicant: APPLE INC.

    Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.

    TECHNIQUES FOR ENABLING COMPUTING DEVICES TO IDENTIFY WHEN THEY ARE IN PROXIMITY TO ONE ANOTHER

    公开(公告)号:WO2019232464A1

    公开(公告)日:2019-12-05

    申请号:PCT/US2019/035035

    申请日:2019-05-31

    Applicant: APPLE INC.

    Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.

    PAYMENT HANDOFF SYSTEM
    5.
    发明申请

    公开(公告)号:WO2018169686A1

    公开(公告)日:2018-09-20

    申请号:PCT/US2018/020322

    申请日:2018-02-28

    Applicant: APPLE INC.

    Abstract: A device in a payment transaction handoff system may include at least one processor configured to receive a request to perform a payment transaction and identify, using a first communication protocol, a respective device identifier of each of a plurality of proximate devices. The at least one processor is configured to select, based at least in part on a payment factor, a default payment device from the plurality of proximate devices. The at least one processor is configured to transmit, via a second communication protocol, a message to perform the payment transaction, the message comprising the device identifier of the default payment device. In one or more implementations, a first device of the plurality of proximate devices may be associated with a first user account and a second device of the plurality of proximate devices may be associated with a second user account, different from the first user account.

    MANAGING PERMISSIONS FOR DIFFERENT WIRELESS DEVICES TO CONTROL A COMMON HOST DEVICE

    公开(公告)号:WO2018132335A1

    公开(公告)日:2018-07-19

    申请号:PCT/US2018/012813

    申请日:2018-01-08

    Applicant: APPLE INC.

    Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.

    PROXIMITY CREDENTIAL SHARING
    9.
    发明申请

    公开(公告)号:WO2019236356A1

    公开(公告)日:2019-12-12

    申请号:PCT/US2019/034424

    申请日:2019-05-29

    Applicant: APPLE INC.

    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.

    ACTIVITY CONTINUATION BETWEEN ELECTRONIC DEVICES
    10.
    发明申请
    ACTIVITY CONTINUATION BETWEEN ELECTRONIC DEVICES 审中-公开
    电子设备之间的活动连续性

    公开(公告)号:WO2015183414A1

    公开(公告)日:2015-12-03

    申请号:PCT/US2015/024785

    申请日:2015-04-07

    Applicant: APPLE INC.

    CPC classification number: H04L67/22 G06F9/4856 H04L67/10

    Abstract: The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device. Then, the companion electronic device uses the extended activity data to configure the second application and commences performing the activity with the second application at the companion electronic device.

    Abstract translation: 所描述的实施例将活动从源电子设备传送到伴侣电子设备。 源电子设备接收描述在源电子设备处的第一应用中执行的活动的活动信息,确定活动信息的活动标识符,并广播包含活动标识符的活动广告。 在接收到活动广告之后,伴随电子设备确定与伴随电子设备相关联的第二应用是否可用。 如果第二应用可用,则伴随电子设备从源电子设备请求扩展活动数据。 源电子设备通过从第一应用发送扩展活动数据到伴随电子设备来进行响应。 然后,伴随电子设备使用扩展活动数据来配置第二应用,并开始在伴随电子设备处与第二应用执行活动。

Patent Agency Ranking