-
公开(公告)号:WO2018213142A1
公开(公告)日:2018-11-22
申请号:PCT/US2018/032426
申请日:2018-05-11
Applicant: APPLE INC.
Inventor: SANCIANGCO, Alexander D. , BRADLEY, Bob , KROCHMAL, Marc J. , KRALIAN, Nathan A. , KASTEN, Welly , COFFMAN, Patrick L.
Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
-
公开(公告)号:WO2019236356A1
公开(公告)日:2019-12-12
申请号:PCT/US2019/034424
申请日:2019-05-29
Applicant: APPLE INC.
Inventor: SHULTZ, Conrad A. , SANCIANGCO, Alexander D. , LEDVINA, Brent M. , PUGH, Chelsea E. , BROGLE, Kyle C. , KROCHMAL, Marc J. , DAUM, Maureen G. , ABBASIAN, Reza , MONDELLO, Richard J. , KLAPPER, Jacob S.
Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
-
公开(公告)号:EP3803653A1
公开(公告)日:2021-04-14
申请号:EP19731837.1
申请日:2019-05-29
Applicant: Apple Inc.
-
公开(公告)号:EP4465591A2
公开(公告)日:2024-11-20
申请号:EP24203793.5
申请日:2018-05-11
Applicant: Apple Inc.
Inventor: SANCIANGCO, Alexander D. , BRADLEY, Bob , KROCHMAL, Marc J. , KRALIAN, Nathan A. , KASTEN, Welly , COFFMAN, Patrick L.
IPC: H04L9/08
Abstract: A method for controlling access to a wireless network, the method comprising, by a computing device: providing, to a nearby computing device, an encrypted request to access the wireless network; and in response to the nearby computing device: (1) determining, based on a satisfaction of a signal strength threshold associated with the encrypted request, that the nearby computing device and the computing device are proximate to one another, and (2) identifying, among a plurality of encryption keys received by the computing device, an encryption key for decrypting the encrypted request: receiving, from the nearby computing device, a password for the wireless network, and utilizing the password to access the wireless network.
-
公开(公告)号:EP4525421A3
公开(公告)日:2025-05-07
申请号:EP25154547.1
申请日:2017-05-22
Applicant: Apple Inc.
Inventor: BRADLEY, Bob , SANCIANGCO, Alexander D. , KROCHMAL, Marc J , CLARKE, Graham
IPC: G06F3/0488 , G06F3/04886 , H04M1/725 , H04N21/41 , H04W4/00 , H04M1/72412 , G06F3/0489 , G06F9/44 , H04W12/06 , H04W12/08 , G06F3/04895
Abstract: There is provided a method comprising presenting, by a user device (102a, 700), a first graphical notification (202) prompting a user to invoke a virtual keyboard (310) on the user device (102a, 700); receiving, by the user device via the first graphical notification (202), a first user input invoking the virtual keyboard (310) on the user device (102a, 700); presenting, on a display of the user device (102a, 700), the virtual keyboard (310) for providing input, wherein the virtual keyboard is provided by an operating system (104a) of the user device (102a, 700) that is distinct from any user application on the user device; and receiving, via a microphone (730) of the user device (102a, 700), user voice input providing at least one command to the virtual keyboard (310).
-
公开(公告)号:EP3610603A1
公开(公告)日:2020-02-19
申请号:EP18802047.3
申请日:2018-05-11
Applicant: Apple Inc.
-
公开(公告)号:EP4525421A2
公开(公告)日:2025-03-19
申请号:EP25154547.1
申请日:2017-05-22
Applicant: Apple Inc.
Inventor: BRADLEY, Bob , SANCIANGCO, Alexander D. , KROCHMAL, Marc J , CLARKE, Graham
IPC: H04M1/72412
Abstract: There is provided a method comprising presenting, by a user device (102a, 700), a first graphical notification (202) prompting a user to invoke a virtual keyboard (310) on the user device (102a, 700); receiving, by the user device via the first graphical notification (202), a first user input invoking the virtual keyboard (310) on the user device (102a, 700); presenting, on a display of the user device (102a, 700), the virtual keyboard (310) for providing input, wherein the virtual keyboard is provided by an operating system (104a) of the user device (102a, 700) that is distinct from any user application on the user device; and receiving, via a microphone (730) of the user device (102a, 700), user voice input providing at least one command to the virtual keyboard (310).
-
公开(公告)号:EP4465591A3
公开(公告)日:2025-01-15
申请号:EP24203793.5
申请日:2018-05-11
Applicant: Apple Inc.
Inventor: SANCIANGCO, Alexander D. , BRADLEY, Bob , KROCHMAL, Marc J. , KRALIAN, Nathan A. , KASTEN, Welly , COFFMAN, Patrick L.
IPC: H04W12/00 , H04W12/06 , H04W12/08 , H04W12/04 , H04W12/63 , H04W12/50 , H04W12/069 , H04L9/40 , H04L9/08
Abstract: A method for controlling access to a wireless network, the method comprising, by a computing device: providing, to a nearby computing device, an encrypted request to access the wireless network; and in response to the nearby computing device: (1) determining, based on a satisfaction of a signal strength threshold associated with the encrypted request, that the nearby computing device and the computing device are proximate to one another, and (2) identifying, among a plurality of encryption keys received by the computing device, an encryption key for decrypting the encrypted request: receiving, from the nearby computing device, a password for the wireless network, and utilizing the password to access the wireless network.
-
-
-
-
-
-
-