-
公开(公告)号:US12113784B2
公开(公告)日:2024-10-08
申请号:US18107982
申请日:2023-02-09
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L Sierra
IPC: H04L9/08 , G06F9/445 , H04L9/14 , H04L9/32 , H04L9/40 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086
CPC classification number: H04L63/08 , G06F9/44505 , H04L9/0822 , H04L9/085 , H04L9/0894 , H04L9/14 , H04L9/3226 , H04L63/0428 , H04L63/06 , H04L63/083 , H04L63/107 , H04L63/108 , H04L63/1466 , H04W12/041 , H04W12/0431 , H04W12/06 , H04W12/086 , H04L2209/80
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11438322B2
公开(公告)日:2022-09-06
申请号:US16264478
申请日:2019-01-31
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US10936358B2
公开(公告)日:2021-03-02
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-Man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F1/3212 , G06F11/34 , G06F11/30 , H04M1/725
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US20190317800A1
公开(公告)日:2019-10-17
申请号:US16261263
申请日:2019-01-29
Applicant: Apple Inc.
Inventor: David Michael Chan , John Iarocci , Gaurav Kapoor , Kit-man Wan , Phillip Stanley-Marbell , Jonathan J. Andrews , Matthew E. Shepherd , Amit K. Vyas , Anand Ramadurai , Lee Russell , Brittany D. Hughes , David B. Myszewski , Andrew M. Matuschak , Joshua V. Graessley , Marc J. Krochmal , Daniel Vinegrad , Stephen C. Peters
IPC: G06F9/48 , H04L29/08 , G06F1/3206 , G06F11/34 , G06F1/3212
Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
-
公开(公告)号:US20140365673A1
公开(公告)日:2014-12-11
申请号:US13913113
申请日:2013-06-07
Applicant: Apple Inc.
Inventor: Amit K. Vyas , Joshua V. Graessley , John Iarocci , Darren Litzinger , Andrew C. Lam , Ray Ling Chang , Steven Douglas Parker , Justin Wood , Matthew Scott Klahn , Daniel B. Pollack
IPC: H04L29/06
CPC classification number: H04L65/1069 , H04L67/141 , H04W76/10
Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract translation: 在一些实现中,网络守护进程可以管理对移动设备的网络接口的访问。 网络守护进程(例如,网络连接管理进程)可以在一个或多个接口上监视移动设备的网络连接的状况。 网络守护程序可以监控移动设备上的许多条件。 网络守护进程可以从指定用于启动网络连接的标准的网络客户端(例如,进程,应用程序)接收后台网络请求。 网络守护进程可以根据客户端请求中接收到的网络条件,移动设备条件和/或客户端标准来智能地管理网络连接。 这可以帮助减少电池寿命的影响,内存使用情况,呼叫丢失的可能性,数据使用成本以及网络运营商的负担。
-
公开(公告)号:US11178127B2
公开(公告)日:2021-11-16
申请号:US15497203
申请日:2017-04-26
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: H04W12/08 , H04L29/06 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US12294655B2
公开(公告)日:2025-05-06
申请号:US18053352
申请日:2022-11-07
Applicant: Apple Inc.
Inventor: Conrad Sauerwald , Alexander Ledwith , John Iarocci , Marc J. Krochmal , Wade Benson , Gregory Novick , Noah Witherspoon
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:US11582215B2
公开(公告)日:2023-02-14
申请号:US15275203
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Wade Benson , Marc J. Krochmal , Alexander R. Ledwith , John Iarocci , Jerrold V. Hauck , Michael Brouwer , Mitchell D. Adler , Yannick L. Sierra
IPC: G06F7/04 , G06F17/30 , H04L9/40 , H04W12/041 , H04W12/086 , H04W12/0431 , G06F9/445 , H04W12/06 , H04L9/08 , H04L9/14 , H04L9/32
Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
-
公开(公告)号:US11329827B2
公开(公告)日:2022-05-10
申请号:US15286505
申请日:2016-10-05
Applicant: Apple Inc.
Inventor: Conrad Sauerwald , Alexander Ledwith , John Iarocci , Marc J. Krochmal , Wade Benson , Gregory Novick , Noah Witherspoon
Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
-
公开(公告)号:US10187430B2
公开(公告)日:2019-01-22
申请号:US13913113
申请日:2013-06-07
Applicant: Apple Inc.
Inventor: Amit K. Vyas , Joshua V. Graessley , John Iarocci , Darren Litzinger , Andrew C. Lam , Ray Ling Chang , Steven Douglas Parker , Justin Wood , Matthew Scott Klahn , Daniel B. Pollack
IPC: G06F15/177 , G06F15/16 , H04L29/06 , H04W76/10 , H04L29/08
Abstract: In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
-
-
-
-
-
-
-
-
-