APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS
    3.
    发明申请
    APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS 审中-公开
    用于存储电子访问客户的装置和方法

    公开(公告)号:WO2012138778A2

    公开(公告)日:2012-10-11

    申请号:PCT/US2012/032195

    申请日:2012-04-04

    Abstract: Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.

    Abstract translation: 用于存储和控制访问控制客户端的装置和方法。 在一个实施例中,发送和接收设备确保在任何时间只有一个eSIM的副本被激活。 具体来说,每个转移的eSIM对目的设备进行加密; 来自源设备的eSIM被删除,停用或以其他方式呈现不可用。 还描述了网络基础设施的各个方面,包括电子通用集成电路卡(eUICC)设备和移动设备。 还披露了用于传送eSIM的各种场景。

    MOBILE APPARATUS SUPPORTING A PLURALITY OF ACCESS CONTROL CLIENTS, AND CORRESPONDING METHODS
    6.
    发明公开
    MOBILE APPARATUS SUPPORTING A PLURALITY OF ACCESS CONTROL CLIENTS, AND CORRESPONDING METHODS 审中-公开
    具有多个访问控制客户端和相关程序移动设备

    公开(公告)号:EP2815553A2

    公开(公告)日:2014-12-24

    申请号:EP13714036.4

    申请日:2013-02-14

    Applicant: Apple Inc.

    CPC classification number: H04W12/06 H04L63/0853 H04L63/205

    Abstract: Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called ''stack'' of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).

    Abstract translation: 方法及装置电子门禁客户的大规模发行。 一方面,分层安全软件的协议是游离缺失盘。 在一个示例性实施例中,服务器电子通用集成电路卡(所述eUICC)和客户端软件的eUICC包括的软件层的所谓的“”栈”。 每个软件层负责一组分级函数,它们商定了相应对等的软件层。 分层安全软件协议配置电子用户身份模块(的eSIM)的大规模分布。

    GENERATING SCENES BASED ON ACCESSORY STATE
    8.
    发明申请
    GENERATING SCENES BASED ON ACCESSORY STATE 审中-公开
    根据附件状态生成场景

    公开(公告)号:WO2017218143A1

    公开(公告)日:2017-12-21

    申请号:PCT/US2017/033873

    申请日:2017-05-22

    Applicant: APPLE INC.

    Abstract: In some implementations, a computing device can automatically generate a scene. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the computing device can cause the accessories associated with the scene to assume the corresponding accessory states. The computing device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The computing device can generate a scene based on a snapshot of current accessory states for the accessories associated with the scene.

    Abstract translation: 在一些实现中,计算设备可以自动生成场景。 例如,场景可以是一系列配件和相应的配件状态。 当场景被调用时,计算设备可以使与场景相关联的附件呈现相应的附件状态。 计算设备可以基于历史附件状态数据中表示的历史使用模式自动确定场景的附件和/或相应的附件状态。 计算设备可以基于与场景相关联的配件的当前附件状态的快照来生成场景。

    RELAY SERVICE FOR COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES
    9.
    发明申请
    RELAY SERVICE FOR COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES 审中-公开
    控制器与配件之间的通讯中继服务

    公开(公告)号:WO2016196587A1

    公开(公告)日:2016-12-08

    申请号:PCT/US2016/035208

    申请日:2016-06-01

    Applicant: APPLE INC.

    Abstract: A relay service (220) can relay messages between controllers (202) and electronically controllable accessory devices (204) that may be located remotely from the controllers. Relaying of messages by the relay service can be decoupled from any knowledge of the functionality of the accessory or the content of the messages. Device identification and relaying of messages can be managed using "relay aliases" that are meaningful only to the relay service and the endpoint devices (the controller and accessory). The endpoint devices can implement end-to-end security for messages transported by the relay service. Controllers and accessory devices are paired and access tokens are established via the relay service. The access tokens are used for subsequent authentication of messages between controllers and accessory devices.

    Abstract translation: 中继服务(220)可以在可能远离控制器的控制器(202)和电子可控附件设备(204)之间中继消息。 中继服务的消息中继可以与附件功能或消息内容的任何知识分离。 可以使用仅对中继服务和端点设备(控制器和附件)有意义的“中继别名”来管理消息的设备标识和中继。 端点设备可以实现由中继服务传输的消息的端到端安全性。 控制器和附件设备配对,通过中继服务建立访问令牌。 访问令牌用于后续的控制器和附件设备之间的消息验证。

Patent Agency Ranking