-
41.
公开(公告)号:US20150351145A1
公开(公告)日:2015-12-03
申请号:US14725891
申请日:2015-05-29
Applicant: Apple Inc.
Inventor: Andrew Burks , Anush G. Nadathur , Srinivas Rama , Kevin P. McLaughlin , Joe Abuan , Dennis Mathews , Matthew C. Lucas
CPC classification number: H04L12/282 , G08C17/02 , G08C2201/20 , G08C2201/40 , G08C2201/60 , G08C2201/91 , G08C2201/93 , H04L63/0281 , H04L63/102
Abstract: Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network.
Abstract translation: 控制器可用于控制各种配件的运行。 可以将访问特定附件(或一组附件)的控制器组织到控制器网络中以便于控制。 控制器网络可以包括各种代理设备,包括桥接和隧道代理,其可以向附件中传递消息,以及从附件转发消息,执行协议转换和/或提供通信安全性。 一些代理设备可以包括决策逻辑,以便能够通过控制器网络中的控制器对一个或多个附件进行协调控制。
-
公开(公告)号:US20140143826A1
公开(公告)日:2014-05-22
申请号:US14085951
申请日:2013-11-21
Applicant: Apple Inc.
Inventor: Christopher B. Sharp , Yousuf H. Vaid , Li Li , Jerrold V. Hauck , Arun G. Mathias , Xiangying Yang , Kevin P. McLaughlin
IPC: G06F21/60
CPC classification number: G06F21/604 , H04L63/102 , H04L63/105 , H04L63/20 , H04W12/08
Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.
Abstract translation: 描述了基于策略的框架。 该基于策略的框架可以用于指定逻辑实体执行与位于电子设备中的安全元件内的访问控制元素(例如电子订户身份模块)相关联的操作的权限。 注意,对于与相同或不同的访问控制元素相关联的不同操作,不同的逻辑实体可以具有不同的权限。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的凭证的类型,使得不同类型的凭证可以用于不同的操作和/或由不同的逻辑实体使用。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的安全协议和安全级别,使得不同的安全协议和安全级别可以用于不同的操作和/或不同的逻辑实体。
-
公开(公告)号:US12231318B2
公开(公告)日:2025-02-18
申请号:US17650589
申请日:2022-02-10
Applicant: Apple Inc.
Inventor: Joe Abuan , Bob Bradley , Craig Dooley , Gregg Golembeski, Jr. , Andrew Burks , Srinivas Rama , Arun Mathias , Anush Nadathur , Kevin P. McLaughlin
IPC: H04L29/06 , G06F11/30 , G06F21/44 , H04L9/00 , H04L9/08 , H04L9/32 , H04L9/40 , H04L43/10 , H04L67/02 , H04L67/04 , H04L67/12 , H04L67/303 , H04W4/70 , H04W12/04 , H04W12/50 , H04W4/80 , H04W12/06
Abstract: A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
-
公开(公告)号:US20250030572A1
公开(公告)日:2025-01-23
申请号:US18908574
申请日:2024-10-07
Applicant: Apple Inc.
Inventor: Anush G. Nadathur , Kevin P. McLaughlin , Nathan E. Carroll
IPC: H04L12/28 , H04L41/0681 , H04L41/0695 , H04L41/0816 , H04L67/125 , H04L67/59 , H04L69/40
Abstract: A first device can identify a trigger. The trigger can include a triggering event and an action to be performed on an accessory device in response to detecting the triggering event. When the trigger is delegated to the first electronic device, the first electronic device can execute the trigger by monitoring for the triggering event and transmitting a control message to the accessory device in response to detecting the triggering event. When the trigger is delegated to a second electronic device, the first electronic device can monitor a status of the second electronic device for a condition indicating that the second electronic device is unavailable to execute the trigger and execute the trigger in response to detecting the condition.
-
公开(公告)号:US11425104B2
公开(公告)日:2022-08-23
申请号:US16654683
申请日:2019-10-16
Applicant: Apple Inc.
Inventor: Arun G. Mathias , Thomas A. Dilligan , Matthew C. Lucas , Anush G. Nadathur , Kevin P. McLaughlin
IPC: H04L29/06 , H04L29/08 , H04L9/40 , H04L67/06 , H04L67/1095 , H04L67/10 , H04L9/12 , H04L9/08 , H04L9/32
Abstract: A data transfer process can include multiple verification features usable by a “source” device to ensure that a “destination” device is authorized to receive a requested data object. The source device and destination device can communicate via a first communication channel (which can be on a wide-area network) to exchange public keys, then use the public keys to verify their identities and establish a secure session on a second communication channel (which can be a local channel). The data object can be transferred via the secure session. Prior to sending the data object, the source device can perform secondary verification operations (in addition to the key exchange) to confirm the identity of the second device and/or the locality of the connection on the second communication channel.
-
公开(公告)号:US11283703B2
公开(公告)日:2022-03-22
申请号:US16405221
申请日:2019-05-07
Applicant: Apple Inc.
Inventor: Joe S. Abuan , Bob Bradley , Craig P. Dooley , Gregg J. Golembeski, Jr. , Andrew W. Burks , Srinivas Rama , Arun G. Mathias , Anush G. Nadathur , Kevin P. McLaughlin
IPC: H04L29/06 , H04L43/10 , G06F11/30 , H04W4/70 , H04L67/303 , H04L67/04 , H04L67/12 , H04L67/02 , H04L9/00 , H04L9/08 , H04L9/32 , G06F21/44 , H04W12/50 , H04W12/04 , H04W4/80 , H04W12/06
Abstract: A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
-
公开(公告)号:US20200296168A1
公开(公告)日:2020-09-17
申请号:US16892207
申请日:2020-06-03
Applicant: Apple Inc.
Inventor: Brent M. Ledvina , Kevin P. McLaughlin , David R. Stites , Jahshan A. Bhatti , Kevin Duffy , Robert William Mayor
Abstract: Techniques for suggesting accessory devices controlled by an application executing on a mobile device are disclosed. A method includes measuring one or more sensor values using one or more sensors of a mobile device and the one or more sensor values are determined from one or more signals emitted by a first one or more accessory devices. An area of a physical space for the first one or more accessory devices can be determined based on the one or more sensor values. A second one or more accessory devices associated with the same area as the first one or more accessory devices can be suggested to a user.
-
公开(公告)号:US10764153B2
公开(公告)日:2020-09-01
申请号:US15275342
申请日:2016-09-24
Applicant: Apple Inc.
Inventor: Kevin P. McLaughlin , Serhat S. Bucak , Sumit Saxena , Anush Nadathur , Arun Mathias
IPC: G06F3/0482 , G06F3/0484 , H04L12/24 , G06F9/451 , H04W12/10 , H04W12/00 , G06Q10/06 , H04L12/28 , H04W4/00
Abstract: In some implementations, a user device can automatically generate scene suggestions and/or trigger suggestions. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the user device can cause the accessories associated with the scene to assume the corresponding accessory states. The user device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The user device can automatically determine triggers for automatically invoking scenes based on historical patterns of use. For example, the user device can analyze historical context (e.g., location, time, accessory state, etc.) data associated with accessory state transitions to determine triggers for automatically invoking a scene. The user device can present suggest scenes and/or triggers to the user of the user device.
-
公开(公告)号:US20200228362A1
公开(公告)日:2020-07-16
申请号:US16816709
申请日:2020-03-12
Applicant: Apple Inc.
Inventor: Anush G. Nadathur , Srinivas Rama , Matthew C. Lucas , Nathan E. Carroll , Kevin P. McLaughlin , Thomas A. Dilligan , Arun G. Mathias
Abstract: An automated environment can include multiple controller devices capable of communicating with multiple accessory devices. The controller devices can automatically elect one of their number as a coordinator device for the environment and can automatically perform a new election if an incumbent coordinator becomes unavailable or resigns. The election processes can be transparent to any users. An elected coordinator can perform various operations to facilitate management of the automated environment, including routing of communications between controllers and accessories.
-
公开(公告)号:US10251054B2
公开(公告)日:2019-04-02
申请号:US15698950
申请日:2017-09-08
Applicant: APPLE INC.
Inventor: Mehdi Ziat , Christopher Sharp , Kevin P. McLaughlin , Li Li , Jerrold V. Hauck , Yousuf H. Vaid
Abstract: Systems and methods for validating and applying modifications to a policy control function (PCF) of a station. The methods include generating a PCF package including a modification to a PCF, and determining whether the PCF package is to be transmitted to the station by a first or second entity. The methods further include when the PCF package is to be transmitted by the first entity, including a first signature of the first entity in a deliverer field of the PCF package, and when the PCF package is to be transmitted by the second entity, including the first signature in an owner field and a second signature of the second entity in the deliverer field. The methods further include receiving the PCF package from the first or second entity, determining whether the PCF package is valid, and applying the modification to the PCF when it is determined the PCF package is valid.
-
-
-
-
-
-
-
-
-