Patents by Inventor Kyle C. BROGLE

Kyle C. BROGLE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240214182
    Abstract: Encrypting and securely transmitting data between devices is disclosed. After a device obtains a request to purchase a prescription lens, including prescription data, to be inserted into a second electronic device, the prescription data is securely encrypted and transmitted to the lens manufacturer. The lens manufacturer may create a prescription lens and calibration data related to the lens. The calibration data can be encrypted and transmitted to a storage device for storage. The second electronic device can retrieve the encrypted calibration data from the storage device and utilize it to perform a full calibration of the device. The second electronic device can present images, in accordance with the calibration data, using a display through an optical path that include the prescription lens.
    Type: Application
    Filed: December 26, 2023
    Publication date: June 27, 2024
    Inventors: Srinivas VEDULA, Qihe WANG, Kyle C. BROGLE, Frederic JACOBS, Yannick L. SIERRA, Giuliano PASQUALOTTO, Anup RATHI, Duncan A. MCROBERTS
  • Publication number: 20230421372
    Abstract: Embodiments described herein enable a user to bypass the use of one-time keys or account recovery codes by providing techniques for accessory assisted account recovery. In various embodiments, accessory assisted account recovery makes use of an accessory device of a user, where the accessory device can be any device having a secure processor, cryptographic engine, public key accelerator, or is otherwise able to accelerate cryptographic operations or perform cryptographic operations in a secure execution environment. An account recovery key can be split into multiple portions. At least one portion of the recovery key is then encrypted. The accessory device is then configured to be uniquely capable of decrypting the encrypted portion of an account recovery key.
    Type: Application
    Filed: September 8, 2023
    Publication date: December 28, 2023
    Inventors: YANNICK L. SIERRA, LUCIA E. BALLARD, KYLE C. BROGLE, DJ CAPELIS
  • Publication number: 20230412373
    Abstract: Embodiments described herein enable a user to bypass the use of one-time keys or account recovery codes by providing techniques for accessory assisted account recovery. In various embodiments, accessory assisted account recovery makes use of an accessory device of a user, where the accessory device can be any device having a secure processor, cryptographic engine, public key accelerator, or is otherwise able to accelerate cryptographic operations or perform cryptographic operations in a secure execution environment. An account recovery key can be split into multiple portions. At least one portion of the recovery key is then encrypted. The accessory device is then configured to be uniquely capable of decrypting the encrypted portion of an account recovery key.
    Type: Application
    Filed: April 14, 2020
    Publication date: December 21, 2023
    Inventors: YANNICK L. SIERRA, LUCIA E. BALLARD, KYLE C. BROGLE, DJ CAPELIS
  • Publication number: 20230095816
    Abstract: Aspects of the subject technology provide electronic devices that operate, in part, based on enrolled user characteristics, and that can be operated by a guest user that has not been enrolled. For example, upon determining that a current user of an electronic device storing a first physical model of a primary user is a guest user different from the primary user, the electronic device may obtain initial physical characteristic data for the guest user and generate a guest physical model of the guest user based on the initial physical characteristic data. In one or more implementations, the electronic device may operate based on guest user inputs and the guest physical model of the guest user, while updating the guest physical model based on the guest user inputs.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 30, 2023
    Inventors: David COHEN, Kyle C. BROGLE, Michael J. ROCKWELL, Ranjit DESAI, Joel N. KERR, Amy E. DEDONATO, Joaquim Gonçalo LOBO FERREIRA DA SILVA, Tyler R. CALDERONE, Charilaos PAPADOPOULOS
  • Publication number: 20220334980
    Abstract: Some aspects of this disclosure relate to implementing a thread device that can associate with a thread network. The thread device includes a network processor, a first memory, and a host processor communicatively coupled to the network processor and the first memory. The first memory can be a nonvolatile memory with a first level security protection, and configured to store a first dataset including thread network parameters for the network processor to manage network functions for the thread device associated with the thread network. The host processor is configured to perform various operations associated with the first dataset stored in the first memory. The network processor can be communicatively coupled to a second memory to store a second dataset, where the second dataset has a same content as the first dataset. The network processor is configured to manage the network functions based on the second dataset.
    Type: Application
    Filed: April 15, 2021
    Publication date: October 20, 2022
    Applicant: Apple Inc.
    Inventors: Venkateswara Rao MANEPALLI, Amit GULIA, Andrei TUDORANCEA, Dominic SPILL, Jesus A. GUTIERREZ GOMEZ, Kahraman D. AKDEMIR, Aaron M. SIGEL, William K. ESTES, Kyle C. BROGLE
  • Publication number: 20220237274
    Abstract: The present disclosure generally relates to methods and user interfaces for authentication, including providing and controlling authentication at a computer system using an external device in accordance with some embodiments.
    Type: Application
    Filed: January 28, 2022
    Publication date: July 28, 2022
    Inventors: Grant PAUL, Benjamin BIRON, Kyle C. BROGLE, Naresh Kumar CHINNATHAMBI KAILASAM, Brent M. LEDVINA, Robert W. MAYOR, Nicole WELLS
  • Publication number: 20210392129
    Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 16, 2021
    Inventors: Jay S. COGGIN, Daniel C. KLINGLER, Kyle C. BROGLE, Johannes P. SCHMIDT, Eric A. ALLAMANCHE, Thomas ALSINA, Bob BRADLEY, Alex T. NELSON, Rudolph VAN DER MERWE, Joseph M. TRISCARI, Keun Sup LEE, Pedro MARI, Aaron M. ELDER, Richard M. POWELL
  • Publication number: 20200076788
    Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 5, 2020
    Inventors: Jay S. COGGIN, Daniel C. KLINGLER, Kyle C. BROGLE, Johannes P. SCHMIDT, Eric A. ALLAMANCHE, Thomas ALSINA, Bob BRADLEY, Alex T. NELSON, Rudolph VAN DER MERWE, Joseph M. TRISCARI, Keun Sup LEE, Pedro MARI, Aaron M. ELDER, Richard M. POWELL
  • Publication number: 20180337911
    Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
    Type: Application
    Filed: September 29, 2017
    Publication date: November 22, 2018
    Inventors: Jay S. COGGIN, Daniel C. KLINGLER, Kyle C. BROGLE, Johannes P. SCHMIDT, Eric A. ALLAMANCHE, Thomas ALSINA, Bob BRADLEY, Alex T. NELSON, Rudolph VAN DER MERWE, Joseph M. TRISCARI, Keun Sup LEE, Pedro MARI, Aaron M. ELDER, Richard M. POWELL