Patents by Inventor Marc J. Krochmal

Marc J. Krochmal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240048985
    Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
    Type: Application
    Filed: October 18, 2023
    Publication date: February 8, 2024
    Inventors: Alexander D. SANCIANGCO, Bob BRADLEY, Marc J. KROCHMAL, Nathan A. KRALIAN, Welly KASTEN, Patrick L. COFFMAN
  • Publication number: 20240031223
    Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.
    Type: Application
    Filed: October 4, 2023
    Publication date: January 25, 2024
    Applicant: Apple Inc.
    Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
  • Patent number: 11876806
    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
    Type: Grant
    Filed: June 24, 2022
    Date of Patent: January 16, 2024
    Assignee: Apple Inc.
    Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper
  • Publication number: 20240007863
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Application
    Filed: September 14, 2023
    Publication date: January 4, 2024
    Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Robert D. WATSON, Ariane COTTE, Bob BRADLEY, Marc J. KROCHMAL, Kang SUN, Chen GANIR, Sarang S. RANADE, Akshay MANGALAM SRIVATSA
  • Publication number: 20230397005
    Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
    Type: Application
    Filed: August 22, 2023
    Publication date: December 7, 2023
    Inventors: Bob BRADLEY, Marc J. KROCHMAL
  • Patent number: 11832100
    Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: November 28, 2023
    Assignee: Apple Inc.
    Inventors: Alexander D. Sanciangco, Bob Bradley, Marc J. Krochmal, Nathan A. Kralian, Welly Kasten, Patrick L Coffman
  • Patent number: 11805009
    Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: October 31, 2023
    Assignee: Apple Inc.
    Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
  • Publication number: 20230344903
    Abstract: One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.
    Type: Application
    Filed: June 29, 2023
    Publication date: October 26, 2023
    Applicant: Apple Inc.
    Inventors: Joao Pedro De Almeida Forjaz de Lacerda, Giovanni M. Agnoli, Bob Bradley, Joshua R. Ford, Michael D. Ford, Brian E. Korver, Marc J. Krochmal, Joseph E. Meyer, Jared K. McGann, Rex C. Ross, Paul W. Salzman, Christopher G. Skogen
  • Patent number: 11799955
    Abstract: One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.
    Type: Grant
    Filed: May 23, 2019
    Date of Patent: October 24, 2023
    Assignee: Apple Inc.
    Inventors: Joao Pedro De Almeida Forjaz de Lacerda, Giovanni M. Agnoli, Bob Bradley, Joshua R. Ford, Michael D. Ford, Brian E. Korver, Marc J. Krochmal, Joseph E. Meyer, Jared K. McGann, Rex C. Ross, Paul W. Salzman, Christopher G. Skogen
  • Patent number: 11792242
    Abstract: Content objects may be selected for sharing and shared across devices using a sharing routine and suggestion engine to provide suggestions of target applications to share the content objects and recipients with whom the content objects may be shared. A sharing routine may receive and analyze a sharing request and invoke a suggestion engine configured to generate application suggestions and/or recipient suggestions. The sharing routine may receive sets of application suggestions and/or recipient suggestions from a suggestion engine, modify and/or select subsets of the suggestions to be provided to user via a sharing user interface. In response to a user selection of applications and/or recipient via the user interface, the sharing routine may invoke the selected application for sharing, and provide the content object to the selected application.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: October 17, 2023
    Assignee: Apple Inc.
    Inventors: Marc J. Krochmal, John J. Iarocci, Joseph E. Meyer, Chiraag Sumanth, Joao Pedro Lacerda, Jacob Klapper
  • Publication number: 20230300122
    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
    Type: Application
    Filed: February 9, 2023
    Publication date: September 21, 2023
    Inventors: Wade BENSON, Marc J. KROCHMAL, Alexander R. LEDWITH, John IAROCCI, Jerrold V. HAUCK, Michael BROUWER, Mitchell D. ADLER, Yannick L. SIERRA
  • Patent number: 11765585
    Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
    Type: Grant
    Filed: September 2, 2021
    Date of Patent: September 19, 2023
    Assignee: Apple Inc.
    Inventors: Bob Bradley, Marc J. Krochmal
  • Publication number: 20230289430
    Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
    Type: Application
    Filed: May 18, 2023
    Publication date: September 14, 2023
    Inventors: Bob BRADLEY, William M. BUMGARNER, Vijay SUNDARAM, Marc J. KROCHMAL
  • Publication number: 20230231718
    Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
    Type: Application
    Filed: November 7, 2022
    Publication date: July 20, 2023
    Inventors: Conrad SAUERWALD, Alexander LEDWITH, John IAROCCI, Marc J. KROCHMAL, Wade BENSON, Gregory NOVICK, Noah WITHERSPOON
  • Patent number: 11693946
    Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: July 4, 2023
    Assignee: Apple Inc.
    Inventors: Bob Bradley, William M. Bumgarner, Vijay Sundaram, Marc J. Krochmal
  • Patent number: 11671530
    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
    Type: Grant
    Filed: May 6, 2021
    Date of Patent: June 6, 2023
    Assignee: Apple Inc.
    Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
  • Patent number: 11662797
    Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to enter either a low-power sleep state or a high-power sleep state.
    Type: Grant
    Filed: February 17, 2022
    Date of Patent: May 30, 2023
    Inventors: Varaprasad V. Lingutla, Kartik R. Venkatraman, Marc J. Krochmal
  • Publication number: 20230051718
    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As another example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
    Type: Application
    Filed: October 31, 2022
    Publication date: February 16, 2023
    Applicant: Apple Inc.
    Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
  • Patent number: 11582215
    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: February 14, 2023
    Assignee: Apple Inc.
    Inventors: Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John Iarocci, Jerrold V. Hauck, Michael Brouwer, Mitchell D. Adler, Yannick L. Sierra
  • Publication number: 20230008448
    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
    Type: Application
    Filed: June 24, 2022
    Publication date: January 12, 2023
    Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper