Patents by Inventor Marc J. Krochmal
Marc J. Krochmal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240048985Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.Type: ApplicationFiled: October 18, 2023Publication date: February 8, 2024Inventors: Alexander D. SANCIANGCO, Bob BRADLEY, Marc J. KROCHMAL, Nathan A. KRALIAN, Welly KASTEN, Patrick L. COFFMAN
-
Publication number: 20240031223Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.Type: ApplicationFiled: October 4, 2023Publication date: January 25, 2024Applicant: Apple Inc.Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
-
Patent number: 11876806Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.Type: GrantFiled: June 24, 2022Date of Patent: January 16, 2024Assignee: Apple Inc.Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper
-
Publication number: 20240007863Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.Type: ApplicationFiled: September 14, 2023Publication date: January 4, 2024Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Robert D. WATSON, Ariane COTTE, Bob BRADLEY, Marc J. KROCHMAL, Kang SUN, Chen GANIR, Sarang S. RANADE, Akshay MANGALAM SRIVATSA
-
Publication number: 20230397005Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.Type: ApplicationFiled: August 22, 2023Publication date: December 7, 2023Inventors: Bob BRADLEY, Marc J. KROCHMAL
-
Patent number: 11832100Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.Type: GrantFiled: September 29, 2017Date of Patent: November 28, 2023Assignee: Apple Inc.Inventors: Alexander D. Sanciangco, Bob Bradley, Marc J. Krochmal, Nathan A. Kralian, Welly Kasten, Patrick L Coffman
-
Patent number: 11805009Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.Type: GrantFiled: September 24, 2018Date of Patent: October 31, 2023Assignee: Apple Inc.Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
-
Publication number: 20230344903Abstract: One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.Type: ApplicationFiled: June 29, 2023Publication date: October 26, 2023Applicant: Apple Inc.Inventors: Joao Pedro De Almeida Forjaz de Lacerda, Giovanni M. Agnoli, Bob Bradley, Joshua R. Ford, Michael D. Ford, Brian E. Korver, Marc J. Krochmal, Joseph E. Meyer, Jared K. McGann, Rex C. Ross, Paul W. Salzman, Christopher G. Skogen
-
Patent number: 11799955Abstract: One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.Type: GrantFiled: May 23, 2019Date of Patent: October 24, 2023Assignee: Apple Inc.Inventors: Joao Pedro De Almeida Forjaz de Lacerda, Giovanni M. Agnoli, Bob Bradley, Joshua R. Ford, Michael D. Ford, Brian E. Korver, Marc J. Krochmal, Joseph E. Meyer, Jared K. McGann, Rex C. Ross, Paul W. Salzman, Christopher G. Skogen
-
Patent number: 11792242Abstract: Content objects may be selected for sharing and shared across devices using a sharing routine and suggestion engine to provide suggestions of target applications to share the content objects and recipients with whom the content objects may be shared. A sharing routine may receive and analyze a sharing request and invoke a suggestion engine configured to generate application suggestions and/or recipient suggestions. The sharing routine may receive sets of application suggestions and/or recipient suggestions from a suggestion engine, modify and/or select subsets of the suggestions to be provided to user via a sharing user interface. In response to a user selection of applications and/or recipient via the user interface, the sharing routine may invoke the selected application for sharing, and provide the content object to the selected application.Type: GrantFiled: September 17, 2019Date of Patent: October 17, 2023Assignee: Apple Inc.Inventors: Marc J. Krochmal, John J. Iarocci, Joseph E. Meyer, Chiraag Sumanth, Joao Pedro Lacerda, Jacob Klapper
-
Publication number: 20230300122Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.Type: ApplicationFiled: February 9, 2023Publication date: September 21, 2023Inventors: Wade BENSON, Marc J. KROCHMAL, Alexander R. LEDWITH, John IAROCCI, Jerrold V. HAUCK, Michael BROUWER, Mitchell D. ADLER, Yannick L. SIERRA
-
Patent number: 11765585Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.Type: GrantFiled: September 2, 2021Date of Patent: September 19, 2023Assignee: Apple Inc.Inventors: Bob Bradley, Marc J. Krochmal
-
Publication number: 20230289430Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Inventors: Bob BRADLEY, William M. BUMGARNER, Vijay SUNDARAM, Marc J. KROCHMAL
-
Publication number: 20230231718Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.Type: ApplicationFiled: November 7, 2022Publication date: July 20, 2023Inventors: Conrad SAUERWALD, Alexander LEDWITH, John IAROCCI, Marc J. KROCHMAL, Wade BENSON, Gregory NOVICK, Noah WITHERSPOON
-
Patent number: 11693946Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.Type: GrantFiled: November 24, 2020Date of Patent: July 4, 2023Assignee: Apple Inc.Inventors: Bob Bradley, William M. Bumgarner, Vijay Sundaram, Marc J. Krochmal
-
Patent number: 11671530Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As other example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.Type: GrantFiled: May 6, 2021Date of Patent: June 6, 2023Assignee: Apple Inc.Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
-
Patent number: 11662797Abstract: This application relates to techniques that adjust the sleep states of a computing device based on proximity detection and predicted user activity. Proximity detection procedures can be used to determine a proximity between the computing device and a remote computing device coupled to the user. Based on these proximity detection procedures, the computing device can either correspondingly increase or decrease the amount power supplied to the various components during either a low-power sleep state or a high-power sleep state. Additionally, historical user activity data gathered on the computing device can be used to predict when the user will likely use the computing device. Based on the gathered historical user activity, deep sleep signals and light sleep signals can be issued at a time when the computing device is placed within a sleep state which can cause it to enter either a low-power sleep state or a high-power sleep state.Type: GrantFiled: February 17, 2022Date of Patent: May 30, 2023Inventors: Varaprasad V. Lingutla, Kartik R. Venkatraman, Marc J. Krochmal
-
Publication number: 20230051718Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As another example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.Type: ApplicationFiled: October 31, 2022Publication date: February 16, 2023Applicant: Apple Inc.Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
-
Patent number: 11582215Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.Type: GrantFiled: September 23, 2016Date of Patent: February 14, 2023Assignee: Apple Inc.Inventors: Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John Iarocci, Jerrold V. Hauck, Michael Brouwer, Mitchell D. Adler, Yannick L. Sierra
-
Publication number: 20230008448Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.Type: ApplicationFiled: June 24, 2022Publication date: January 12, 2023Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper