Patents by Inventor Marc J. Krochmal

Marc J. Krochmal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12294655
    Abstract: A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.
    Type: Grant
    Filed: November 7, 2022
    Date of Patent: May 6, 2025
    Assignee: Apple Inc.
    Inventors: Conrad Sauerwald, Alexander Ledwith, John Iarocci, Marc J. Krochmal, Wade Benson, Gregory Novick, Noah Witherspoon
  • Patent number: 12267206
    Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.
    Type: Grant
    Filed: October 4, 2023
    Date of Patent: April 1, 2025
    Assignee: Apple Inc.
    Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
  • Publication number: 20250106636
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Application
    Filed: December 9, 2024
    Publication date: March 27, 2025
    Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Robert D. WATSON, Ariane COTTE, Bob BRADLEY, Marc J. KROCHMAL, Kang SUN, Chen GANIR, Sarang S. RANADE, Akshay MANGALAM SRIVATSA
  • Publication number: 20250055936
    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As another example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
    Type: Application
    Filed: October 25, 2024
    Publication date: February 13, 2025
    Applicant: Apple Inc.
    Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
  • Patent number: 12185112
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Grant
    Filed: September 14, 2023
    Date of Patent: December 31, 2024
    Assignee: Apple Inc.
    Inventors: Natalia A. Fornshell, Aarti Kumar, Robert D. Watson, Ariane Cotte, Bob Bradley, Marc J. Krochmal, Kang Sun, Chen Ganir, Sarang S. Ranade, Akshay Mangalam Srivatsa
  • Patent number: 12177378
    Abstract: A mobile device can include ranging circuitry to determine distance to another mobile device. A first wireless protocol can establish an initial communication session to perform authentication and/or exchange ranging settings. A second protocol can perform ranging, and other wireless protocols can transmit content. In one example, the distance information can be used to display a relative position of another device on a user interface of a sending device. The user interface can allow a user to quickly and accurately select the recipient device for sending the data item. As another example, the distance information obtained from ranging can be used to trigger a notification (e.g., a reminder) to be output from a first mobile device or used to display a visual indicator on a receiving device. Proximity of a device (e.g., as determined by a distance) can be used to suggest recipient for a new communication.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: December 24, 2024
    Assignee: Apple Inc.
    Inventors: Brent M. Ledvina, Marc J. Krochmal, Robert W. Brumley, Sriram Hariharan
  • Publication number: 20240394358
    Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
    Type: Application
    Filed: August 2, 2024
    Publication date: November 28, 2024
    Inventors: Bob BRADLEY, William M. BUMGARNER, Vijay SUNDARAM, Marc J. KROCHMAL
  • Publication number: 20240388918
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Application
    Filed: July 29, 2024
    Publication date: November 21, 2024
    Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Akshay MANGALAM SRIVATSA, Ariane COTTE, Bob BRADLEY, Chen GANIR, Kang SUN, Marc J. KROCHMAL, Robert D. WATSON, Sarang S. RANADE
  • Publication number: 20240388917
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Application
    Filed: July 29, 2024
    Publication date: November 21, 2024
    Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Akshay MANGALAM SRIVATSA, Ariane COTTE, Bob BRADLEY, Chen GANIR, Kang SUN, Marc J. KROCHMAL, Robert D. WATSON, Sarang S. RANADE
  • Patent number: 12113784
    Abstract: Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
    Type: Grant
    Filed: February 9, 2023
    Date of Patent: October 8, 2024
    Assignee: Apple Inc.
    Inventors: Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John Iarocci, Jerrold V. Hauck, Michael Brouwer, Mitchell D. Adler, Yannick L Sierra
  • Patent number: 12067105
    Abstract: Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
    Type: Grant
    Filed: May 18, 2023
    Date of Patent: August 20, 2024
    Assignee: Apple Inc.
    Inventors: Bob Bradley, William M. Bumgarner, Vijay Sundaram, Marc J. Krochmal
  • Patent number: 11997496
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: May 28, 2024
    Assignee: Apple Inc.
    Inventors: Natalia A Fornshell, Aarti Kumar, Robert D. Watson, Ariane Cotte, Bob Bradley, Marc J. Krochmal, Kang Sun, Chen Ganir, Sarang S. Ranade, Akshay Mangalam Srivatsa
  • Publication number: 20240048985
    Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
    Type: Application
    Filed: October 18, 2023
    Publication date: February 8, 2024
    Inventors: Alexander D. SANCIANGCO, Bob BRADLEY, Marc J. KROCHMAL, Nathan A. KRALIAN, Welly KASTEN, Patrick L. COFFMAN
  • Publication number: 20240031223
    Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.
    Type: Application
    Filed: October 4, 2023
    Publication date: January 25, 2024
    Applicant: Apple Inc.
    Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
  • Patent number: 11876806
    Abstract: Techniques are disclosed relating to user authentication. In some embodiments, a first computing device receives, from a second computing device, a request for a user credential to be input into an authentication prompt associated with the second device. The first computing device determines a proximity associated with the second computing device based on a received wireless location beacon and, based on the request and the determined proximity, presents a selection prompt asking a user of the first computing device to select a user credential stored in the first computing device. The first computing device then provides the selected user credential to the second computing device to input into the authentication prompt. In some embodiments, the first computing device receives the wireless location beacon from a remote controller of the second computing device and determines a proximity based on a signal strength associated with the received location beacon.
    Type: Grant
    Filed: June 24, 2022
    Date of Patent: January 16, 2024
    Assignee: Apple Inc.
    Inventors: Conrad A. Shultz, Alexander D. Sanciangco, Brent M. Ledvina, Chelsea E. Pugh, Kyle C. Brogle, Marc J. Krochmal, Maureen G. Daum, Reza Abbasian, Richard J. Mondello, Jacob S. Klapper
  • Publication number: 20240007863
    Abstract: A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
    Type: Application
    Filed: September 14, 2023
    Publication date: January 4, 2024
    Inventors: Natalia A. FORNSHELL, Aarti KUMAR, Robert D. WATSON, Ariane COTTE, Bob BRADLEY, Marc J. KROCHMAL, Kang SUN, Chen GANIR, Sarang S. RANADE, Akshay MANGALAM SRIVATSA
  • Publication number: 20230397005
    Abstract: The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
    Type: Application
    Filed: August 22, 2023
    Publication date: December 7, 2023
    Inventors: Bob BRADLEY, Marc J. KROCHMAL
  • Patent number: 11832100
    Abstract: This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: November 28, 2023
    Assignee: Apple Inc.
    Inventors: Alexander D. Sanciangco, Bob Bradley, Marc J. Krochmal, Nathan A. Kralian, Welly Kasten, Patrick L Coffman
  • Patent number: 11805009
    Abstract: Embodiments of the present disclosure are directed towards techniques for adjusting a network connection of an accessory. In some examples, the computing device can determine that the accessory is not connected to a network (e.g., the same network to which the computing device is connected). The network may utilize a first connection type. Using a second type of connection, the computing device may determine an appropriate network for connection with the accessory. The computing device may then transmit instructions to the accessory, using the second type of connection, to adjust its network connection to be connected to the determined network. The determined network may use the first connection type.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: October 31, 2023
    Assignee: Apple Inc.
    Inventors: Franco Travostino, Keith W. Rauenbuehler, Marc J. Krochmal, Nicholas M. Fraioli, Anush G. Nadathur
  • Publication number: 20230344903
    Abstract: One embodiment provides for an electronic device, comprising a non-transitory machine-readable medium to store instructions, one or more processors to execute the instructions, and a memory coupled to the one or more processors. The memory can be configured to store a set of synchronization data associated with interaction between the electronic device and one or more applications and instructions which, when executed by the one or more processors, configure the one or more processors to retrieve a set of synchronization data to be transmitted from the electronic device to select a transport channel from one of a peer-to-peer channel or a network-based channel and transmit the set of synchronization data from the electronic device to one or more remote devices via the selected transport channel.
    Type: Application
    Filed: June 29, 2023
    Publication date: October 26, 2023
    Applicant: Apple Inc.
    Inventors: Joao Pedro De Almeida Forjaz de Lacerda, Giovanni M. Agnoli, Bob Bradley, Joshua R. Ford, Michael D. Ford, Brian E. Korver, Marc J. Krochmal, Joseph E. Meyer, Jared K. McGann, Rex C. Ross, Paul W. Salzman, Christopher G. Skogen