User interface for a device requesting remote authorization
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
H04L-029/08
H04W-088/02
출원번호
US-0269801
(2016-09-19)
등록번호
US-9847999
(2017-12-19)
발명자
/ 주소
Van Os, Marcel
Anton, Peter D.
Dicker, George R.
Pitschel, Donald W.
Shearer, Nicholas J.
Alabi, Oluwatomiwa B.
Diederich, Anton K.
출원인 / 주소
Apple Inc.
대리인 / 주소
Dentons US LLP
인용정보
피인용 횟수 :
2인용 특허 :
114
초록▼
The present disclosure generally relates to techniques for managing a remote authorization to proceed with an action, such as creating a secure network connection. In some examples, a requesting device receives selection of one or more options. The requesting device transmits a request to proceed wi
The present disclosure generally relates to techniques for managing a remote authorization to proceed with an action, such as creating a secure network connection. In some examples, a requesting device receives selection of one or more options. The requesting device transmits a request to proceed with an action to an authenticating device. The authenticating device concurrently displays an indication of the request to proceed with the action, information about the selected one or more options, and an indication of the requesting device. The authenticating device receives authorization to proceed with the action and transmits a response to the requesting device regarding the request to proceed with the action.
대표청구항▼
1. A method, comprising: receiving, at a requesting device with a display, selection of one or more options;receiving, at the requesting device, selection of an option to proceed with an action associated with the selected one or more options;transmitting, by the requesting device, a request to proc
1. A method, comprising: receiving, at a requesting device with a display, selection of one or more options;receiving, at the requesting device, selection of an option to proceed with an action associated with the selected one or more options;transmitting, by the requesting device, a request to proceed with the action, wherein the request includes information about the selected one or more options;receiving, by an authenticating device with a display, the request to proceed with the action;concurrently displaying, on the display of the authenticating device: an indication of the request to proceed with the action,the information about the selected one or more options, andan indication of the requesting device;displaying, on the display of the authenticating device, a request for authorization to proceed with the action;receiving, at the authenticating device, an input that is responsive to the request for authorization to proceed with the action;transmitting, by the authenticating device, a response to the request to proceed with the action, the response to the request to proceed with the action based on the input that is responsive to the request for authorization to proceed with the action;receiving, by the requesting device, the response to the request to proceed with the action;in accordance with a determination, at the requesting device, that the response to the request to proceed with the action indicates that the authorization at the authenticating device was successful, displaying, on the display of the requesting device, an indication that the authorization was successful; andin accordance with a determination, at the requesting device, that the response to the request to proceed with the action indicates that the authorization at the authenticating device was not successful, displaying, on the display of the requesting device, an indication that the authorization was not successful. 2. The method of claim 1, wherein the authenticating device includes hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action and wherein the requesting device does not include the hardware. 3. The method of claim 2, wherein the action is creating a secure network connection between the authenticating device and a remote server, the method further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, proceeding, by the authenticating device, with the action using the hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action. 4. The method of claim 2, wherein the action is creating a secure network connection between the requesting device and a remote server, the method further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, transmitting, by the authenticating device, a token to the requesting device, the token generated using hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action;receiving, at the requesting device, the token from the authenticating device; andproceeding, by the requesting device, with the action using the token received from the authenticating device. 5. The method of claim 1, wherein the indication of the requesting device includes a graphical representation of the requesting device. 6. The method of claim 1, wherein the authenticating device is in a locked state when receiving, at the authenticating device, the input that is responsive to the request for authorization to proceed with the action, the method further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, maintaining the authenticating device in the locked state while transmitting, by the authenticating device, the response to the request to proceed with the action, the response to the request to proceed with the action based on the input. 7. The method of claim 1, wherein the requesting device is signed into a service using an account when transmitting the request to proceed with the action and the authenticating device is signed into the service using the account when receiving the request to proceed with the action. 8. The method of claim 1, further comprising: transmitting, by the authenticating device, a token to a server, wherein the server uses the token to obtain a resource associated with the token. 9. The method of claim 1, further comprising: transmitting, by the requesting device, a token to a server, wherein the server uses the token to obtain a resource associated with the token. 10. The method of claim 1, wherein the authenticating device is a phone and the requesting device is a television device. 11. The method of claim 1, wherein the authenticating device is a phone and the requesting device is a computer. 12. The method of claim 1, wherein the authenticating device is a wearable device and the requesting device is a television device. 13. The method of claim 1, wherein the authenticating device is a wearable device and the requesting device is a computer. 14. A system, comprising: a requesting device, including: a display;one or more processors; andmemory storing one or more programs, wherein the one or more programs are configured to be executed by the one or more processors, the one or more programs including instructions for: receiving selection of one or more options;receiving selection of an option to proceed with an action associated with the selected one or more options;transmitting a request to proceed with the action, wherein the request includes information about the selected one or more options;receiving a response to the request to proceed with the action;in accordance with a determination that the response to the request to proceed with the action indicates that the authorization at the authenticating device was successful, displaying, on the display, an indication that the authorization was successful; andin accordance with a determination that the response to the request to proceed with the action indicates that the authorization at the authenticating device was not successful, displaying, on the display, an indication that the authorization was not successful; andan authenticating device, including: a display;one or more processors; andmemory storing one or more programs, wherein the one or more programs are configured to be executed by the one or more processors, the one or more programs including instructions for: receiving the request to proceed with the action;concurrently displaying, on the display: an indication of the request to proceed with the action,the information about the selected one or more options, andan indication of the requesting device;displaying, on the display, a request for authorization to proceed with the action;receiving an input that is responsive to the request for authorization to proceed with the action; andtransmitting the response to the request to proceed with the action, the response to the request to proceed with the action based on the input that is responsive to the request for authorization to proceed with the action. 15. The system of claim 14, wherein the authenticating device includes hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action and wherein the requesting device does not include the hardware. 16. The system of claim 15, wherein the action is creating a secure network connection between the authenticating device and a remote server, the system further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, proceeding, by the authenticating device, with the action using the hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action. 17. The system of claim 15, wherein the action is creating a secure network connection between the requesting device and a remote server, the system further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, transmitting, by the authenticating device, a token to the requesting device, the token generated using hardware configured to respond to the input that is responsive to the request for authorization to proceed with the action;receiving, at the requesting device, the token from the authenticating device; andproceeding, by the requesting device, with the action using the token received from the authenticating device. 18. The system of claim 14, wherein the indication of the requesting device includes a graphical representation of the requesting device. 19. The system of claim 14, wherein the authenticating device is in a locked state when receiving, at the authenticating device, the input that is responsive to the request for authorization to proceed with the action, the system further comprising: in response to determining, at the authenticating device, that the input that is responsive to the request for authorization to proceed with the action is consistent with input authorized to proceed with the action, maintaining the authenticating device in the locked state while transmitting, by the authenticating device, the response to the request to proceed with the action, the response to the request to proceed with the action based on the input. 20. The system of claim 14, wherein the requesting device is signed into a service using an account when transmitting the request to proceed with the action and the authenticating device is signed into the service using the account when receiving the request to proceed with the action. 21. The system of claim 14, further comprising: transmitting, by the authenticating device, a token to a server, wherein the server uses the token to obtain a resource associated with the token. 22. The system of claim 14, further comprising: transmitting, by the requesting device, a token to a server, wherein the server uses the token to obtain a resource associated with the token. 23. The system of claim 14, wherein the authenticating device is a phone and the requesting device is a television device. 24. The system of claim 14, wherein the authenticating device is a phone and the requesting device is a computer. 25. The system of claim 14, wherein the authenticating device is a wearable device and the requesting device is a television device. 26. The system of claim 14, wherein the authenticating device is a wearable device and the requesting device is a computer.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (114)
Dimitri Kanevsky ; Stephane H. Maes, Apparatus and methods for user recognition employing behavioral passwords.
Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
Mitsuyu,Norihisa; Higuchi,Teruyuki, Fingerprint authenticating system for carrying out a fingerprint authentication by using a small fingerprint sensor.
Fitzpatrick Greg P. (Rochester MN) Haynes Thomas R. (Euless TX) Williams Marvin L. (Lewisville TX), Method and apparatus for accessing touch screen desktop objects via fingerprint recognition.
Clement, Patrick; Clement, Joelle; Kuhn, Jonathan; Moret, Antoine, Method and apparatus for using near field communication (NFC) to perform transactions on a mobile device.
Shieh Johnny Meng-Han ; Maddalozzo ; Jr. John ; McBrearty Gerald Francis, Method and system for calibrating touch screen sensitivities according to particular physical characteristics associated with a user.
Bilger Aaron ; Dudgeon Michael ; Finley Michael C. ; Wade John, Method and system for entry of encrypted and non-encrypted information on a touch screen.
Jung, Jae Lark; Bae, Kyoung duck, Method, mobile communication terminal and computer-readable recording medium for performing specific function when mobile recording medium for performing specific function when mobile communication terminal is activated.
Senga, Masahiro, Object identifying device, mobile phone, object identifying method, program executable on computer for operating the object identifying device and computer-readable medium including the program.
Allard David J. (Boynton Beach FL) Canova ; Jr. Francis J. (Boynton Beach FL) Johnson Debra A. G. (Fort Lauderdale FL) Lanier Charles S. (Delray Beach FL) Lewis James R. (Coconut Creek FL) Tiller Byr, Personal communicator having improved zoom and pan functions for editing information on touch sensitive display.
Pisula, Charles J.; Newman, Lucas C.; Anzures, Freddy Allen; Ganatra, Nitin K., Portable touch screen device, method, and graphical user interface for providing workout support.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Single sign-on access in an orchestration framework for connected devices.
Kushevsky, Mikhail; Fainshtein, Michael; Martinsons, Valdis Andris, System and method of loading a transaction card and processing repayment on a mobile device.
Jobs, Steven P.; Forstall, Scott; Christie, Greg; Ording, Bas; Chaudhri, Imran; Lemay, Stephen O.; Van Os, Marcel; Anzures, Freddy Allen; Matas, Mike, Telephone interface for a portable communication device.
Han, Byron; Shepherd, Matthew E.; Chaudhri, Imran; Christie, Gregory N.; Coffman, Patrick L.; Federighi, Craig M.; Gamble, Matthew H.; Paine, Brittany D.; Langoulant, Brendan J.; Marciniak, Craig A.; Pitschel, Donald W.; Schimpf, Daniel O.; Whalley, Andrew R.; Whitney, Christopher R.; Dascola, Jonathan R.; Yang, Lawrence Y., Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.