US 12,113,784 B2
Modifying security state with secured range detection
Wade Benson, San Jose, CA (US); Marc J. Krochmal, Santa Clara, CA (US); Alexander R. Ledwith, Santa Cruz, CA (US); John Iarocci, Los Gatos, CA (US); Jerrold V. Hauck, Windermere, FL (US); Michael Brouwer, Los Gatos, CA (US); Mitchell D. Adler, Los Gatos, CA (US); and Yannick L Sierra, San Francisco, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Feb. 9, 2023, as Appl. No. 18/107,982.
Application 18/107,982 is a continuation of application No. 15/275,203, filed on Sep. 23, 2016, granted, now 11,582,215.
Claims priority of provisional application 62/349,029, filed on Jun. 12, 2016.
Prior Publication US 2023/0300122 A1, Sep. 21, 2023
Int. Cl. H04L 9/08 (2006.01); G06F 9/445 (2018.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04W 12/041 (2021.01); H04W 12/0431 (2021.01); H04W 12/06 (2021.01); H04W 12/086 (2021.01)
CPC H04L 63/08 (2013.01) [G06F 9/44505 (2013.01); H04L 9/0822 (2013.01); H04L 9/085 (2013.01); H04L 9/0894 (2013.01); H04L 9/14 (2013.01); H04L 9/3226 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 63/083 (2013.01); H04L 63/107 (2013.01); H04L 63/108 (2013.01); H04L 63/1466 (2013.01); H04W 12/041 (2021.01); H04W 12/0431 (2021.01); H04W 12/06 (2013.01); H04W 12/086 (2021.01); H04L 2209/80 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
detecting, by a first device, an announced availability of a second device for modifying a security state at the first device;
exchanging, by the first device and using a first wireless protocol, ranging connection information with the second device;
performing, by the first device, using a second wireless protocol and based on the ranging connection information, a ranging operation with the second device to estimate a distance between the first and second devices; and
in response to determining that the distance satisfies a distance threshold, establishing, by the first device and using the first wireless protocol, a connection with the second device for modifying the security state at the first device.