US 12,177,207 B2
Techniques for verifying user intent and securely configuring computing devices
Jay S. Coggin, Mountain View, CA (US); Daniel C. Klingler, Mountain View, CA (US); Kyle C. Brogle, San Francisco, CA (US); Johannes P. Schmidt, Los Altos Hills, CA (US); Eric A. Allamanche, Sunnyvale, CA (US); Thomas Alsina, Saratoga, CA (US); Bob Bradley, San Jose, CA (US); Alex T. Nelson, Portland, OR (US); Rudolph Van Der Merwe, Portland, OR (US); Joseph M. Triscari, West Linn, OR (US); Keun Sup Lee, Sunnyvale, CA (US); Pedro Mari, Santa Cruz, CA (US); Aaron M. Elder, Los Gatos, CA (US); and Richard M. Powell, Mountain View, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Jun. 23, 2021, as Appl. No. 17/356,487.
Application 17/356,487 is a continuation of application No. 16/579,712, filed on Sep. 23, 2019, granted, now 11,050,737.
Application 16/579,712 is a continuation of application No. 15/721,301, filed on Sep. 29, 2017, granted, now 10,432,614, issued on Oct. 1, 2019.
Claims priority of provisional application 62/556,359, filed on Sep. 9, 2017.
Claims priority of provisional application 62/507,150, filed on May 16, 2017.
Prior Publication US 2021/0392129 A1, Dec. 16, 2021
Int. Cl. H04L 9/40 (2022.01); G06F 21/00 (2013.01); G06F 21/45 (2013.01); H04W 12/06 (2021.01); H04W 12/50 (2021.01)
CPC H04L 63/083 (2013.01) [G06F 21/00 (2013.01); G06F 21/45 (2013.01); H04L 63/18 (2013.01); H04W 12/06 (2013.01); H04W 12/50 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising, by at a first device:
establishing a communication link with a second device by:
approving a request received from the second device to establish the communication link with the second device;
receiving, from the second device:
(1) a first signal that encodes an encryption key, and
(2) a second signal that encodes encrypted data, wherein the first and second signals are transmitted through different transmission mediums;
using the encryption key:
decrypting the encrypted data to produce decrypted data; and
using the decrypted data:
forming the communication link with the second device.