Apple Inc.
Controlling access to protected functionality of a host device using a wireless device
Last updated:
Abstract:
A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.
Status:
Grant
Type:
Utility
Filling date:
31 Aug 2020
Issue date:
28 Dec 2021