Apple Inc.
Controlling access to protected functionality of a host device using a wireless device

Last updated:

Abstract:

A wearable device can establish a verified session with a host device (e.g., by establishing that the wearable device is present in the vicinity of the host device and is currently being worn). The existence of such a verified session can be used to control user access to sensitive information that may be stored in or otherwise accessible to a host device. For example, the host device and/or application programs executing thereon can be configured to restrict a user's ability to invoke program functionality that accesses sensitive information based on whether a verified session with a wearable device is currently in progress.

Status:
Grant
Type:

Utility

Filling date:

31 Aug 2020

Issue date:

28 Dec 2021