Abstract:
An approach is provided for providing adaptable schema based payloads for state advertisement messages. In some implementations, multiple schemas (e.g., payload data and structure definition) can be used to flexibly and dynamically define advertisement message payloads. For example, the computing device can use advertising message to share and broadcast information between devices by using adaptable schema based payloads. The computing device can store schemas, receive service advertising data, and determine a schema for encoding service advertising data into an advertising message. The computing device can generate the advertising message, encode a schema identifier into the advertising message header, and encode device state data into the advertising message payload according to the determined schema. In some implementations, the computing device can receive advertising message, determine a schema based on a schema identifier in the message, and extract device state data from the advertising message according to the determined schema.
Abstract:
Systems and methods for transitioning between networks are disclosed. A multifunction device detects a vehicle network advertisement beacon over a first communication channel. The vehicle network advertisement beacon indicates wireless network capabilities of a wireless networking device hosting a wireless network in a vehicle. Responsive to detecting the vehicle network beacon over the first communication channel, a handoff process for migrating the multifunction device from a first wireless network to the wireless network in the vehicle is performed.
Abstract:
A secure wireless communication link (pairing) between two devices can be established using cleartext wireless transmissions between devices not joined to a network (“probes”). One device can broadcast a first probe indicating that it is seeking to establish a pairing. The other device can respond with a second probe, and the two devices can establish a shared secret, e.g., by exchanging further information using additional probes. Thereafter, either device can send a message to the other by encrypting the message using a cryptographic key derived from the shared secret; encrypted messages can also be sent within probes. The receiving device can extract an encrypted message from a probe and decrypt it using the cryptographic key. The encrypted message can include credentials usable by the receiving device to join a wireless network.
Abstract:
Methods and apparatus for providing primary transport service discovery information over one or more alternate transports that are not normally associated with the primary transport services. In one embodiment, the primary transport comprises a first wireless interface (e.g., Bluetooth), and the alternate transport comprises a second wireless interface (e.g., WiFi or WiMAX). Service profile information relating to the primary transport is broadcast to other users over the alternate transport in a more efficient and streamlined manner than that available on the primary transport. The other users store this service profile information so that it can be subsequently accessed for service profile discovery of the transmitting device by those other devices, thereby obviating subsequent transfer of the data over any transport (primary or alternate).
Abstract:
Embodiments of the present disclosure provide systems, methods, and computer-readable medium for pairing two proximate devices. An advertisement message associated with an accessory device may be received by a host device (e.g., a smart phone). The advertisement message may be communicated using a Bluetooth protocol (e.g., BLE). Payload data may be extracted from the advertisement message and utilized to obtain a media asset (e.g., an image, a video, an icon, etc.) associated with the accessory device. The media asset may be presented via a user interface at the host device. Input may be received indicating a request and/or an approval to perform a pairing procedure with the accessory device. In accordance with the input, the host device may execute the pairing procedure with the accessory device.
Abstract:
Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
Abstract:
At a portable electronic device that includes a portable-device display and is in communication with a vehicle display, displaying a first user interface on the portable-device display. Sending, from the portable electronic device to the vehicle display, information for generating a second user interface, the second user interface including an affordance. While the second user interface is displayed on the vehicle display, detecting an input activating the affordance in the second user interface, and in response, causing the portable electronic device to invoke a digital assistant. In response to invoking the digital assistant, prompting a user for an audible request. In response to receiving the audible request, causing display, within the second user interface, of a digital assistant dialogue box; and subsequently causing display, within the second user interface, of a user interface object associated with a search result, and maintaining the first user interface on the portable-device display.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
In some embodiments, one or more wireless stations operate to configure direct communication with neighboring mobile stations, e.g., direct communication between the wireless stations without utilizing an intermediate access point. Embodiments of the disclosure relate to a mechanism for a device to trigger, via a first interface, service discovery over a second interface. In some embodiments, the service discovery can involve the exchange of one or more Bloom filters.