Abstract:
Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
Abstract:
Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
Abstract:
An accessory can communicate wirelessly with a host device such as a portable electronic device. Existing accessory protocols developed for wired communication can be used without modification, and a wireless network connecting the two devices can provide a transport or channel connecting the two devices. Establishing a wireless channel can involve the active participation of both devices. For instance, the host device can create and identify virtual port to be used by the accessory, after which the accessory can initiate communication on that virtual port. A host device can be configured to automatically connect to certain accessories upon detection of that accessory on a wireless network under various specific conditions. Encryption of accessory-protocol communications between an accessory and a host device is also provided.
Abstract:
Duplex audio is provided for a mobile communication device and an accessory. In some embodiments, the accessory can selectably operate in a duplex audio mode, concurrently sending audio to and receiving audio from the mobile communication device, or in another audio mode. In duplex audio mode, the accessory can enable its internal audio processing operations (e.g., echo cancellation) while the mobile communication device disables its corresponding internal operations or vice versa. The mobile communication device can control when the accessory transitions into and/or out of duplex audio mode.
Abstract:
Techniques for facilitating communication between a portable media device (PMD) and an accessory via multiple communication paths. The accessory has a unique accessory identifier that it can send to the PMD upon establishing a connection via each communication path. The PMD can determine whether the same accessory is connected via multiple communication paths based on the accessory identifier received via each communication path. The PMD can route information to the accessory and control routing of information from the accessory based on the set of communication paths that are currently connected and can dynamically change the routing as communication paths are connected and disconnected.
Abstract:
Authentication techniques for electronic devices can provide more seamless communication between two devices. A first device (e.g., a host device) can maintain a list of known-good devices (e.g., accessory devices) with which it can interoperate. Information identifying a second device can be added to the known-good list when the second device successfully connects to the first device and completes an authentication process. After the second device disconnects, the first device can retain the identifying information on the known-good list for a predetermined period of time, after which the information can expire. If the second device reconnects to the host before its information expires, the authentication process can be bypassed.
Abstract:
Message notifications to an accessory from a mobile communication device are provided according to some embodiments of the invention. When a message such as a text message, email, and/or voicemail is received at a mobile communication device, the mobile communication device can notify an attached accessory that a message has been received. In response, the accessory can request the full message, media associated with the message, an attachment to the message, and/or an audio/video stream of the message for presentation to a user.
Abstract:
An application can be launched in response to a launch request from an accessory. For example, the mobile computing device can determine whether it is in a state that allows launching of an application and/or can determine whether the application or application type requested in the launch command is available for launching. In response to the request, and if the mobile computing device is capable, the mobile computing device can launch the application. The mobile computing device can also send a positive acknowledgment message to the accessory indicating that the application may be launched. An open communication session message may also be sent to the accessory. In response thereto the accessory can open a communication session and interoperate with the application.
Abstract:
Message notifications to an accessory from a mobile communication device are provided according to some embodiments of the invention. When a message such as a text message, email, and/or voicemail is received at a mobile communication device, the mobile communication device can notify an attached accessory that a message has been received. In response, the accessory can request the full message, media associated with the message, an attachment to the message, and/or an audio/video stream of the message for presentation to a user.
Abstract:
Authentication techniques for electronic devices can provide more seamless communication between two devices. A first device (e.g., a host device) can maintain a list of known-good devices (e.g., accessory devices) with which it can interoperate. Information identifying a second device can be added to the known-good list when the second device successfully connects to the first device and completes an authentication process. After the second device disconnects, the first device can retain the identifying information on the known-good list for a predetermined period of time, after which the information can expire. If the second device reconnects to the host before its information expires, the authentication process can be bypassed.