摘要:
An adapter for providing connectivity between a host connector of a host device and an accessory connector of an accessory that is incompatible with the host connector is described. The adapter can include a host interface connector that is compatible with the host connector, and an accessory interface connector that is compatible with the accessory connector of the accessory. The adapter may further include an identification module that can provide adapter identification information to a host device connected to the host interface connector, and may also include an authentication module that can authenticate an accessory connected to the accessory interface connector.
摘要:
A dock for a portable electronic device including a housing, a connector extending from the housing to connect the portable electronic device to the dock, a microphone integrated within the housing, and a processor. The processor is operatively coupled to receive audio input from the microphone, and in response to the audio input, transmit a message to the portable electronic device via the connector to activate a voice recognition mode of the portable electronic device.
摘要:
An electronic device having a communications module with a first set of data rates can be enabled to use the communications module to process signals received from a source that uses a second set of data rates. The device may generate packets, frames, etc. at the first set of data rates using the communications module from the signals received from the remote source by sampling signals at one or more of the first set of data rates. The device may then reconstruct data or payloads originally transmitted in the signals at the second set of data rates from the packets generated at the first set of data rates. Thus, the device can process signals or transmissions at the second set of data rates using the first set of data rates without requiring additional receivers or communications modules to process the signals.
摘要:
A method for communicating data using a “burst protocol” includes enabling power to transmitters and receivers when needed to balance power consumption with latency and unscheduled communication. A transmitter transmits a plurality of packets indicative of substantially the same payload. Power then may be disabled to the transmitter. A first predetermined time is determined to enable a receiver. A second predetermined time is determined to disable the receiver. Power then may be enabled to the receiver based on the first predetermined time. The payload is output in response to receiving one or more of the plurality of packets. Power to the receiver is disabled based on the second predetermined time.
摘要:
A method and system for approving a transaction between a customer and a merchant including the steps of transmitting a transaction request from a customer to a merchant; transmitting a verification request from the merchant to a verification entity, the verification request comprising first data; the customer device transmitting second data to the verification entity; and the verification entity performing a verification step by using the first data and the second data to verify if the transaction should be approved.
摘要:
Techniques for transferring stored data between a media player and an accessory. In one set of embodiments, one of the media player and the accessory can obtain a unique identifier for a particular file stored in the other of the media player and the accessory. The one of the media player and the accessory can then retrieve data from the stored file using the unique identifier. In certain embodiments, accessories and media players can retrieve and store data utilizing an arbitrary format. This data can be opaque to any protocol used by the media player or accessory and can require no parsing or interpretation. To provide this facility, a plurality of commands can allow both media players and accessories to present a simple file system. The plurality of commands can be utilized in a variety of environments.
摘要:
A protective railing system includes at least two extruded posts, two post-mounted extruded brackets, and at least one extruded rail. The rail can be selectively installed with infinite adjustability both vertically and rotationally. Each post includes an outer tube and an inner tube with reinforcing ribs extending between the two. To secure the post to a floor, a floor-mounted anchor extends up into the inner tube. The anchor and inner tube are preferably rectangular to restrict relative rotation between the post and the anchor. When two or more rails are installed between two posts, the two rails can be interlocked, or the rails can be spaced apart to support a spacer therebetween. In some cases, the spacer is a sign or a fabric mesh.
摘要:
A method and system for approval by a verification computer of an online transaction between a user computer and a merchant computer over the Internet. The user computer transmits a transaction request to the merchant computer, which may include a product to be purchased and the payment amount. The merchant computer transmits to the verification computer a verification request including a first data string associated with the payment card (such as a debit card account number or a portion thereof) and the payment amount. The verification request is stored at the verification computer with a transaction identifier and a verification data string, which are also transmitted to the merchant computer. The merchant computer stores the verification data string as an expected verification data string and the transaction identifier, transmits the transaction identifier to the user computer, and the user computer transmits the transaction identifier to the verification computer. This may be accomplished by the merchant computer redirecting the web browser of the user computer to the verification computer. The user computer also transmits a second data string associated with the payment card (such as the PIN for the debit card) after being requested by the verification computer. The verification computer uses the transaction identifier received via the user computer to retrieve the verification request previously stored with that received transaction identifier, and then it performs a verification step by using the first data string associated with the payment card retrieved from storage and the second data string associated with the payment card received from the user computer to verify if the transaction should be approved, e.g. by determining if an account associated with the payment card is sufficient to cover the payment amount in the verification request. The verification computer will, upon successful verification that the transaction should be approved, transmit a verification approval message to the user computer, which includes the transaction identifier and the verification data string associated therewith as a confirmation verification data string, and the user computer transmits the verification approval message to the merchant computer. This may also be accomplished by the verification computer redirecting the web browser of the user computer to the merchant computer with the appropriate data. The merchant computer uses the transaction identifier in the verification approval message to retrieve an expected verification data string it had previously stored. The merchant computer then compares the expected verification data string with the confirmation verification data string from the verification approval message and indicates that the transaction has been approved if the comparison is positive.
摘要:
Computer readable storage mediums, electronic devices, and accessories having stored thereon data structures. A data structure includes a pin selection field operable to identify a connector pin and cause a host device to select one of a plurality of communication protocols for communicating with an accessory over the identified connector pin. The data structure also includes an accessory capability field defining an accessory identifier that uniquely identifies the accessory.
摘要:
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter.