Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A portable computing device can enable an accessory to access a wireless network. In particular, the portable computing device can provide a wireless network access credential to the accessory. The accessory can thereafter use the wireless network access credential to access a wireless network. The portable computing device can additionally configure an access point that manages the wireless network to permit the accessory to join the wireless network.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Promotional or informational materials are selected for presentation to mobile device users based at least in part on knowledge about where those users intend to go. If a user performs a points-of-interest search that evinces a particular intent, then the mobile device can select informational materials that are associated with that particular intent, and then display those informational materials. The informational materials selected can be limited to those that are mapped to a point of interest that the searching user selected from a list of points of interest that are relevant to the user's specified intent. Additionally or alternatively, the mobile device might display only the informational materials that are mapped to a particular point of interest in response to detecting that the user has entered within a specified proximity of that particular point of interest, as determined through a global positioning system of the user's mobile device.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Updated network access information can be distributed to wireless devices that have joined a wireless network whose configuration is being or has been modified. In some instances, an update can be scheduled in advance and a notification provided from a base station to other devices on the network. In some instances, a portable wireless device can distribute updated network access information to other devices that had been on the network prior to the update in a partially or fully automated process.
Abstract:
A portable computing device can enable an accessory to access a wireless network. In particular, the portable computing device can provide a wireless network access credential to the accessory. The accessory can thereafter use the wireless network access credential to access a wireless network. The portable computing device can additionally configure an access point that manages the wireless network to permit the accessory to join the wireless network.