Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
In some implementations, a user device can automatically generate scene suggestions and/or trigger suggestions. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the user device can cause the accessories associated with the scene to assume the corresponding accessory states. The user device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The user device can automatically determine triggers for automatically invoking scenes based on historical patterns of use. For example, the user device can analyze historical context (e.g., location, time, accessory state, etc.) data associated with accessory state transitions to determine triggers for automatically invoking a scene. The user device can present suggest scenes and/or triggers to the user of the user device.
Abstract:
Described are call handling methods performed by a carrier network or client stations. A method performed by a carrier network includes designating rules for call handling for an account, receiving first and second voice calls for the account, wherein the voice calls may be either an incoming calls or originated calls and handling the first and second voice calls for the account based on the rules. A method performed by a client station includes receiving a first invitation to a first call, responding to the first invitation causing the first call to be active, receiving a second invitation to a second call while the first call remains active and responding to the second invitation causing the second call to be active and the first call to be on hold, the client station is prevented from originating a call when one call is active and one call is on hold.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Configuring a mobile wireless communication device using a carrier service configuration profile selected from a set of stored carrier service configuration profiles. Carrier service configuration profiles are selected based on one or more combinations of identifier values stored in the mobile wireless communication device. Carrier service configuration profiles are priority ranked based on a specificity of the one or more combinations of identifier values.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A method performed by a provisioning server, the method including receiving registration data from a client station, transmitting activation data to a telephony service provider, the activation data generated as a function of the registration data, the activation data being used to generate telephony data for the user, the telephony data including access data to utilize a telephony network of the telephony service provider and transmitting the telephony data to the client station, wherein select portions of the telephony data and select portions of the activation data verify the client station as an authenticated device to utilize the telephony network.
Abstract:
Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (iii) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and/or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and/or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof).
Abstract:
Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.