摘要:
In some implementations, a computing device can automatically generate a scene. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the computing device can cause the accessories associated with the scene to assume the corresponding accessory states. The computing device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The computing device can generate a scene based on a snapshot of current accessory states for the accessories associated with the scene.
摘要:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
摘要:
In some implementations, a computing device can automatically generate a scene. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the computing device can cause the accessories associated with the scene to assume the corresponding accessory states. The computing device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The computing device can generate a scene based on a snapshot of current accessory states for the accessories associated with the scene.
摘要:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
摘要:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
摘要:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
摘要:
In some implementations, a computing device can present accessory state information. For example, the computing device can receive accessory state information from various accessories and present status items representing the current state of the accessories. The status items can be prioritized according to classifications assigned to accessories and/or accessory state information. The status items can be filtered based on a role assigned to the user of the computing device. Additional implementations and details are described in the paragraphs that follow.
摘要:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
摘要:
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.
摘要:
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.