Abstract:
Authentication techniques for electronic devices can provide more seamless communication between two devices. A first device (e.g., a host device) can maintain a list of known-good devices (e.g., accessory devices) with which it can interoperate. Information identifying a second device can be added to the known-good list when the second device successfully connects to the first device and completes an authentication process. After the second device disconnects, the first device can retain the identifying information on the known-good list for a predetermined period of time, after which the information can expire. If the second device reconnects to the host before its information expires, the authentication process can be bypassed.
Abstract:
A vehicle accessory can transmit a first signal to a mobile device, the first signal including a location of a vehicle. The mobile device can monitor its own location. The mobile device can assess whether one or more location-based criteria have been satisfied based on the location of the mobile device and the location of the vehicle. Upon determining that a location-based criterion has been satisfied, the mobile device can transmit a second signal to the vehicle accessory indicating that a function of the vehicle is to be controlled. Thus, for example, the mobile device can activate or de-activate vehicle features (e.g., door locking, vehicle defrosting, etc.) in a manner that capitalizes on efficient signal transmission.
Abstract:
A vehicle accessory can transmit a first signal to a mobile device, the first signal including a location of a vehicle. The mobile device can monitor its own location. The mobile device can assess whether one or more location-based criteria have been satisfied based on the location of the mobile device and the location of the vehicle. Upon determining that a location-based criterion has been satisfied, the mobile device can transmit a second signal to the vehicle accessory indicating that a function of the vehicle is to be controlled. Thus, for example, the mobile device can activate or de-activate vehicle features (e.g., door locking, vehicle defrosting, etc.) in a manner that capitalizes on efficient signal transmission.
Abstract:
A vehicle accessory can transmit a first signal to a mobile device, the first signal including a location of a vehicle. The mobile device can monitor its own location. The mobile device can assess whether one or more location-based criteria have been satisfied based on the location of the mobile device and the location of the vehicle. Upon determining that a location-based criterion has been satisfied, the mobile device can transmit a second signal to the vehicle accessory indicating that a function of the vehicle is to be controlled. Thus, for example, the mobile device can activate or de-activate vehicle features (e.g., door locking, vehicle defrosting, etc.) in a manner that capitalizes on efficient signal transmission.
Abstract:
A vehicle accessory can transmit a first signal to a mobile device, the first signal including a location of a vehicle. The mobile device can monitor its own location. The mobile device can assess whether one or more location-based criteria have been satisfied based on the location of the mobile device and the location of the vehicle. Upon determining that a location-based criterion has been satisfied, the mobile device can transmit a second signal to the vehicle accessory indicating that a function of the vehicle is to be controlled. Thus, for example, the mobile device can activate or de-activate vehicle features (e.g., door locking, vehicle defrosting, etc.) in a manner that capitalizes on efficient signal transmission.
Abstract:
Authentication techniques for electronic devices can provide more seamless communication between two devices. A first device (e.g., a host device) can maintain a list of known-good devices (e.g., accessory devices) with which it can interoperate. Information identifying a second device can be added to the known-good list when the second device successfully connects to the first device and completes an authentication process. After the second device disconnects, the first device can retain the identifying information on the known-good list for a predetermined period of time, after which the information can expire. If the second device reconnects to the host before its information expires, the authentication process can be bypassed.