Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Apparatus and methods to communicate audio data from either an active wireless device or a requesting wireless device to one or more audio reproduction devices that are simultaneously communicatively coupled to both the active wireless device and to the requesting wireless device are disclosed. Responsive to a request from the requesting wireless device to transmit audio data to the one or more audio reproduction devices, the active wireless device determines whether to transmit audio data from the requesting wireless device based at least in part on an audio status of the active wireless device and a set of predetermined arbitration criteria that prioritizes among applications and operating system processes that generate the audio data.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Embodiments are disclosed for a wearable computer with fitness machine connectivity for improved activity monitoring. In an embodiment, a method comprises: establishing, by a processor of a wireless device, a wireless communication connection with a fitness machine; obtaining, by the processor, machine data from the fitness machine; determining, by the processor, a workout session according to the machine data; initiating the workout session on the wireless device; during the workout session: obtaining, from a sensor of the computing device, physiological data of a user of the fitness machine; determining, by the processor, fitness data for the user based on the physiological data, the machine data and at least one user characteristic; and sending, by the processor, the fitness data to the fitness machine.
Abstract:
Controllers can communicate with accessories using various paths, such as a wireless communication path. A controller can maintain reachability information for each accessory indicating the path(s) via which the accessory is currently reachable. Maintaining the reachability information can include scanning to detect broadcasts from the accessories and updating the reachability information based on the results of scanning. Scanning parameters such as scan interval and scan duration can be selected dynamically based on the current operating context of the controller (e.g., where the controller is located, what processes are active on the controller, what other devices have been detected within communication range of the controller).
Abstract:
Apparatus and methods to communicate audio data from either an active wireless device or a requesting wireless device to one or more audio reproduction devices that are simultaneously communicatively coupled to both the active wireless device and to the requesting wireless device are disclosed. Responsive to a request from the requesting wireless device to transmit audio data to the one or more audio reproduction devices, the active wireless device determines whether to transmit audio data from the requesting wireless device based at least in part on an audio status of the active wireless device and a set of predetermined arbitration criteria that prioritizes among applications and operating system processes that generate the audio data.
Abstract:
Controllers can communicate with accessories using various paths, such as a wireless communication path. A controller can maintain reachability information for each accessory indicating the path(s) via which the accessory is currently reachable. Maintaining the reachability information can include scanning to detect broadcasts from the accessories and updating the reachability information based on the results of scanning. Scanning parameters such as scan interval and scan duration can be selected dynamically based on the current operating context of the controller (e.g., where the controller is located, what processes are active on the controller, what other devices have been detected within communication range of the controller).
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A method of generating a calibration factor is described. In an example, the method may include establishing a wireless communication connection with a fitness machine. The method may also include obtaining first machine data from the fitness machine. The first machine data may specify a type of the fitness machine. The method may also include initiating a workout session on the wearable computer based on the first machine data. During the workout session, the method may also include obtaining sensor data, obtaining second machine data, and determining the calibration factor based on the second machine data and the sensor data. The method may also include generating a workout session summary based on the calibration factor.