Abstract:
A device providing concurrent audio streaming to multiple wireless audio output devices may include at least one processor configured to receive a user selection of at least two paired audio output devices. The at least one processor may be further configured to connect to each of the at least two of the paired audio output devices. The at least one processor may be further configured to synchronize at least one audio output synchronization parameter across each of the at least two of the paired audio output devices. The at least one processor may be further configured to concurrently stream a respective audio stream to each of the at least two of the paired audio output devices.
Abstract:
A device implementing dynamic controller selection may include a processor configured to generate a connectivity graph based on a scan for accessory devices, the connectivity graph including a connectivity metric value for a discovered accessory device. The processor may be configured to broadcast the connectivity graph and receive another connectivity graph broadcasted by another electronic device that includes another connectivity metric value for the accessory device. The processor may be configured to receive a request to provide an instruction to the accessory device and determine which of the electronic devices will provide the instruction based on the connectivity metric values. The processor may be further configured to, when the electronic device is determined, provide the instruction for transmission to the accessory device, and when the other electronic device is determined, provide, for transmission to the other electronic device, the instruction to be provided to the accessory device.
Abstract:
Some embodiments provide a method for establishing a secured session with backward security between a first device and a second device. In some embodiments, the method establishes a communication session between the first and second devices using shared keys stored at the first and second devices. The method exchanges encrypted data between the first and second devices as a part of the communication session. The method, upon completion of the communication session, modifies the shared key at the first device in a predictable way. The shared key is modified at the second device in the same predictable way. The method then stores the modified shared key at the first device. The modified shared key cannot be used to decrypt any portion of the encrypted data of the current and previous communication sessions.
Abstract:
Systems, methods, and computer-readable media for providing a recommendation of a payment credential to be used by an electronic device in a commercial transaction based on merchant information received by the electronic device are provided. In one example embodiment, a method, at an electronic device that includes a secure element that includes at least one payment credential, includes, inter alia, accessing credential availability data indicative of the at least one payment credential, accessing merchant context data associated with a merchant subsystem, wherein the merchant context data is indicative of a preference for a first type of payment credential over a second type of payment credential, and presenting payment recommendation data based on the accessed credential availability data and the accessed merchant context data. Additional embodiments are also provided.
Abstract:
A device implementing dynamic controller selection may include a processor configured to generate a connectivity graph based on a scan for accessory devices, the connectivity graph including a connectivity metric value for a discovered accessory device. The processor may be configured to broadcast the connectivity graph and receive another connectivity graph broadcasted by another electronic device that includes another connectivity metric value for the accessory device. The processor may be configured to receive a request to provide an instruction to the accessory device and determine which of the electronic devices will provide the instruction based on the connectivity metric values. The processor may be further configured to, when the electronic device is determined, provide the instruction for transmission to the accessory device, and when the other electronic device is determined, provide, for transmission to the other electronic device, the instruction to be provided to the accessory device.
Abstract:
A device configured to generate audio output, receive an indication that a second device is to emit a signal, adjust the audio output from a first state to a second state based at least on the indication that the second device is to emit the signal, identify a predetermined condition and adjust the audio output from the second state to the first state based on at least the predetermined condition.
Abstract:
Some embodiments provide a method for establishing a secured session with backward security between a first device and a second device. In some embodiments, the method establishes a communication session between the first and second devices using shared keys stored at the first and second devices. The method exchanges encrypted data between the first and second devices as a part of the communication session. The method, upon completion of the communication session, modifies the shared key at the first device in a predictable way. The shared key is modified at the second device in the same predictable way. The method then stores the modified shared key at the first device. The modified shared key cannot be used to decrypt any portion of the encrypted data of the current and previous communication sessions.
Abstract:
Some embodiments provide a method for establishing a secured session with backward security between a first device and a second device. In some embodiments, the method establishes a communication session between the first and second devices using shared keys stored at the first and second devices. The method exchanges encrypted data between the first and second devices as a part of the communication session. The method, upon completion of the communication session, modifies the shared key at the first device in a predictable way. The shared key is modified at the second device in the same predictable way. The method then stores the modified shared key at the first device. The modified shared key cannot be used to decrypt any portion of the encrypted data of the current and previous communication sessions.