Abstract:
In some implementations, a computing device can present accessory state information. For example, the computing device can receive accessory state information from various accessories and present status items representing the current state of the accessories. The status items can be prioritized according to classifications assigned to accessories and/or accessory state information. The status items can be filtered based on a role assigned to the user of the computing device. Additional implementations and details are described in the paragraphs that follow.
Abstract:
In some implementations, a computing device can present accessory state information. For example, the computing device can receive accessory state information from various accessories and present status items representing the current state of the accessories. The status items can be prioritized according to classifications assigned to accessories and/or accessory state information. The status items can be filtered based on a role assigned to the user of the computing device. Additional implementations and details are described in the paragraphs that follow.
Abstract:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
Abstract:
Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic Subscriber Identity Modules (eSIMs), and an eSIM distribution network infrastructure is described which enforces eSIM uniqueness and conservation, distributes network traffic to prevent “bottle necking” congestion, and provides reasonable disaster recovery capabilities. In one variant, eSIMs are securely stored at electronic Universal Integrated Circuit Card (eUICC) appliances which ensure eSIM uniqueness and conservation. Access to the eUICC appliances is made via multiple eSIM depots, which ensure that network load is distributed. Persistent storage is additionally described, for among other activities, archiving and backup.
Abstract:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
Abstract:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs)