Abstract:
Systems, methods and non-transitory computer readable media for allowing a user to switch between watches that have been paired with a device such as a smartphone are described. In one embodiment, the watches automatically detect a removal of a first watch from a user's wrist and an attachment of a second watch to the user's wrist. Messages from the watches are transmitted to the device to allow the device to switch the active watch from the first watch to the second watch. The switch can occur while the device is in a locked state, and the device can synchronize the second watch with data received from the first watch. Other embodiments are also described.
Abstract:
In order to reduce latency and overhead during the device discovery process, operations involved in pairing of two electronic devices may be predefined. In particular, when a user specifies a new electronic device in a list of their electronic devices, a computer provides a notification to these electronic devices. In response to the notification, a given one of the electronic devices generates encryption information and identification information for the given electronic device, and provides this encryption information and identification information to the new electronic device via a network (such as the Internet). Then, the new electronic device generates encryption information and identification information for the new electronic device, and provides this encryption information and identification information to the given electronic device via the network. This pairing information may subsequently facilitate secure wireless communication between the two electronic devices.
Abstract:
Systems, methods and non-transitory computer readable media for allowing a user to switch between watches that have been paired with a device such as a smartphone are described. In one embodiment, the watches automatically detect a removal of a first watch from a user's wrist and an attachment of a second watch to the user's wrist. Messages from the watches are transmitted to the device to allow the device to switch the active watch from the first watch to the second watch. The switch can occur while the device is in a locked state, and the device can synchronize the second watch with data received from the first watch. Other embodiments are also described.
Abstract:
In order to reduce the power consumption of a receiving electronic device, received advertising beacons may be filtered so that the receiving electronic device selectively transitions from a power-saving mode to a normal operating mode. For example, the receiving electronic device may receive a beacon with advertising information for a transmitting electronic device. If the advertising information is changed relative to a previous version of the advertising information for the transmitting electronic device, the receiving electronic device may transition from the power-saving mode to the normal operating mode. In this way, the receiving electronic device may ‘wake up’ if it receives an advertisement that it wants to act on, such as advertisements for: file sharing, wireless streaming of information, proximity pairing and/or continuity of a user experience with an application when the user transitions from the transmitting electronic device to the receiving electronic device.
Abstract:
An interface circuit in a computing device may communicate with user-interface devices using shared slots during time intervals. In particular, the computing device may transmit outgoing messages to the user-interface devices at a first predefined time during sequential time intervals when the user-interface devices transition from a sleep mode to a normal mode. In response, the computing device may receive incoming messages from one or more of the user-interface devices at a second predefined time following the first predefined time during the sequential time intervals. Then, the computing device may transmit a multicast message to the user-interface devices at a third predefined time during the sequential time intervals. In response to the given multicast message, one of the user-interface devices may communicate data to the computing device. Note that, in some instances, a multicast time slot may instead be used to communicate data to one of the user-interface devices.
Abstract:
In order to reduce latency and overhead during the device discovery process, operations involved in pairing of two electronic devices may be predefined. In particular, when a user specifies a new electronic device in a list of their electronic devices, a computer provides a notification to these electronic devices. In response to the notification, a given one of the electronic devices generates encryption information and identification information for the given electronic device, and provides this encryption information and identification information to the new electronic device via a network (such as the Internet). Then, the new electronic device generates encryption information and identification information for the new electronic device, and provides this encryption information and identification information to the given electronic device via the network. This pairing information may subsequently facilitate secure wireless communication between the two electronic devices.
Abstract:
This document describes, inter alia, techniques for use at a wireless device for establishing communications with other devices, and for displaying related information in a graphical user interface. The wireless device may discover, pair with, and/or connect to other wireless devices, and may display a list of information regarding the other wireless devices in a graphical user interface. The wireless device may order the list based on factors such as: the connectivity status of the other devices (e.g., whether the other devices are connected, paired, or discovered); the types of the other wireless devices (e.g., whether the devices are human interface devices (HIDs), audio devices, phones, imaging devices, computers, or other types of devices); whether device names for the other wireless devices are known/unknown; and/or other factors. The features described herein may be implemented using Bluetooth wireless technology, and/or any other wireless technology.
Abstract:
The disclosed embodiments provide a system that facilitates communication with a first electronic device from a second electronic device. During operation, the system establishes a peer-to-peer connection between the first electronic device and the second electronic device on a first physical network interface. Next, the system uses the peer-to-peer connection to obtain, on the second electronic device, a first set of network-interface capabilities for the first electronic device. Finally, the system switches the peer-to-peer connection to a second physical network interface based on at least one of the first set of network-interface capabilities and one or more characteristics associated with the peer-to-peer connection.
Abstract:
A first wireless communication device (UE device) associated with a certain user (or included in a specified set/group of UE devices) may establish a first communication link with an accessory device according to a short-range radio access technology, and transmit link (pairing) information associated with the first communication link to a server, such as a cloud-based server. The server may share this (first) link information with other UE devices associated with the same user (or belonging to the same specified group of UE devices as the first UE device). Link information associated with the other UE devices (i.e. second link information) may equally be shared with the accessory device, and the other UE devices and accessory device may use the first link information and second link information in establishing respective communication links between any of the other UE devices and the accessory device without having to undergo a pairing procedure.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.