Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
In some implementations, a computing device can automatically generate a scene. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the computing device can cause the accessories associated with the scene to assume the corresponding accessory states. The computing device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The computing device can generate a scene based on a snapshot of current accessory states for the accessories associated with the scene.
Abstract:
In some implementations, a computing device can automatically generate a scene. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the computing device can cause the accessories associated with the scene to assume the corresponding accessory states. The computing device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The computing device can generate a scene based on a snapshot of current accessory states for the accessories associated with the scene.
Abstract:
Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface.
Abstract:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
Abstract:
In some implementations, a computing device can automatically generate a service group. For example, accessories can be automatically grouped together based on various criteria (such as historical usage patterns). The accessories in the service group can be managed and/or controlled as if the accessories were a single accessory or entity. In some implementations, a computing device can intelligently select service group controls for presentation to the user so that the user can control the service group. For example, the computing device can select which service group controls to present and the order in which to present the controls based on features that are common among different accessories in the service group.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
In some embodiments, a resident controller at a specified location performs a method including registering a plurality of mobile devices of a plurality of users and a device profile for a resident device to be controlled based on a location of the plurality of users, and establishing a user state for each of the plurality of users corresponding to their location. In some embodiments, the mobile devices can provide boundary-crossing signals when their location cross a boundary corresponding to the specified location causing the resident controller to update the user states based on the boundary-crossing signals and update a presence state of the specified location based on changes to the user states, where the device profile specifies a first action to be performed when the presence state transitions to a first presence value.
Abstract:
Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.