Abstract:
A message-based identification process can facilitate reliable interoperation between accessories and host devices. During an identification process, the devices can negotiate an operating agreement that specifies particular communications (e.g., messages) that each device is permitted to send to or receive from the other, for example by having one device send a list of specific messages that it intends to send to and/or receive from the other. The other device can review the proposal and either accept or reject it. If a proposal is accepted, the devices can begin interoperating using messages that were included in the agreed-upon proposal while ignoring any received messages that were not included in the agreed-upon proposal.
Abstract:
A message-based identification process can facilitate reliable interoperation between accessories and host devices. During an identification process, the devices can negotiate an operating agreement that specifies particular communications (e.g., messages) that each device is permitted to send to or receive from the other, for example by having one device send a list of specific messages that it intends to send to and/or receive from the other. The other device can review the proposal and either accept or reject it. If a proposal is accepted, the devices can begin interoperating using messages that were included in the agreed-upon proposal while ignoring any received messages that were not included in the agreed-upon proposal.
Abstract:
A method for communicating data using a “burst protocol” includes enabling power to transmitters and receivers when needed to balance power consumption with latency and unscheduled communication. A transmitter transmits a plurality of packets indicative of substantially the same payload. Power then may be disabled to the transmitter. A first predetermined time is determined to enable a receiver. A second predetermined time is determined to disable the receiver. Power then may be enabled to the receiver based on the first predetermined time. The payload is output in response to receiving one or more of the plurality of packets. Power to the receiver is disabled based on the second predetermined time.
Abstract:
A portable communication device (PCD) can automatically switch into different operating modes of an asymmetric communication protocol (such as USB) depending on the type of accessory connected. For example, the accessory can signal whether the PCD should operate in a first mode or a second mode using a hardware indicator such as identification resistor across two pins of a multi-pin connector and/or a software indicator such as a command protocol. The PCD can detect the accessory's signal and switch to the operating mode requested by the accessory.
Abstract:
A message-based identification process can facilitate reliable interoperation between accessories and host devices. During an identification process, the devices can negotiate an operating agreement that specifies particular communications (e.g., messages) that each device is permitted to send to or receive from the other, for example by having one device send a list of specific messages that it intends to send to and/or receive from the other. The other device can review the proposal and either accept or reject it. If a proposal is accepted, the devices can begin interoperating using messages that were included in the agreed-upon proposal while ignoring any received messages that were not included in the agreed-upon proposal.
Abstract:
In some implementations, a method for determining behavior associated with a user device includes receiving behavior data of the user device that includes multiple types of behavior data. The behavior data is compared with patterns of behavior data associated with the user device. The behavior-data patterns are generated from previously-received behavior data. A notification is generated based on comparing the behavior data to the behavior-data patterns.
Abstract:
A method, system, and connector interface for authenticating an accessory. the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
Abstract:
A method, system, and connector interface for authenticating an accessory. the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
Abstract:
Circuits, methods, and apparatus allow sports or other equipment, such as gym or other cardio equipment, to write data to a media player. Examples further provide the uploading of this data to a computer and third-party website. To monitor progress, the third-party website can be used to track workout data over time. The third party-website can also collect data from other users, which is particularly useful for providing a competitive environment. This data can then be graphically displayed in various ways to provide encouragement.
Abstract:
A method for communicating data using a “burst protocol” includes enabling power to transmitters and receivers when needed to balance power consumption with latency and unscheduled communication. A transmitter transmits a plurality of packets indicative of substantially the same payload. Power then may be disabled to the transmitter. A first predetermined time is determined to enable a receiver. A second predetermined time is determined to disable the receiver. Power then may be enabled to the receiver based on the first predetermined time. The payload is output in response to receiving one or more of the plurality of packets. Power to the receiver is disabled based on the second predetermined time.