Abstract:
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter. (Figure 7)
Abstract:
A method for communicating information between a first electronic device and a second electronic device, the method comprising: receiving, by an intermediate device, a first tunneling command from a first electronic device, the first tunneling command conforming to a first protocol and incorporating a tunneled information item therein; converting, by the intermediate device, the first tunneling command to a second tunneling command, the second tunneling command conforming to a second protocol and incorporating the tunneled information item therein; and transmitting, by the intermediate device, the second tunneling command to a second electronic device, the second electronic device being configured to extract the tunneled information item from the second tunneling command, wherein the tunneled information item includes information usable to establish a wireless communication link between the first electronic device and the second electronic device.
Abstract:
AN ADAPTER FOR CONNECTING AN ACCESSORY TO A PORTABLE ELECTRONIC DEVICE INCLUDES A FIRST CONNECTOR COMPATIBLE WITH A CONNECTOR OF THE PORTABLE ELECTRONIC DEVICE AND A SECOND CONNECTOR COMPATIBLE WITH A CONNECTOR OF THE ACCESSORY. THE CONNECTORS OF THE ACCESSORY AND THE PORTABLE ELECTRONIC DEVICE ARE OTHERWISE INCOMPATIBLE WITH EACH OTHER. THE ADAPTER PROVIDES TWO LEVELS OF AUTHENTICATION. FIRST, THE ADAPTER AUTHENTICATES ITSELF TO THE PORTABLE ELECTRONIC DEVICE. IF THIS FIRST AUTHENTICATION IS SUCCESSFUL, THEN THE ADAPTER AUTHENTICATES THE ACCESSORY TO THE ADAPTER.
Abstract:
Un adaptador para conectar un accesorio a un dispositivo electrónico portátil incluye un primer conector compatible con un conector del dispositivo electrónico portátil y un segundo conector compatible con un conector del accesorio. Los conectores del accesorio y el dispositivo electrónico portátil de otra manera son incompatibles entre sí. El adaptador proporciona dos niveles de autenticación. Primero, el adaptador se autentica a sí mismo para el dispositivo electrónico portátil. Si esta primera autenticación tiene éxito, entonces el adaptador autentica el accesorio para el adaptador.
Abstract:
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter. (Figure 7) (NJ 0:10 N,~1 U ; UU0s
Abstract:
A host device and an accessory exchange information (e.g., commands and data) via an intermediate device. The host device and accessory can each connect to the intermediate device through a direct wired path and can exchange commands and data with the intermediate device. The host device and the 5 accessory can also 'tunnel' information to each other through the intermediate device, by packaging the tunneled information as a payload of a command recognizable by the intermediate device; the intermediate device can repackage and forward the payload. In some embodiments, the tunneled information relates to configuring a wireless link (e.g., a Bluetooth pairing) between the host device and the accessory.
Abstract:
A host device and an accessory exchange information (e.g., commands and data) via an intermediate device. The host device and accessory can each connect to the intermediate device through a direct wired path and can exchange commands and data with the intermediate device. The host device and the accessory can also 'tunnel' information to each other through the intermediate device, by packaging the tunneled information as a payload of a command recognizable by the intermediate device; the intermediate device can repackage and forward the payload. In some embodiments, the tunneled information relates to configuring a wireless link (e.g., a Bluetooth pairing) between the host device and the accessory.
Abstract:
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter.