Abstract:
Registering a client computing device (110) for online communication sessions. A registration server (140) receives a message (3) that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device (130), which received an SMS message (1) having the push token from the client computing device (110) and determined the phone number of the client computing device from that SMS message. The registration server (140) associates the push token and the phone number and stores it in a registration data store (150), which is used for inviting users for online communication sessions.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called ''stack'' of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. The mobile device determines that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service.
Abstract:
In some implementations, a user device can automatically generate scene suggestions and/or trigger suggestions. For example, a scene can be a collection of accessories and corresponding accessory states. When the scene is invoked, the user device can cause the accessories associated with the scene to assume the corresponding accessory states. The user device can automatically determine the accessories and/or corresponding accessory states for a scene based on historical patterns of use represented in historical accessory state data. The user device can automatically determine triggers for automatically invoking scenes based on historical patterns of use. For example, the user device can analyze historical context (e.g., location, time, accessory state, etc.) data associated with accessory state transitions to determine triggers for automatically invoking a scene. The user device can present suggest scenes and/or triggers to the user of the user device.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A method performed by a provisioning server, the method including receiving registration data from a client station, transmitting activation data to a telephony service provider, the activation data generated as a function of the registration data, the activation data being used to generate telephony data for the user, the telephony data including access data to utilize a telephony network of the telephony service provider and transmitting the telephony data to the client station, wherein select portions of the telephony data and select portions of the activation data verify the client station as an authenticated device to utilize the telephony network.