-
31.
公开(公告)号:GB2481349B
公开(公告)日:2014-01-29
申请号:GB201117660
申请日:2010-03-11
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , SCHUBERT EMILY CLARK , TOPRANI SHYAM S , LANGENFELD PETER T , KRUEGER SCOTT , ANANNY JOHN M , ADLER MITCHELL , DOROGUSKER JESSE
Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
-
32.
公开(公告)号:AU2013205264A1
公开(公告)日:2013-05-02
申请号:AU2013205264
申请日:2013-04-10
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , ADLER MITCHELL , SCHUBERT EMILY CLARK , DOROGUSKER JESSE LEE , TOPRANI SHYAM S , ANANNY JOHN M , LANGENFELD PETER T , KRUEGER SCOTT
IPC: H04J3/16
Abstract: 1000149438_I.DOCX Abstract Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
-
33.
公开(公告)号:HK1164584A1
公开(公告)日:2012-09-21
申请号:HK12104661
申请日:2012-05-11
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , SCHUBERT EMILY CLARK , DOROGUSKER JESSE L , TOPRANI SHYAM S , LANGENFELD PETER T , KRUEGER SCOTT , ANANNY JOHN M , ADLER MITCHELL
IPC: G06F20060101 , H04M20060101
Abstract: Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication. An application executing at the mobile computing device can communicate with the accessory using an application communication protocol. In some embodiments, the application communication protocol can be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to an application protocol can be communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol.
-
公开(公告)号:DE112010001170T5
公开(公告)日:2012-05-31
申请号:DE112010001170
申请日:2010-03-11
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , ADLER MITCHELL , SCHUBERT EMILY CLARK , DOROGUSKER JESSE LEE , TOPRANI SHYAM S , ANANNY JOHN M , LANGENFELD PETER T , KRUEGER SCOTT
IPC: H04J3/16
Abstract: Ausführungsformen der vorliegenden Erfindung stellen verschiedene Kommunikationstechniken zur Kommunikation zwischen einer mobilen Rechenvorrichtung und einer Zubehörvorrichtung bereit. Ein Zubehörvorrichtungsprotokoll, das ursprünglich in der mobilen Rechenvorrichtung enthalten ist, kann für einige Kommunikation verwendet werden. Eine Anwendung, die auf der mobilen Rechenvorrichtung ausgeführt wird, kann mit der Zubehörvorrichtung kommunizieren mit Hilfe eines Anwendungskommunikationsprotokolls. In einigen Ausführungsformen kann das Anwendungskommunikationsprotokoll sich von dem Zubehörvorrichtungskommunikationsprotokoll unterscheiden. In anderen Ausführungsformen kann das Anwendungsprotokoll nur von der Anwendung und der Zubehörvorrichtung erkannt werden. In einigen Ausführungsformen können Mitteilungen, die dem Anwendungsprotokoll entsprechen, zwischen der Anwendung und der Zubehörvorrichtung kommuniziert werden durch das Packen der Mitteilungen in eine Mitteilung, die dem Zubehörvorrichtungskommunikationsprotokoll entspricht.
-
公开(公告)号:MX2011009737A
公开(公告)日:2011-12-16
申请号:MX2011009737
申请日:2010-03-11
Applicant: APPLE INC
Inventor: HOLDEN PAUL , BOLTON LAWRENCE G , GANATRA NITIN , ADLER MITCHELL , SCHUBERT EMILY CLARK , DOROGUSKER JESSE LEE , TOPRANI SHYAM S , ANANNY JOHN M , LANGENFELD PETER T , KRUEGER SCOTT
IPC: H04J3/16
Abstract: Las modalidades de la presente invención proporcionan varias técnicas de comunicación para la comunicación entre un dispositivo móvil de computación y un accesorio. Un protocolo de accesorios que es genérico para el dispositivo móvil de computación puede utilizarse para cierta comunicación. Una aplicación que se ejecuta en el dispositivo móvil de computación puede comunicarse con el accesorio utilizando un protocolo de comunicación de aplicaciones. En algunas modalidades, el protocolo de comunicación de aplicaciones puede ser diferente al protocolo de comunicación de accesorios. En otras modalidades, el protocolo de aplicaciones sólo puede reconocerse por la aplicación y el accesorio. En algunas modalidades, los mensajes que cumplen con el protocolo de aplicaciones pueden comunicarse entre la aplicación y el accesorio al empaquetar los mensajes dentro de un mensaje que cumple con el protocolo de comunicación de accesorios.
-
公开(公告)号:AU2009100547A8
公开(公告)日:2009-10-01
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHAN JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100547A6
公开(公告)日:2009-09-24
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHAN JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
38.
公开(公告)号:AU2009222007A1
公开(公告)日:2009-09-11
申请号:AU2009222007
申请日:2009-03-02
Applicant: APPLE INC
Inventor: ATLEY DALLAS DE , ADLER MITCHELL , REDA MATT , COOPER SIMON , PANTHER HEIKO , BROUWER MICHAEL
IPC: G06F21/00
Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. A request in a first program may be received from a second program. A profile is then identified. The profile includes at least one entitlement associated with the second program. The profile is authenticated based on a first digest indicative of the profile and the second program is authenticated based on a second digest indicative of the second program. The request is then executed based on the entitlement.
-
公开(公告)号:AU2005323229A1
公开(公告)日:2006-07-13
申请号:AU2005323229
申请日:2005-12-13
Applicant: APPLE INC
Inventor: ARCHIBALD JOHN WESLEY , DOROGUSKER JESSE L , ADLER MITCHELL , RUBINSTEIN JONATHAN JAKE , FADELL ANTHONY M
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
-
-
-
-
-
-
-