Zubehörvorrichtung und mobile Rechenvorrichtungskommunikation mit Hilfe eines Anwendungskommunikationsprotokolls

    公开(公告)号:DE112010001170T5

    公开(公告)日:2012-05-31

    申请号:DE112010001170

    申请日:2010-03-11

    Applicant: APPLE INC

    Abstract: Ausführungsformen der vorliegenden Erfindung stellen verschiedene Kommunikationstechniken zur Kommunikation zwischen einer mobilen Rechenvorrichtung und einer Zubehörvorrichtung bereit. Ein Zubehörvorrichtungsprotokoll, das ursprünglich in der mobilen Rechenvorrichtung enthalten ist, kann für einige Kommunikation verwendet werden. Eine Anwendung, die auf der mobilen Rechenvorrichtung ausgeführt wird, kann mit der Zubehörvorrichtung kommunizieren mit Hilfe eines Anwendungskommunikationsprotokolls. In einigen Ausführungsformen kann das Anwendungskommunikationsprotokoll sich von dem Zubehörvorrichtungskommunikationsprotokoll unterscheiden. In anderen Ausführungsformen kann das Anwendungsprotokoll nur von der Anwendung und der Zubehörvorrichtung erkannt werden. In einigen Ausführungsformen können Mitteilungen, die dem Anwendungsprotokoll entsprechen, zwischen der Anwendung und der Zubehörvorrichtung kommuniziert werden durch das Packen der Mitteilungen in eine Mitteilung, die dem Zubehörvorrichtungskommunikationsprotokoll entspricht.

    Accessory authentication for electronic devices

    公开(公告)号:AU2009100547A8

    公开(公告)日:2009-10-01

    申请号:AU2009100547

    申请日:2009-06-05

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

    Accessory authentication for electronic devices

    公开(公告)号:AU2009100547A6

    公开(公告)日:2009-09-24

    申请号:AU2009100547

    申请日:2009-06-05

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

    System and method of authorizing execution of software code based on accessible entitlements

    公开(公告)号:AU2009222007A1

    公开(公告)日:2009-09-11

    申请号:AU2009222007

    申请日:2009-03-02

    Applicant: APPLE INC

    Abstract: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. A request in a first program may be received from a second program. A profile is then identified. The profile includes at least one entitlement associated with the second program. The profile is authenticated based on a first digest indicative of the profile and the second program is authenticated based on a second digest indicative of the second program. The request is then executed based on the entitlement.

    Accessory authentication for electronic devices

    公开(公告)号:AU2005323229A1

    公开(公告)日:2006-07-13

    申请号:AU2005323229

    申请日:2005-12-13

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

Patent Agency Ranking