Abstract:
A device providing temporary pairing for wireless devices may include a memory and at least one processor configured to receive a request to temporarily pair with a wireless device. The at least one processor may be further configured to pair with the wireless device, wherein the pairing comprises generating a link key for connecting to the wireless device. The at least one processor may be further configured to connect to the wireless device using the link key. The at least one processor may be further configured to initiate a timer upon disconnecting from the wireless device. The at least one processor may be further configured to automatically and without user input, delete the link key when the timer reaches a timeout value without having reconnected to the wireless device using the link key.
Abstract:
This document describes, inter alia, techniques for configuring or setting up a wireless device. As an example of the features described herein, a first wireless device may be used to configure a second wireless device as follows: the first wireless device may detect that the second wireless device is available and is configurable; the first wireless device may connect to the second wireless device and transmit configuration information to the second wireless device, where the configuration information includes credentials that may be used to access a wireless network (e.g., a password to access a Wi-Fi network); the first wireless device and the second wireless device may then both connect to the wireless network, using the credentials; once both devices are connected to the wireless network, the first wireless device may verify that the second wireless device has been correctly configured.
Abstract:
A device displays a first user interface on a first display, including a plurality of objects and corresponding to a second user interface on a second display. While a first object is displayed as a selected object in the second user interface, the device: detects a first input requesting information about a second object; and in response to detecting the first input, displays information about the second object in the first user interface and maintains display of the first object as the selected object in the second user interface. After displaying the information, the device detects a second input selecting the second object. In response to detecting selection of the second input, the device: displays the second object as the selected object in the first user interface; and provides, to the second display, information that enables the second user interface to display the second object as the selected object.
Abstract:
There is provided a method comprising presenting, by a user device (102a, 700), a first graphical notification (202) prompting a user to invoke a virtual keyboard (310) on the user device (102a, 700); receiving, by the user device via the first graphical notification (202), a first user input invoking the virtual keyboard (310) on the user device (102a, 700); presenting, on a display of the user device (102a, 700), the virtual keyboard (310) for providing input, wherein the virtual keyboard is provided by an operating system (104a) of the user device (102a, 700) that is distinct from any user application on the user device; and receiving, via a microphone (730) of the user device (102a, 700), user voice input providing at least one command to the virtual keyboard (310).
Abstract:
A method for controlling access to a wireless network, the method comprising, by a computing device: providing, to a nearby computing device, an encrypted request to access the wireless network; and in response to the nearby computing device: (1) determining, based on a satisfaction of a signal strength threshold associated with the encrypted request, that the nearby computing device and the computing device are proximate to one another, and (2) identifying, among a plurality of encryption keys received by the computing device, an encryption key for decrypting the encrypted request: receiving, from the nearby computing device, a password for the wireless network, and utilizing the password to access the wireless network.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A method, comprising: at a first device, establishing a communication link with a second device by: approving a request received from the second device to establish the communication link with the second device; receiving, from the second device: (1) a first signal that encodes an encryption key, and (2) a second signal that encodes encrypted data, wherein the first and second signals are transmitted through different transmission mediums;
decrypting the encrypted data using the encryption key to produce decrypted data; and establishing the communication link with the second device based on the decrypted data.
Abstract:
In some implementations, a computing system can be configured so that a first user device can delegate a first user's media account credentials to second user device corresponding to a second user. For example, a playback device may be configured with a the second user's media account credentials for accessing media items through a network media service. A first user may wish to play media items associated with the first user's media account credentials on the playback device. To do so, the first user device can request a device identifier for the playback device, request and obtain a delegate token for the device identifier from the media service, and provide the delegate token along with media item information to the playback device. The playback device can then use the delegate token to request the media item associated with the first user's media access account.