Abstract:
Messaging between a companion device and an accessory device is controlled such that different modes of communication may be utilized. The different modes can implement different messaging strategies, each of which is intended for efficient power management, in view of the limited electrical power that is typically available at the accessory device. A received request message for sending from the companion device to the accessory device is sent if predetermined conditions apply, and similarly for messages from the accessory device to the companion device.
Abstract:
The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device and broadcasts an activity advertisement comprising an activity identifier for the activity. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device acquires extended activity data from the source electronic device and uses the extended activity data to configure the second application and commence performing the activity with the second application at the companion electronic device. The source electronic device may also forward activity-related information (e.g., information from a copy and paste clipboard in the source electronic device) to the companion electronic device.
Abstract:
Application processes executing on a mobile device can interact with interfaces (e.g., routines of an application programming interface) exposed on that mobile device in order to establish a wireless connection either directly to a network (e.g., the Internet) or directly to an intermediary device through which the application processes can then communicate with the network indirectly. The intermediary device can communicate with the network on behalf of the mobile device. The application processes can remain unaware, in either case, of whether the interfaces are communicating with the network through the intermediary device or not. The interfaces can insulate the application processes from that fact. The use of the intermediary device can be transparent to the application processes, such that the manner in which the application processes transmit and receive data using the interfaces remains constant regardless of whether the intermediary device is involved.
Abstract:
A device may broadcast an indication of an activity level of the device. The device may also receive a notification of an incoming message and receive at least one broadcast from at least one additional device also receiving the notification of the incoming message including an indication of at least one activity level of the at least one additional device. The device may compare its own activity level with the received at least one activity level. In response to determining that the activity level of the device is equal to or greater than a highest received at least one activity level, the device may display the notification of the incoming message.
Abstract:
Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
Abstract:
Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
Abstract:
The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device. Then, the companion electronic device uses the extended activity data to configure the second application and commences performing the activity with the second application at the companion electronic device.
Abstract:
Methods and apparatuses for wireless communication devices to discover each other and share information are described. Wireless communication devices transmit and receive messages to identify compatible wireless communication devices. The messages include indicators for a communication service and one or more user identification values. A scanning wireless communication device identifies a message from a broadcasting wireless communication device that satisfies a set of matching filter criteria and extracts user identification values from the message. The scanning wireless communication device compares the extracted user identification values to a local set of user identification values. When an extracted user identification value from the message matches a user identification value in the local set of user identification values, the scanning wireless communication device establishes a connection to the broadcasting wireless communication device according to the communication service indicated in the message.