Accessory and mobile computing device communication using application communication protocol
    1.
    发明专利
    Accessory and mobile computing device communication using application communication protocol 有权
    使用应用程序通信协议的附件和移动计算设备通信

    公开(公告)号:JP2010233217A

    公开(公告)日:2010-10-14

    申请号:JP2010058265

    申请日:2010-03-15

    CPC classification number: H04M1/0254 G06F13/385 H04M1/72527 H04M1/7253

    Abstract: PROBLEM TO BE SOLVED: To provide various communication techniques for communications between a mobile computing device and an accessory. SOLUTION: An accessory protocol which is generic to the mobile computing device 200 can be used for some communication. An application executed on the mobile computing device can communicate with the accessory 205 using an application communication protocol. In some embodiments, the application communication protocol may be different from the accessory communication protocol. In other embodiments the application protocol may only be recognized by the application and the accessory. In some embodiments, messages conforming to the application protocol are communicated between the application and the accessory by packaging the messages inside a message conforming to the accessory communication protocol. COPYRIGHT: (C)2011,JPO&INPIT

    Abstract translation: 要解决的问题:提供用于移动计算设备和附件之间的通信的各种通信技术。 解决方案:通用于移动计算设备200的附件协议可用于一些通信。 在移动计算设备上执行的应用可以使用应用通信协议与附件205进行通信。 在一些实施例中,应用程序通信协议可能与附件通信协议不同。 在其他实施例中,应用协议仅可由应用程序和附件识别。 在一些实施例中,符合应用协议的消息在应用和附件之间通过将消息封装在符合附件通信协议的消息内进行通信。 版权所有(C)2011,JPO&INPIT

    Accessories authentication for electronic devices
    2.
    发明专利
    Accessories authentication for electronic devices 有权
    电子设备附件认证

    公开(公告)号:JP2014053966A

    公开(公告)日:2014-03-20

    申请号:JP2013252930

    申请日:2013-12-06

    CPC classification number: G06F21/44 G06F21/445 G06F21/602 G06F2221/2129

    Abstract: PROBLEM TO BE SOLVED: To provide improved techniques to control utilization of accessory devices with electronic devices using cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another.SOLUTION: Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on a manufacturer or product basis by authenticating encrypted authentication information. Another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices that can receive accessory devices. One example of a media device is a media player, such as a music player that can present (e.g., play) media items (or media assets).

    Abstract translation: 要解决的问题:提供改进的技术来控制使用电子设备的附件设备的利用,所述设备使用密码方式认证电子设备,即彼此互连和通信的电子设备。解决方案:例如可以提供不同的电子设备 取决于不同的认证程度或级别,或者通过认证加密的认证信息,取决于制造商或产品。 另一方面涉及使用附件(或适配器)将外围设备(例如,USB设备)转换为主机设备(例如,USB主机)。 改进的技术特别适用于电子设备,例如可以接收附件设备的媒体设备。 媒体设备的一个示例是媒体播放器,例如可以呈现(例如,播放)媒体项目(或媒体资产)的音乐播放器。

    Accessory authentication for electronic device
    3.
    发明专利
    Accessory authentication for electronic device 审中-公开
    电子设备附件认证

    公开(公告)号:JP2010183571A

    公开(公告)日:2010-08-19

    申请号:JP2010011810

    申请日:2010-01-22

    CPC classification number: G06F21/44 G06F21/445 G06F21/602 G06F2221/2129

    Abstract: PROBLEM TO BE SOLVED: To provide improved techniques to control utilization of accessory devices with electronic devices by using cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. SOLUTION: By authenticating encrypted authentication information, different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a music player, that can present (e.g., play) media items (or media assets). COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供改进的技术,通过使用密码方法来认证电子设备,即彼此互连和通信的电子设备来控制具有电子设备的附件设备的利用。 解决方案:通过认证加密的认证信息,不同的电子设备例如可以根据不同程度或认证级别,或根据制造商或产品的不同而不同地进行配置。 另一方面涉及使用附件(或适配器)将外围设备(例如,USB设备)转换为主机设备(例如,USB主机)。 改进的技术特别适用于可以接收附件设备的电子设备,例如媒体设备。 媒体设备的一个示例是可以呈现(例如,播放)媒体项目(或媒体资产)的媒体播放器,诸如音乐播放器。 版权所有(C)2010,JPO&INPIT

    Accessory authentication for electronic devices

    公开(公告)号:AU2009100749A4

    公开(公告)日:2009-09-24

    申请号:AU2009100749

    申请日:2009-08-03

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

    Accessory authentication for electronic devices

    公开(公告)号:AU2008101150B4

    公开(公告)日:2009-07-23

    申请号:AU2008101150

    申请日:2008-11-26

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

    Accessory authentication for electronic devices

    公开(公告)号:AU2008101150A4

    公开(公告)日:2009-02-05

    申请号:AU2008101150

    申请日:2008-11-26

    Applicant: APPLE INC

    Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).

Patent Agency Ranking