Abstract:
Methods, systems, and apparatuses for booting an accessory with an accessory firmware image received from a host device are described. When the host device detects a connection between the accessory and the host device, the host device may send a request for an accessory identifier to the accessory. The accessory may send an accessory identifier to the host device in response. The host device may select an accessory firmware image that is suitable for the accessory, and may transmit the accessory firmware image to the accessory. The accessory firmware image may include information that the accessory can use to enable the accessory to exchange application data with the host device. Fig. 1A Fig. 1EB
Abstract:
Methods, systems, and apparatuses for charging a host device from a charging source through an accessory are described. Upon detecting an input power signal from the charging source, an accessory may send an identification request to the host device and authenticate the host device 5 based on the identification information received from the host device. Upon authenticating the host device, the accessory may enable a power path between the charging source and the host device to supply a charging current to charge the host device.
Abstract:
Methods, systems, and apparatuses for charging a host device from a charging source through an accessory are described. Upon detecting an input power signal from the charging source, an accessory may send an identification request to the host device and authenticate the host device 5 based on the identification information received from the host device. Upon authenticating the host device, the accessory may enable a power path between the charging source and the host device to supply a charging current to charge the host device.
Abstract:
Methods, systems, and apparatuses for booting an accessory with an accessory firmware image received from a host device are described. When the host device detects a connection between the accessory and the host device, the host device may send a request for an accessory identifier to the accessory. The accessory may send an accessory identifier to the host device in response. The host device may select an accessory firmware image that is suitable for the accessory, and may transmit the accessory firmware image to the accessory. The accessory firmware image may include information that the accessory can use to enable the accessory to exchange application data with the host device. Fig. 1A Fig. 1EB
Abstract:
Verfahren, Systeme und Vorrichtungen zum Laden einer Hostvorrichtung von einer Ladequelle durch ein Zubehör werden beschrieben. Sobald ein Eingangsleistungssignal von der Ladequelle festgestellt wird, kann ein Zubehör eine Identifikationsanfrage an die Hostvorrichtung senden und die Hostvorrichtung auf der Grundlage der Identifikationsinformationen, die von der Hostvorrichtung empfangen wurden, authentifizieren. Sobald die Hostvorrichtung authentifiziert ist, kann das Zubehör einen Leistungspfad zwischen der Ladequelle und der Hostvorrichtung freischalten, um einen Ladestrom zum Laden der Hostvorrichtung zur Verfügung zu stellen.
Abstract:
An electronic pedometer device can be calibrated using other pedometer devices that the user happens to be wearing. For example, a first pedometer can be incorporated into a device wearable on a first portion of a user's body (e.g., the wrist) while a second pedometer is incorporated into a device wearable on another portion of the user's body (e.g., the waist). The pedometer devices can communicate with each other to initiate a calibration period, during which data regarding measured accelerations, step count and/or user location is gathered. After the calibration period, one or both of the devices can use the data to compute calibration parameters, such as a conversion factor for converting a step count to distance and/or other parameters for converting measured accelerations to distance traveled.
Abstract:
In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.