CONTROLLER NETWORKS FOR AN ACCESSORY MANAGEMENT SYSTEM
    1.
    发明申请
    CONTROLLER NETWORKS FOR AN ACCESSORY MANAGEMENT SYSTEM 审中-公开
    用于附件管理系统的控制器网络

    公开(公告)号:WO2015184382A3

    公开(公告)日:2015-12-03

    申请号:PCT/US2015/033369

    申请日:2015-05-29

    Applicant: APPLE INC.

    Abstract: Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network..

    Abstract translation:

    控制器可用于控制各种附件的操作。 可以将访问特定配件(或一组配件)的控制器组织到控制器网络中,以便于控制。 控制器网络可以包括各种代理设备,包括桥接和隧道代理,其可以将消息中继至附件,执行协议转换,和/或提供通信安全性。 一些代理设备可以包括判定逻辑,以便由控制器网络中的控制器对一个或多个附件进行协调控制。

    SECURE WIRELESS COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES
    6.
    发明公开
    SECURE WIRELESS COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES 审中-公开
    控制器和附件之间的安全无线通信

    公开(公告)号:EP3190747A1

    公开(公告)日:2017-07-12

    申请号:EP17150108.3

    申请日:2017-01-03

    Applicant: Apple Inc.

    Abstract: A controller and an accessory controllable by the controller can communicate using secure read and write procedures. The procedures can include encrypting identifiers of accessory characteristics targeted by a read or write operation as well as any data being read or written. The procedures can also include the accessory returning a cryptographically signed response verifying receipt and execution of the read or write instruction. In some instances, a write procedure can be implemented as a timed write in which a first instruction containing the write data is sent separately from a second instruction to execute the write operation; the accessory can disregard the write data if the second instruction is not received within a timeout period after receiving the first instruction.

    Abstract translation: 控制器和可由控制器控制的附件可以使用安全的读取和写入程序进行通信。 这些过程可以包括加密由读取或写入操作以及正在读取或写入的任何数据所针对的附件特性的标识符。 该过程还可以包括附件返回加密签名的响应,验证接收和执行读取或写入指令。 在一些情况下,写入过程可以被实现为定时写入,其中包含写入数据的第一指令与第二指令分开发送以执行写入操作; 如果第二指令在接收到第一指令之后的超时时间内未被接收到,附件可以忽略写入数据。

Patent Agency Ranking