Abstract:
Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network..
Abstract:
A client device and a host device may create a local connection for providing wide area network access, such as Internet access, to the client device. In some embodiments, the client device may have limited network capabilities and may not be able to access the Internet without the host device. The client device may provide its speed and direction in a message to potential host devices. A host device may calculate a suitability metric, based on the speed and direction of the client as well as connection properties of the networks, which indicates an ability for the host device to connect the client device to the Internet. The host device may provide the suitablity metric within a connection reqeust to the client device. Based on the suitabiltiy metric and/or other factors, the client device and the host device may establish the local connection.
Abstract:
A host device may include a wireless interface for communications, a memory, and a processor coupled to the memory and the wireless interface. The host may receive, via the wireless interface, an advertisement message from a client device. The advertisement message may include an identifier associated with the client and a request for communication of data from a cloud-based service. Responsive to the advertisement, the host may send the identifier to the cloud-based service. The host may receive from the cloud-based service, a proxy indication of available data associated with the client. Responsive to receiving the proxy indication of available data, the host may provide, via the wireless interface, a connection request including a client indication of the available data from the cloud-based service to the client. After receiving the available data from the service, the host may send the available data to the client.
Abstract:
Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network..
Abstract:
An accessory communication control protocol can facilitate faster and more secure transmission of status updates from an accessory to a controller (or network base station). An accessory can register with a controller, where the controller can provide some subscription and key generation information to the accessory. The accessory can detect changes to characteristics of the accessory and generate a broadcast notification that includes updates to the state of the characteristic. The broadcast notification can also include a counter, a device identifier, and a key. According to timing or rules, the accessory can transmit the broadcast notification to the controller without the need to establish a secure session with the controller.
Abstract:
Controllers can be used to control the operation of various accessories. Controllers with access to a particular accessory (or group of accessories) can be organized into a controller network to facilitate control. The controller network can include various proxy devices including bridge and tunnel proxies that can relay messages to and from accessories, perform protocol translations, and/or provide communication security. Some proxy devices can include decision logic to enable coordinated control over one or more accessories by the controllers in the controller network.
Abstract:
An accessory communication control protocol can facilitate faster and more secure transmission of status updates from an accessory to a controller (or network base station). An accessory can register with a controller, where the controller can provide some subscription and key generation information to the accessory. The accessory can detect changes to characteristics of the accessory and generate a broadcast notification that includes updates to the state of the characteristic. The broadcast notification can also include a counter, a device identifier, and a key. According to timing or rules, the accessory can transmit the broadcast notification to the controller without the need to establish a secure session with the controller.
Abstract:
A host device may include a wireless interface for communications, a memory, and a processor coupled to the memory and to the wireless interface. The host device may receive, via the wireless interface, an advertisement message from a client device. The advertisement message may include an identifier associated with the client device and a request for communication of data from a cloud-based service. Responsive to the advertisement, the host may send the identifier to the cloud-based service. The host may receive from the cloud-based service, a proxy indication of available data associated with the client. Responsive to receiving the proxy indication of available data, the host may provide, via the wireless interface, a connection request including a client indication of the available data from the cloud-based service to the client. After receiving the available data from the cloud-based service, the host device may send the available data to the client.
Abstract:
Controllers can be used to control the operation of various accessories. A group of accessories can be organized into an accessory network that can facilitate coordinated control of multiple accessories. The accessory network can be organized according to an environment model that can include a hierarchical representation of a physical environment where accessories are present. The environment model can be synchronized across different controllers that have access to the accessories.