Abstract:
A device in a payment transaction handoff system may include at least one processor configured to receive a request to perform a payment transaction and identify, using a first communication protocol, a respective device identifier of each of a plurality of proximate devices. The at least one processor is configured to select, based at least in part on a payment factor, a default payment device from the plurality of proximate devices. The at least one processor is configured to transmit, via a second communication protocol, a message to perform the payment transaction, the message comprising the device identifier of the default payment device. In one or more implementations, a first device of the plurality of proximate devices may be associated with a first user account and a second device of the plurality of proximate devices may be associated with a second user account, different from the first user account.
Abstract:
A device may broadcast an indication of an activity level of the device. The device may also receive a notification of an incoming message and receive at least one broadcast from at least one additional device also receiving the notification of the incoming message including an indication of at least one activity level of the at least one additional device. The device may compare its own activity level with the received at least one activity level. In response to determining that the activity level of the device is equal to or greater than a highest received at least one activity level, the device may display the notification of the incoming message.
Abstract:
A device displays a first user interface on a first display, including a plurality of objects and corresponding to a second user interface on a second display. While a first object is displayed as a selected object in the second user interface, the device: detects a first input requesting information about a second object; and in response to detecting the first input, displays information about the second object in the first user interface and maintains display of the first object as the selected object in the second user interface. After displaying the information, the device detects a second input selecting the second object. In response to detecting selection of the second input, the device: displays the second object as the selected object in the first user interface; and provides, to the second display, information that enables the second user interface to display the second object as the selected object.
Abstract:
A device implementing dynamic controller selection may include a processor configured to generate a connectivity graph based on a scan for accessory devices, the connectivity graph including a connectivity metric value for a discovered accessory device. The processor may be configured to broadcast the connectivity graph and receive another connectivity graph broadcasted by another electronic device that includes another connectivity metric value for the accessory device. The processor may be configured to receive a request to provide an instruction to the accessory device and determine which of the electronic devices will provide the instruction based on the connectivity metric values. The processor may be further configured to, when the electronic device is determined, provide the instruction for transmission to the accessory device, and when the other electronic device is determined, provide, for transmission to the other electronic device, the instruction to be provided to the accessory device.
Abstract:
This application sets forth techniques for transfer of a cellular wireless service plan associated with a SIM or an eSIM between non-linked wireless devices. A target wireless device broadcasts an advertisement beacon requesting transfer of a cellular wireless service plan. After successful authentication with a source wireless device, using a manually entered verification code or a QR verification code, the target wireless device selects a cellular wireless service plan to transfer. The source wireless device obtains a transfer token from an MNO entitlement server for transfer of the selected cellular wireless service plan and provides the transfer token to the target wireless device via a secure, short distance Bluetooth connection or, alternatively, embedded in an encrypted QR code. The target wireless device uses the transfer token to obtain a new eSIM associated with transfer of the cellular wireless service plan.
Abstract:
Some embodiments provide a method for an electronic device. The method stores user data associated with a web-based third party service based on user interaction with a web domain for the third party service through a web browser. The method receives a request from a service-specific application to utilize the user data stored for the third party service. The method provides the user data to the application only when the application is verified by the web domain for receiving user data associated with the third party service.
Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
This application relates to techniques for anonymously establishing a secure communication session with a wireless client. A described method, performed by an anonymous wireless host, includes advertising a service implemented by the anonymous wireless host as available over a wireless network, receiving an invitation to establish the secure communication session with the wireless client, transmitting an acceptance of the invitation to the wireless client, and establishing the secure communication session over a communication channel. The invitation is received from the wireless client and the acceptance is transmitted to the wireless client via a broadcast address or a multicast address associated with the wireless network. The secure communication session is used to exchange encrypted data between the service and the wireless client.
Abstract:
Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.
Abstract:
This application relates to a computing device that can be configured to implement a method for enabling a nearby computing device to access a wireless network by carrying out the techniques described herein. In particular, the method can include the steps of (1) receiving a request from the nearby computing device to access the wireless network, where the request includes user information associated with the nearby computing device, (2) presenting a notification associated with the request in response to determining, based on the user information, that the nearby computing device is recognized by the computing device, and (3) in response to receiving an approval for the nearby computing device to access the wireless network: providing, to the nearby computing device, a password for accessing the wireless network.