ACCESSORY IDENTIFICATION FOR MOBILE COMPUTING DEVICES
First Claim
1. A method of communicating using an accessory, the method comprising:
- establishing communication with a mobile computing device;
sending a first capability token to the mobile computing device, the first capability token including a first code-value pair, the first code identifying a first type of capability and the first value being a value identifying one or more capabilities of the first type that are supported by the accessory; and
sending a second capability token to the mobile computing device, the second capability token including a second code-value pair, the second code identifying a second type of capability and the second value being a bitmask identifying one or more capabilities of the second type that are supported by the accessory;
thencommunicating with the mobile computing device, wherein the one or more first capabilities and the one or more second capabilities are usable by the accessory while communicating with the mobile computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo information that includes only those lingoes the accessory can use while coupled with the mobile computing device. The accessory can also communicate accessory protocol information to the mobile computing device during identification. The accessory can be limited to using only those lingoes and/or those protocols identified during identification. Various other accessory information, capabilities, preferences, etc. can also be communicated to the mobile computing device during identification.
4 Citations
20 Claims
-
1. A method of communicating using an accessory, the method comprising:
-
establishing communication with a mobile computing device; sending a first capability token to the mobile computing device, the first capability token including a first code-value pair, the first code identifying a first type of capability and the first value being a value identifying one or more capabilities of the first type that are supported by the accessory; and sending a second capability token to the mobile computing device, the second capability token including a second code-value pair, the second code identifying a second type of capability and the second value being a bitmask identifying one or more capabilities of the second type that are supported by the accessory;
thencommunicating with the mobile computing device, wherein the one or more first capabilities and the one or more second capabilities are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of communicating using an accessory, the method comprising:
-
establishing communication with a mobile computing device; sending a command to begin a device identification sequence; and sending a packet comprising a plurality of tokens, each of the plurality of tokens including a code-value pair, the code identifying a first type of capability and the value identifying one or more capabilities of the first type that are supported by the accessory;
thencommunicating with the mobile computing device, wherein the one or more first capabilities identified by the plurality of tokens are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (12, 13, 14, 15)
-
-
11. The method of clam 10 wherein the command to begin a device identification sequence is sent in a separate packet from the plurality of tokens.
-
16. A method of communicating using an accessory, the method comprising:
-
sending a command to begin a device identification sequence; and sending a plurality of tokens, each of the plurality of tokens including a code-value pair, the code identifying a first type of capability and the value identifying one or more capabilities of the first type that are supported by the accessory, at least one of the plurality of tokens further including an indication of a length of the token;
thencommunicating with the mobile computing device, wherein the one or more first capabilities identified by the plurality of tokens are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (17, 18, 19, 20)
-
Specification