Gating accessory connection
First Claim
1. A method for managing accessories connected with a mobile computing device, wherein the mobile computing device is coupled with a first accessory, a second accessory, and a third accessory, the method comprising:
- interacting, by the mobile computing device, with the first accessory and the second accessory, wherein the third accessory is in an deactivated state, the mobile computing device, the first accessory, the second accessory, and the third accessory being separately-housed electronic devices, wherein interacting with the first accessory includes one or both of sending a command to the first accessory to invoke a function of the first accessory or receiving a command from the first accessory to invoke a function of the mobile device;
receiving, by the mobile computing device, an indication that a triggering event has occurred;
in response to the triggering event, receiving, by the mobile computing device, a request from the first accessory to deactivate the first accessory;
in response to the request from the first accessory to deactivate the first accessory, deactivating, by the mobile computing device, the first accessory;
determining, by the mobile computing device, that a number of allowed active connections has not exceeded a threshold number of active connections;
activating, by the mobile computing device, the third accessory based on the determination;
interacting, by the mobile computing device, with the second accessory and the third accessory while the first accessory is inactive;
receiving, by the mobile computing device, an activation request from the first accessory, wherein the activation request from the first accessory is prompted by a user interaction with the first accessory; and
reevaluating, by the mobile computing device, the inactive state of the first accessory based on the activation request from the first accessory.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention can manage the activity of accessories connected to a mobile computing device. A mobile computing device can be connected to any number of accessories through wireless or physical connections. Processing and resource limitations at the mobile computing device limit the number of accessories that can feasibly interoperate with the mobile computing device at any one time. In some embodiments, a threshold value is placed on the number of accessories with which a mobile computing device can interoperate at any one time. This threshold value can depend on the types of accessories, the application(s) executing on the mobile computing device, the processing power, whether media output resource are being used, etc. In response to a threshold number of accessories being connected, the mobile computing device can deactivate accessories.
-
Citations
22 Claims
-
1. A method for managing accessories connected with a mobile computing device, wherein the mobile computing device is coupled with a first accessory, a second accessory, and a third accessory, the method comprising:
-
interacting, by the mobile computing device, with the first accessory and the second accessory, wherein the third accessory is in an deactivated state, the mobile computing device, the first accessory, the second accessory, and the third accessory being separately-housed electronic devices, wherein interacting with the first accessory includes one or both of sending a command to the first accessory to invoke a function of the first accessory or receiving a command from the first accessory to invoke a function of the mobile device;
receiving, by the mobile computing device, an indication that a triggering event has occurred;in response to the triggering event, receiving, by the mobile computing device, a request from the first accessory to deactivate the first accessory; in response to the request from the first accessory to deactivate the first accessory, deactivating, by the mobile computing device, the first accessory; determining, by the mobile computing device, that a number of allowed active connections has not exceeded a threshold number of active connections; activating, by the mobile computing device, the third accessory based on the determination; interacting, by the mobile computing device, with the second accessory and the third accessory while the first accessory is inactive; receiving, by the mobile computing device, an activation request from the first accessory, wherein the activation request from the first accessory is prompted by a user interaction with the first accessory; and reevaluating, by the mobile computing device, the inactive state of the first accessory based on the activation request from the first accessory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A mobile computing device comprising:
-
a processor; a memory coupled to the processor; and a communication interface coupled to the processor, wherein the processor in conjunction with the communication interface; determines that a first accessory, a second accessory, and a third accessory are coupled to the mobile computing device, wherein the first and the second accessories are in an active state and the third accessory is in an inactive state, the mobile computing device, the first accessory, the second accessory, and the third accessory being separately-housed electronic devices, wherein interacting with the first accessory includes one or both of sending a command to the first accessory to invoke a function of the first accessory or receiving a command from the first accessory to invoke a function of the mobile device; interacts with the first accessory and the second accessory; receives an indication that a triggering event has occurred; in response to the triggering event, receives a request from the first accessory to deactivate the first accessory; in response to receiving a request from the first accessory to deactivate the first accessory, deactivates the first accessory and activate the third accessory; interacts with the second accessory and the third accessory while the first accessory is deactivated; receives an activation request from the first accessory, wherein the activation request from the first accessory is prompted by a user interaction with the first accessory; and reevaluates the inactive state of the first accessory based on receiving the activation request from the first accessory. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification