Accessory identification for mobile computing devices
First Claim
1. A method of communicating using an accessory, the method comprising:
- establishing, by the accessory, communication with a mobile computing device;
obtaining, by the accessory, mobile device capability information from the mobile computing device;
sending, by the accessory, a first capability token to the mobile computing device, the first capability token including a first code-value pair, the first code identifying the first capability token as a command capability token and the first value being a value identifying a subset of commands within an accessory protocol that are supported by the accessory, the first value being determined based at least in part on the mobile device capability information; and
sending, by the accessory, a second capability token to the mobile computing device, the second capability token including a second code-value pair, the second code identifying the second capability token as an interface capability token and the second value being a bitmask identifying one or more interface capabilities that are supported by the accessory, the second value being determined based at least in part on the mobile device capability information;
thencommunicating, by the accessory, with the mobile computing device, wherein the subset of commands identified in the first capability token and the interface capabilities identified in the second capability token are usable by the accessory while communicating with the mobile computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo information that includes only those lingoes the accessory can use while coupled with the mobile computing device. The accessory can also communicate accessory protocol information to the mobile computing device during identification. The accessory can be limited to using only those lingoes and/or those protocols identified during identification. Various other accessory information, capabilities, preferences, etc. can also be communicated to the mobile computing device during identification.
125 Citations
19 Claims
-
1. A method of communicating using an accessory, the method comprising:
-
establishing, by the accessory, communication with a mobile computing device; obtaining, by the accessory, mobile device capability information from the mobile computing device; sending, by the accessory, a first capability token to the mobile computing device, the first capability token including a first code-value pair, the first code identifying the first capability token as a command capability token and the first value being a value identifying a subset of commands within an accessory protocol that are supported by the accessory, the first value being determined based at least in part on the mobile device capability information; and sending, by the accessory, a second capability token to the mobile computing device, the second capability token including a second code-value pair, the second code identifying the second capability token as an interface capability token and the second value being a bitmask identifying one or more interface capabilities that are supported by the accessory, the second value being determined based at least in part on the mobile device capability information;
thencommunicating, by the accessory, with the mobile computing device, wherein the subset of commands identified in the first capability token and the interface capabilities identified in the second capability token are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of communicating using an accessory, the method comprising:
-
establishing, by the accessory, communication with a mobile computing device; obtaining, by the accessory, mobile device capability information from the mobile computing device; sending, by the accessory, a command to begin a device identification sequence; and sending, by the accessory, a packet comprising a plurality of tokens, each of the plurality of tokens including a code-value pair, the code identifying a type of capability and the value identifying one or more capabilities of the identified type that are supported by the accessory, the plurality of tokens including; a first token including a first code-value pair, the first code identifying the first token as a command capability token and the first value being a value identifying a subset of commands within an accessory protocol that are supported by the accessory, the first value being determined based at least in part on the mobile device capability information; and a second token including a second code-value pair, the second code identifying the second token as an interface capability token and the second value being a bitmask identifying one or more interface capabilities that are supported by the accessory, the second value being determined based at least in part on the mobile device capability information;
thencommunicating, by the accessory, with the mobile computing device, wherein the subset of commands identified in the first token and the interface capabilities identified in the second token are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of communicating using an accessory, the method comprising:
-
sending, by the accessory, a command to a mobile computing device to begin a device identification sequence; obtaining, by the accessory, mobile device capability information from the mobile computing device; and sending, by the accessory, a plurality of tokens, each of the plurality of tokens including a code-value pair, the code identifying a type of capability and the value identifying one or more capabilities of the identified type that are supported by the accessory, at least one of the plurality of tokens further including an indication of a length of the token, the plurality of tokens including; a first token including a first code-value pair, the first code identifying the first token as a command capability token and the first value being a value identifying a subset of commands within an accessory protocol that are supported by the accessory, the first value being determined based at least in part on the mobile device capability information; and a second token including a second code-value pair, the second code identifying the second token as an interface capability token and the second value being a bitmask identifying one or more interface capabilities that are supported by the accessory, the second value being determined based at least in part on the mobile device capability information;
thencommunicating, by the accessory, with the mobile computing device, wherein the subset of commands identified in the first token and the interface capabilities identified in the second token are usable by the accessory while communicating with the mobile computing device. - View Dependent Claims (16, 17, 18, 19)
-
Specification