×

Accessory identification for mobile computing devices

  • US 8,443,096 B2
  • Filed: 03/25/2009
  • Issued: 05/14/2013
  • Est. Priority Date: 03/16/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for an accessory coupled with a portable computing device to establish parameters for use in a communication session, the method comprising:

  • establishing, by the accessory, communication with the portable computing device;

    sending, by the accessory, a request to the portable computing device requesting information indicating one or more lingo versions supported by the portable computing device, wherein each lingo refers to a group of related commands;

    receiving, by the accessory, the information indicating one or more lingo versions supported by the portable computing device;

    sending, by the accessory, a request to the portable computing device requesting information indicating one more capabilities supported by the portable computing device;

    receiving, by the accessory, the information indicating one or more capabilities supported by the portable computing device;

    sending, by the accessory, an accessory identification token to the portable computing device indicating one or more lingoes usable by the accessory for communicating with the portable computing device, wherein the accessory identification token comprises (a) an indication of type of information included in the accessory identification token and (b) actual information;

    wherein the one or more lingoes usable by the accessory is determined based in part on at least one of the capabilities supported by the portable computing device and the lingoes supported by the portable computing device,wherein subsequent commands sent by the accessory are limited to only those commands included in the one or more lingoes usable by the accessory; and

    sending, by the accessory, an accessory capabilities token to the portable computing device indicating accessory capabilities, wherein the accessory capabilities token includes a code-value pair, the code being indicative of type of information and the value representing the actual information,wherein information in the accessory capabilities token is used by the portable computing device to disable capabilities not supported by the accessory.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×