摘要:
Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.
摘要:
Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.
摘要:
Various embodiments are described herein for a method of communicating between a main processor of a mobile device and a battery for providing power to the device. In general terms the method comprises providing a communication interface (132) between the main processor (102) and the battery (130) to provide communication therebetween; sending a protocol version request packet (460) from the main processor (102) to the battery (130); initiating authentication (610) of the battery (130) by the main processor (102) if the battery (130) provides (604) a protocol version response packet to the main processor (102) in response to the sending a protocol version request packet; and reading a battery ID resistor of the battery (130) if the battery (130) does not provide a protocol version response packet to the main processor (102) in response to the sending (602) a protocol version request packet.
摘要:
Systems and methods for selecting a certificate for use in securing a message to be transmitted from a computing device is described herein. A set of certificates is determined and the certificates are ranked based on one or more predetermined ranking criteria. At least the highest ranking certificate is displayed, and a certificate is selected for securing the message.
摘要:
A system and method for authenticating a user to a user device using two-factor authentication with a certificate. The status of the certificate is stored at the user device such that the stored status is queried during the authentication process. The status is updated as a background operation on the user device on a periodic basis. In the event that the user device fails to obtain updated status information, the frequency at which status update requests are issued by the user device are increased to a predetermined frequency or until a response is received.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. Determining the target transmit power of a particular wireless transmission is based, at least in part, on the confidentiality of encrypted data carried by the particular transmission. The security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed.
摘要:
A system and method for generating keys that can be used for encrypting and decrypting PIN messages transmitted between mobile devices. In one embodiment, the method comprises defining a function f, where f(x,y) = f(y,x), and for each of first and second mobile devices, evaluating f with one of x and y having the value of the PIN of the respective mobile device and hard coding f into the respective mobile device. Each one of the first and second mobile devices can then compute a shared messaging key by evaluating f with the other of x and y having the value of the PIN of the other mobile device. The shared key can then be used specifically to encrypt and decrypt PIN messages transmitted between those two mobile devices.