Abstract:
Systems and methods of limiting wireless discovery range are described. A method may include determining, at a first device, a discovery range threshold that limits a distance from the first device at which a second device is operative to decode a discovery message. The method may include adjusting a transmission attribute at the first device based on the discovery range threshold. The method may include sending the discovery message in accordance with the adjusted transmission attribute.
Abstract:
In one example, a method includes receiving, by a wireless docking center (WDC) and from a wireless dockee (WD), a request to access one or more peripheral functions (PFs) associated with the WDC, and receiving, by the WDC and from the WD, one or more authentication credentials. In this example, the method also includes determining, by the WDC, whether or not the one or more authentication credentials received from the WD grant access to the one or more PFs to which the WD requests access. In this example, the method also includes permitting, by the WDC, the WD to access a first PF of the one or more PFs to which the WD requests access in response to determining that the one or more authentication credentials grant access to the first PF.
Abstract:
In one example, a method includes receiving, from a user application and with a wireless docking service of a wireless docking communications stack executing on a computing device, a request to discover one or more peripheral functions within wireless communication range of the computing device. The method also includes, responsive to receiving the request, discovering, with the wireless docking service, the one or more peripheral functions without communicating with a wireless docking center. The method further includes consolidating the peripheral functions into a docking session for the user application. The method also includes, responsive to receiving the request, sending a docking session identifier and one or more respective references corresponding to the one or more peripheral functions to the user application.
Abstract:
Methods, devices, and computer program products for transmitting and receiving discovery and paging messages in a wireless communication device are described herein. In one aspect, a wireless apparatus operable in a wireless communication system includes a receiver configured to receive a discovery packet from a first device, the discovery packet including a first public key and information advertising a service provided by the first device. The wireless apparatus further includes a processor configured to generate a paging request packet, the paging request packet including a second public key and information indicating interest in the service provided by the first device. The processor is further configured to generate an encryption key based at least in part on the first public key and the second public key and encrypt at least a portion of the paging request packet using the generated encryption key. The wireless apparatus further includes a transmitter configured to transmit the encrypted paging request packet including the second public key and the information indicating interest in the service to the first device.
Abstract:
Systems and methods of limiting wireless discovery range are described. A transmitting device may limit wireless discovery range by adjusting one or more transmission attributes of a discovery message, measuring inter-device distance based on range determination messages, or any combination thereof. A receiving device may limit wireless discovery range based on one or more attributes of a received discovery message, measuring inter-device distance based on range determination messages, or any combination thereof. Discovery messages may include a range adaptation bit indicating whether range adaptation is to be performed.
Abstract:
Techniques are provided for validating a mobile device in a passive digital key system. An example method of validating a mobile device includes determining a positioning measurement for the mobile device relative to a reference point, obtaining a measured distance with at least a first transceiver, obtaining a calibration distance based at least in part on the positioning measurement for the mobile device, computing a validation distance based at least in part on a difference between the measured distance and the calibration distance, and validating the mobile device based at least in part on a comparison of the validation distance and a threshold value.
Abstract:
In one example, a method includes performing, by a wireless dockee (WD), a plurality of operations to wirelessly dock with a wireless docking center (WDC) such that the WD may access one or more peripheral functions (PFs) associated with the WDC. In this example, the WD includes a docking service, an application service platform (ASP), and one or more peripheral services that each correspond to at least one PF of the one or more PFs associated with the WDC. In this example, the method also includes interfacing, by the docking service and with the ASP, to perform a first subset of the plurality of operations, and interfacing, by the docking service and with the one or more peripheral services, to perform a second subset of the plurality of operations.
Abstract:
Systems and methods of limiting wireless discovery range. A transmitting device may limit wireless discovery range by adjusting one or more transmission attributes of a discovery message, measuring inter-device distance based on range determination messages, or any combination thereof. A receiving device may limit wireless discovery range based on one or more attributes of a received discovery message, measuring inter-device distance based on range determination messages, or any combination thereof. Discovery messages may include a range adaptation bit indicating whether range adaptation is to be performed.
Abstract:
A wireless dockee device may include a memory, and at least one processor configured to authenticate the wireless dockee to a wireless docking service using a Wi-Fi direct service (WFDS) application service platform (ASP). A wireless docking center device may include a memory, and at least one processor configured to authenticate a wireless dockee to a wireless docking service of a wireless docking center using a Wi-Fi direct service (WFDS) application service platform (ASP).
Abstract:
In one example, a method includes determining, by a wireless dockee (WD), one or more wireless docking environments (WDNs) associated with a wireless docking center (WDC), wherein each WDN of the one or more WDNs corresponds to at least one peripheral function (PF) of one or more PFs that are each associated with the WDC. In this example, the method also includes wirelessly accessing, by the WD, a respective at least one PF corresponding to a particular WDN of the one or more WDNs associated with the WDC.