Abstract:
A transit request is initiated, which requests dispatch of a vehicle to a location of the electronic device. Information, including authentication information, is received and a communication channel is established with the vehicle.
Abstract:
A thermal manager has a digital filter whose input is to receive raw temperature values from a sensor and whose output is to provide processed or filtered temperature values according to a filter function that correlates temperature at the sensor with temperature at another location in the device. The thermal manager has a look-up table that further correlates temperature at the sensor with temperature at the other location. The look-up table contains a list of processed temperature sensor values, and/or a list of temperatures representing the temperature at the other location, and their respective power consumption change commands. The thermal manager accesses the look-up table using selected, filtered temperature values, to identify their respective power consumption change commands. The latter are then evaluated and may be applied, to mitigate a thermal at the other location. Other embodiments are also described and claimed.
Abstract:
A thermal manager has a digital filter whose input is to receive raw temperature values from a sensor and whose output is to provide processed or filtered temperature values according to a filter function that correlates temperature at the sensor with temperature at another location in the device. The thermal manager has a look-up table that further correlates temperature at the sensor with temperature at the other location. The look-up table contains a list of processed temperature sensor values, and/or a list of temperatures representing the temperature at the other location, and their respective power consumption change commands. The thermal manager accesses the look-up table using selected, filtered temperature values, to identify their respective power consumption change commands. The latter are then evaluated and may be applied, to mitigate a thermal at the other location. Other embodiments are also described and claimed.
Abstract:
In some exemplary processes for accessing a vehicle, a transit request is initiated. The transit request summons a vehicle towards a location of a user device. Information generated in response to the transit request is received. The information includes first authentication information and second authentication information. Third authentication information from the vehicle is received using a first wireless communication protocol. A determination is made as to whether the third authentication information corresponds to the first authentication information. In accordance with determining that the third authentication information corresponds to the first authentication information, a wireless communication connection is established with the vehicle using a second wireless communication protocol and the second authentication information. The second wireless communication protocol is different from the first wireless communication protocol. Using the second wireless communication protocol, instructions to unlock a cabin of the vehicle are sent.
Abstract:
In some exemplary processes for accessing a vehicle, a transit request is initiated. The transit request summons a vehicle towards a location of a user device. Information generated in response to the transit request is received. The information includes first authentication information and second authentication information. Third authentication information from the vehicle is received using a first wireless communication protocol. A determination is made as to whether the third authentication information corresponds to the first authentication information. In accordance with determining that the third authentication information corresponds to the first authentication information, a wireless communication connection is established with the vehicle using a second wireless communication protocol and the second authentication information. The second wireless communication protocol is different from the first wireless communication protocol. Using the second wireless communication protocol, instructions to unlock a cabin of the vehicle are sent.
Abstract:
A method, system, and connector interface for authenticating an accessory. the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
Abstract:
A method, system, and connector interface for authenticating an accessory. the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
Abstract:
Systems, methods, and devices are provided to sense unauthorized use of a vehicle. For example, an electronic device may include sensors to detect an operational parameter of a bicycle and communications circuitry to couple the electronic device to a second electronic device associated with user of the bicycle according to authorization information. Control circuitry may determine when the bicycle is in operation based at least in part on the detected operational parameter, identify whether the second electronic device is substantially within a communicative proximity of the electronic device when the bicycle is in operation, and generate an alert indicating unauthorized operation when the second electronic device is not identified as substantially within the communicative proximity of the electronic device.