Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
Methods and apparatus to manage communication sessions to handover between a direct connection at a secondary wireless device and a relayed connection to the secondary wireless device via a primary wireless device. A connection manager of a secondary wireless device can trigger transfer of a communication session based on measurements of performance metrics for the communication session. Upon detection of performance degradation in a local connection or a backhaul connection or both, the connection manager of the secondary wireless device can determine proximity of and/or capabilities for connections of the primary wireless device and instigate transfer of the communication session between different connection types, such as between a direct connection and a relayed connection. The transfer of the communication session can occur without user intervention or in response to input from the user without interrupting or reestablishing the communication session.
Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
Methods and apparatus to manage communication sessions to handover between a direct connection at a secondary wireless device and a relayed connection to the secondary wireless device via a primary wireless device. A connection manager of a secondary wireless device can trigger transfer of a communication session based on measurements of performance metrics for the communication session. Upon detection of performance degradation in a local connection or a backhaul connection or both, the connection manager of the secondary wireless device can determine proximity of and/or capabilities for connections of the primary wireless device and instigate transfer of the communication session between different connection types, such as between a direct connection and a relayed connection. The transfer of the communication session can occur without user intervention or in response to input from the user without interrupting or reestablishing the communication session.