Abstract:
A Bluetooth low energy (BLE) device receives advertising packets from an advertising BLE device. The BLE device filters the received advertising packets utilizing hardware to search for the advertiser. If the advertiser is not found by the hardware, the packet filtering continues utilizing firmware. Device identity information, comprising non-private and/or private device identities, of preferred BLE devices is partitioned to form a different white list for the hardware, firmware, and host, respectively, to concurrently support privacy and white listing. If the advertiser is found by the hardware, the hardware sends a response to the advertiser following a successful CRC check performed in the hardware. If the advertiser is found by the firmware, the device identity information of the advertiser is inserted in the white list for the hardware. The host may be awakened based on the device configuration and/or attribute type information of the received advertising packets.
Abstract:
A Bluetooth low energy (BLE) device receives advertising packets from an advertising BLE device. The BLE device filters the received advertising packets utilizing hardware to search for the advertiser. If the advertiser is not found by the hardware, the packet filtering continues utilizing firmware. Device identity information, comprising non-private and/or private device identities, of preferred BLE devices is partitioned to form a different white list for the hardware, firmware, and host, respectively, to concurrently support privacy and white listing. If the advertiser is found by the hardware, the hardware sends a response to the advertiser following a successful CRC check performed in the hardware. If the advertiser is found by the firmware, the device identity information of the advertiser is inserted in the white list for the hardware. The host may be awakened based on the device configuration and/or attribute type information of the received advertising packets.
Abstract:
A plurality of encrypted packets having common payload data are received, wherein each of the plurality of encrypted packets includes a corresponding parity check field, and wherein a corresponding parity check syndrome for each of the plurality of encrypted packets indicates at least one bit error. A payload portion of each of the plurality of encrypted packets is decrypted to generate a plurality of decrypted payload portions. At least one chase coding technique is used to generate a corrected decrypted payload, based on at least one candidate bit error position and further based on the corresponding parity check syndrome for at least one of the plurality of encrypted packets.
Abstract:
A plurality of encrypted packets having common payload data are received, wherein each of the plurality of encrypted packets includes a corresponding parity check field, and wherein a corresponding parity check syndrome for each of the plurality of encrypted packets indicates at least one bit error. A payload portion of each of the plurality of encrypted packets is decrypted to generate a plurality of decrypted payload portions. At least one chase coding technique is used to generate a corrected decrypted payload, based on at least one candidate bit error position and further based on the corresponding parity check syndrome for at least one of the plurality of encrypted packets.
Abstract:
Various examples are provided for related to Bluetooth voice quality improvement. In one example, among others, a method includes determining whether a packet payload is received during a transmission period of a collocated interface based at least in part upon signaling from the collocated interface and replacing at least a portion of the payload with estimated payload data based at least in part upon whether the payload was received during the transmission period. In another example, a communication device includes a first interface that supports BT communications and a collocated second interface. The first interface is operable to replace at least a portion of a payload of a BT packet with estimated payload data based at least in part upon signaling from the second interface that indicates whether at least a portion of the BT packet was received during a transmission period of the second interface.