Abstract:
Systems and methods are directed to discovering trusted remote devices and establishing trusted communications with trusted remote devices. A local device can determine one or more time periods of expected silence in a communication between the local device and a remote device; and embed trusted communication messages in the one or more time periods for at least one of: discovering that the remote device is a trusted remote device, performing a trusted communication with the trusted remote device. The communication may be based on a Bluetooth protocol in a link layer.
Abstract:
Methods and apparatuses for establishing a wireless connection are disclosed. In an embodiment, a first communication device transmits a first advertising signal for a first period of time, the first advertising signal configured to advertise that the first communication device is available to establish a first wireless connection, scans for a second advertising signal for a second period of time, the second advertising signal transmitted by a second communication device and configured to advertise that the second communication device is available to establish a second wireless connection, and listens for a third signal for a third period of time, the third signal transmitted by a third communication device in response to the first advertising signal, the third period of time occurring during the second period of time.
Abstract:
Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment method may include operations for receiving in the computing device a signal from a proximity beacon device, obtaining from the received signal information that indicates whether the proximity beacon device has detected movement, determining whether the obtained information matches stored data corresponding to the proximity beacon device, performing an abbreviated authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal matches the stored data, and performing a normal authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal does not match the stored data.
Abstract:
Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment method may include operations for receiving in the computing device a signal from a proximity beacon device, obtaining from the received signal information that indicates whether the proximity beacon device has detected movement, determining whether the obtained information matches stored data corresponding to the proximity beacon device, performing an abbreviated authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal matches the stored data, and performing a normal authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal does not match the stored data.
Abstract:
Methods, non-transitory processor-readable storage media, systems, and devices for provisioning devices associated with wireless identity transmitters. An embodiment method performed by a proximity broadcast receiver may include operations for receiving a broadcast message including a secure identifier from a wireless identity transmitter, transmitting to a central server a sighting message that includes the secure identifier and an identity of the proximity broadcast receiver, receiving from the central server a return message that includes identification information related to the received broadcast message and that is authorized to be distributed to the proximity broadcast receiver based on data stored on the central server, and provisioning a device associated with the received broadcast message based on the identification information from the received return message. The method may also include identifying a software source from the received return message, requesting the software from the identified software source, and installing the received software.
Abstract:
A method for muting a Bluetooth device is described. The method includes receiving, by a Bluetooth controller of the Bluetooth device, a mute remote microphone message from a peer Bluetooth device. The method also includes disabling audio transmission functionality of the Bluetooth device. The Bluetooth device may also receive a disable remote mute message from the peer Bluetooth device and enable the audio transmission functionality of the Bluetooth device.
Abstract:
A packet is received at a device, over a connection between the device and another device indicating suspending the connection. The device suspends the connection and stores a suspended connection attribute record having connection attributes for resuming the connection. The device receives an advertisement packet having a resume suspended connection request, and determines if the resume suspended connection request is a request to resume the connection associated with the suspended connection attribute record. If determining is affirmative, the device resumes the connection according to the stored connection attributes.
Abstract:
Methods and apparatus for multiple wireless service coexistence are disclosed. The disclosed methodology and accompanying apparatus serve to engage one or more switching devices to connect/disconnect a first service transmitter to a first antenna, connect/disconnect a dual mode receiver and second service transmitter from the first antenna, connect/disconnect the second service transmitter from a second antenna, and connect/disconnect a diversity receiver to the second antenna. A first service transmit signal in a first service can then be transmitted or received using the first antenna, and a second service receive signal in a second service can be transmitted or received using the second antenna and the diversity receiver.
Abstract:
Frequency bands for Industrial Scientific and Medical (ISM) communications are selected to avoid interference with the cellular communication. In one aspect of the disclosure, the frequency bands for Bluetooth/WLAN communication are selected to avoid channels that are within a predetermined distance of a harmonic of a cellular (e.g., wireless wide area network) receive frequency band. That is, a frequency band is selected that is at least a predetermined distance from the cellular receive frequency bands.
Abstract:
Certain aspects of the present disclosure generally relate to wireless communications and, more particularly, to mechanisms for enhancing pedestrian to vehicle (P2V) communications. For example, a pedestrian user equipment (P-UE) may detect a change in at least one of: location or motion of the UE adjust, based on the detection, behavior of one or more features of the UE related to P2V transmissions.