Abstract:
A method and system for selecting and connecting to an access point in a wireless network of devices, such as a Bluetooth network. Initially, an initiator device is preconfigured with a list of available access point addresses. The initiator device broadcasts an inquiry message that is received by available wireless devices which, in turn, respond with their respective addresses, occupancy level and device classification. The initiator device compares the respondent addresses with the preconfigured access point addresses and connects to a match, thus terminating the inquiry, provided certain fitness functions are satisfied. The fitness functions might include such considerations as occupancy rate, device classification, signal strength, or physical distance of separation. The list of addresses on the initiator device is updated automatically upon connecting with a network server whenever a new device is added or an old one removed from the network server's access point address list.
Abstract:
One embodiment in accordance with the present invention includes using a portable computing device to remotely control devices and/or systems wirelessly. Specifically, a software timer application operating on the portable computing device enables its user to predefine the time, date, and the operation(s) that one or more properly enabled devices and/or systems perform in the future. That is, the timer software operating on the portable computing device is able at some predefined time to wirelessly trigger an action or a sequence of actions from devices and/or systems. For example, a user of the portable computing device is able to utilize the timer software to program a predefined date and time that the portable computing device will turn on a favorite radio program and turn up the thermostat. The wireless communication of the portable computing device may occur using a radio frequency (RF) technology like Bluetooth, IEEE 802.11, or HomeRF.
Abstract:
A method and system whereby an initiator device discovers the user-friendly name of another device in a wireless network of devices, such as a Bluetooth network. Initially, the initiator device broadcasts an inquiry message that is received by the other device (the responding device). The responding device provides its address in response to the inquiry. The initiator device then transmits a page, followed by a name request, to the responding device. The responding device provides its user-friendly name in response to the name request. The initiator device stores (e.g., caches) the address and the associated user-friendly name in a memory cache. When the initiator device subsequently sends an inquiry message that is received by the responding device, the responding device will provide its address to the initiator device. However, instead of sending a name request, the initiator device can retrieve the user-friendly name from the memory cache based on the address. Thus, the number of messages needed for the name discovery process is reduced, allowing the process to be performed more quickly and conserving the battery resources of the initiator and responding devices. In addition, potential errors associated with the name requests can be reduced or eliminated.
Abstract:
Techniques to create a portable wireless network are described. A mobile computing device may comprise a first transceiver to communicate with a fixed wireless device, and a second transceiver to communicate with multiple wireless devices. The mobile computing device may also include a network access management module to manage communications between each wireless device and the fixed wireless device. Other embodiments are described and claimed.
Abstract:
A messaging system is disclosed. The system includes a communications network including a wireless access point, a messaging server coupled to the communications network, and a mobile device in communication with the communications network via an access point. The mobile device has a mobile ID associated with the device, and a program running on the mobile device from which a temporary address may be created corresponding to the mobile ID. The temporary address is useable for messaging over the communications network. The temporary address is registered with the messaging server.
Abstract:
A method and system for managing when a responder device (a device having a transceiver for wireless communication) is operating in a discoverable mode in a wireless network of devices, such as a Bluetooth network. In the discoverable mode, the responder device is set to scan for and respond to general inquiry messages broadcast from another device (e.g., an initiator device). When in the non-discoverable mode, the responder device will not respond to and/or scan for general inquiry messages broadcast from an initiator device. The responder device automatically enters the discoverable mode when the responder device enters into its awake mode. The responder device automatically enters the non-discoverable mode when the device enters into its sleep mode. Therefore, the responder device will be in discoverable mode for a reduced period of time, and as such will respond to fewer general inquiry messages. Accordingly, fewer messages will be exchanged between devices in the wireless network, simplifying the device discovery process for users and conserving the battery resources of the initiator and responder devices.
Abstract:
A method and system for effecting a security web upon multiple devices. In one embodiment of the invention, multiple devices are enabled to respond as authorized members of a security web such that each device acts as a co-monitoring device within the web. Further, each device transmits an identifiable RF signal at regular time intervals and is enabled to search for the transmitted RF signal from every other device within the security web. Next the invention determines a non-authorized loss of proximity from the web of any of the devices of the web. Upon determining a non-authorized loss of proximity of any device, the invention provides for at least one of the devices of the web to initiate an event.
Abstract:
A technique for handling undesired data over a limited bandwidth channel. Specifically, one embodiment in accordance with the present invention operates within an electronic system or device (e.g., personal digital assistant) which can be coupled to a networking environment. An embodiment of the present invention allows higher levels of software operating within an electronic system to directly communicate with and determine the current operation of lower levels of software. As such, a higher level of software is advantageously able to perform appropriate actions in response to activities being performed by a lower level of software. For example, the higher level of software is able to suspend its time-out of a delayed response to a data request after determining that the reason for the delay is due to the fact that there is a “log jam” caused by canceled data packets being processed by a transport layer while a UDP layer is currently discarding canceled data packets associated with a canceled data request. Therefore, one embodiment of the present invention enables electronic devices to operate more efficiently.
Abstract:
A technique for handling undesired data over a limited bandwidth channel. Specifically, one embodiment in accordance with the present invention operates within an electronic system or device (e.g., personal digital assistant) which can be coupled to a networking environment. An embodiment of the present invention allows higher levels of software operating within an electronic system to directly communicate with and determine the current operation of lower levels of software. As such, a higher level of software is advantageously able to perform appropriate actions in response to activities being performed by a lower level of software. For example, the higher level of software is able to suspend its time-out of a delayed response to a data request after determining that the reason for the delay is due to the fact that there is a “log jam” caused by canceled data packets being processed by a transport layer while a UDP layer is currently discarding canceled data packets associated with a canceled data request. Therefore, one embodiment of the present invention enables electronic devices to operate more efficiently.