摘要:
A method of rejecting a Bluetooth communications request is disclosed. A portable device receives a Bluetooth communications request from a computing device. The communications request includes a device identification of the computing device. A list of trusted device identifications stored in a memory resource of the portable device is automatically accessed. The Bluetooth communications request is rejected in response to determining that the device identification is not in the list of trusted device identifications.
摘要:
A method and apparatus for bypassing Bluetooth discovery for devices in a special list. A first Bluetooth device identification (ID) may be stored on a second device. A friendly name may be associated with the stored device ID. The first Bluetooth device ID may be accessed on the second device. An associated friendly name may be displayed as a representation of the first Bluetooth device id. A user of the second device may select to initiate Bluetooth communications with the first device. If so chosen, a Bluetooth communication session may be established between the two devices in a manner that bypasses the Bluetooth discovery process for these devices. In this novel manner, Bluetooth communication sessions may be established with trusted devices. Further, the time and power required for a Bluetooth discovery process may be conserved. In addition, the user interface may be improved over a user interface requiring Bluetooth discovery.
摘要:
A method and a system for data transmission between a first electronic device and a second electronic device, wherein the second electronic device is in a sleep mode. Transmission of data between the first electronic device and the second electronic device occurs while a microprocessor in the second device is in sleep mode and the wireless transceiver is in a wake mode. The first electronic device transmits data signals and the second electronic device detects the transmitted signal. A base band processor in the second electronic device optionally determines if the signal is from a known source. If the first electronic device is a known electronic device, an interrupt signal is generated to wake up the microprocessor in the second electronic device. The wakened microprocessor opens a communication port and disables the wake-up interrupt. In yet another embodiment of the present invention, the data receive line is directly coupled to a line that triggers an interrupt when a signal is detected. The received message is then stored in memory for subsequent use.
摘要:
A method or system for providing a level of data security dependent on the location of the user of a wireless device is disclosed. One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The method is performed by determining the location of a network user node, selecting a single level of security from a group of more than two security levels based on the determined location, and modifying the security protection for the network user node based upon the selected level of security.
摘要:
A method and system for managing when a responder device (a device having a transceiver for wireless communication) is operating in a discoverable mode in a wireless network of devices, such as a Bluetooth network. In the discoverable mode, the responder device is set to scan for and respond to general inquiry messages broadcast from another device (e.g., an initiator device). When in the non-discoverable mode, the responder device will not respond to and/or scan for general inquiry messages broadcast from an initiator device. The responder device automatically enters the discoverable mode when the responder device enters into its awake mode. The responder device automatically enters the non-discoverable mode when the device enters into its sleep mode. Therefore, the responder device will be in discoverable mode for a reduced period of time, and as such will respond to fewer general inquiry messages. Accordingly, fewer messages will be exchanged between devices in the wireless network, simplifying the device discovery process for users and conserving the battery resources of the initiator and responder devices.
摘要:
A system and method for selecting a network access provider using a portable information device (PID) includes considering the user's pre-stated preferences. The pre-stated preferences may include, but are not limited to, reliability, security, signal strength, cost or appropriateness of service provider. The network access providers may be chosen from, but not limited to, a network access server at a corporate office or a cellular telephone. A score is calculated for each available network access provider and a connection is made based on the optimum provider that fits with the preferences of the user.
摘要:
A method and apparatus for collaborative chatting on a plurality of hand held computer systems are disclosed. A Bluetooth communication may be established among several hand held computer systems. A participants list may be cached from previous sessions, eliminating a typical step of discovery. Collaborative chatting software may be automatically initiated on the hand held systems in the group. Information entered by any member of the group may be displayed in substantially real time on all hand held computer systems. Information may be color coded to identify its source. In this novel manner, collaborative chatting on a plurality of hand held computer systems may occur, resulting in richer, more efficient and more secure communication between group members.
摘要:
A mobile computing device comprises a first microprocessor having a sleep mode and a wake mode and a second microprocessor configured for wireless communication. A communication port is configured to communicate data from the second processor to the first processor, wherein the second processor is configured to provide a wake signal to the first microprocessor and the first microprocessor is configured to open the communication port in response to the wake signal and to receive data from the second microprocessor through the communication port.
摘要:
A method and system thereof for establishing a wireless connection to a device while bypassing passkey exchange and authentication procedures. Passkeys are authenticated and exchanged with another device. At the user's discretion, the passkey for the other device can be stored in memory. In the case in which the passkey is stored, the other device is considered a “trusted device.” Subsequently, when a trusted device is discovered and selected, and a wireless connection to the trusted device is made, the passkey for the trusted device is automatically retrieved from memory. As such, it is not necessary for the user to manually input a passkey or for the devices to perform a passkey exchange and authentication procedure.
摘要:
A method of communicating between a handheld computer and other local area computing devices having wireless communication capability includes providing a handheld computer and identifying a plurality of other local area computing devices having wireless communication capability. The method further includes creating an identifier for one or more of the plurality of other local area computing devices and listing each identifier on a display. The list is sorted in order of at least one of distance and direction from the handheld computer.