Abstract:
A method of maintaining communications between a mobile, wireless terminal and a base station of a wireless local area network is performed by determining at the base station, that communications between the base station and the terminal over a first channel on the wireless local area network has been impeded; and placing a telephone call to the terminal over a separate, distinct, second channel on a public switched telephone network. The caller ID of the incoming call is then used to verify the authenticity of the base station. Further communications continue over the second channel on the telephone network.
Abstract:
Described is a system and method for determining determining a present state of charge of a battery and determining a rate of change of the state of charge of the battery, the rate of change being determined based on a charge current being supplied to the battery. Then, an updated state of charge is determined based on the rate of change.
Abstract:
Techniques are provided for frequency coordination among two different wireless network protocols, such as the IEEE 802.11 and Bluetooth protocols, operating in proximity with one another. Coordination is accomplished by the use of a first radio transceiver operating in accordance with a first communication protocol (which may be the 802.11 protocol) and using a frequency band (which may be the 2.4 GHz band), a base station connected to a wired network and operating in accordance with the first communication protocol, a second radio transceiver operating in accordance with a second communication protocol (which may be the Bluetooth protocol) and using the frequency band, and a coordinator associated with the base station for, in turn, activating the first radio transceiver, deactivating the first radio transceiver, activating the second radio transceiver, and deactivating the second radio transceiver.
Abstract:
A portable bar code reading terminal includes an ASIC having circuitry for both a laser scanner and an imager. The terminal also includes a data blender for distributing data from multiple sources to multiple destinations based on the type and/or content of the data. The ASIC further provides circuitry for at least one of the following functions: power management, wake up control and power down, critical suspend shutdown, warm and cold boot functions, serial ports, matrix keyboard scanning, analog converters, touch panel, modular memory IDE interface, imaging support, finger print reader, USB host, and a magnetic stripe interface.
Abstract:
A battery charging device includes (i) a first circuit receiving a pulse width modulated signal, (ii) a second circuit receiving the pulse width modulated signal, and (iii) a third circuit receiving the pulse width modulated signal. The first circuit generates a first input to set a maximum battery charge current produced by the battery charging device. The second circuit generates a second input to disable the battery charging device based on the pulse width modulated signal. The third circuit generates a third input to select a charging mode of the battery charging device.
Abstract:
Described is a system and method for authenticating a power source. The system comprises a battery including a first encryption engine storing a first key, and a battery charger including a microcontroller and a second encryption engine storing a second key. When the microcontroller detects a coupling of the battery to the charger, the microcontroller issues a challenge to the first encryption engine and the second encryption engine. The first encryption engine generates a first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates a second response as a function of the challenge, the second key and the predefined algorithm. The microcontroller compares the first and second responses to authenticate the battery.
Abstract:
Described is a system and method for authenticating a power source. The system comprises a battery including a first encryption engine storing a first key, and a battery charger including a microcontroller and a second encryption engine storing a second key. When the microcontroller detects a coupling of the battery to the charger, the microcontroller issues a challenge to the first encryption engine and the second encryption engine. The first encryption engine generates a first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates a second response as a function of the challenge, the second key and the predefined algorithm. The microcontroller compares the first and second responses to authenticate the battery.
Abstract:
Described is a system and method for charging a battery. The system includes a processor powered by a battery; and a controller determining a remaining battery charge of the battery. The controller sets a first charge current to recharge the battery when the remaining battery charge is insufficient to operate the processor. The controller wakes the processor when the battery has been recharged so that the remaining battery capacity is sufficient to operate the processor. The processor negotiates for a second charge current to recharge the battery. The controller sets the second charge current when the processor successfully negotiated.
Abstract:
Described is a system and method for authenticating a power source. The system comprises a battery including a first encryption engine storing a first key and a computing device including a microcontroller and a second encryption engine storing a second key. When the microcontroller detects a coupling of the battery to the computing device, the microcontroller issues a challenge to the first encryption engine and the second encryption engine. The first encryption engine generates the first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates the second response as a function of the challenge, the second key and the predefined algorithm. The microcontroller compares the first and second responses to authenticate the battery.
Abstract:
Described is a system and method for charging a battery. The system includes a processor powered by a battery; and a controller determining a remaining battery charge of the battery. The controller sets a first charge current to recharge the battery when the remaining battery charge is insufficient to operate the processor. The controller wakes the processor when the battery has been recharged so that the remaining battery capacity is sufficient to operate the processor. The processor negotiates for a second charge current to recharge the battery. The controller sets the second charge current when the processor successfully negotiated.