Patent application number | Description | Published |
20080279264 | High speed data bus for communicating between wireless interface devices of a host device - A circuit includes a first wireless interface circuit that communicates packetized data to a first external device in accordance with a first wireless communication protocol. A second wireless interface circuit communicates packetized data to a second external device in accordance with a second wireless communication protocol. A plurality of signal lines communicate at least four lines of cooperation data between the first wireless interface circuit and the second wireless interface circuit, wherein the cooperation data relates to cooperate transceiving in a common frequency spectrum. | 11-13-2008 |
20090016318 | SYNCHRONIZED UWB PICONETS FOR SOP (SIMULTANEOUSLY OPERATING PICONET) PERFORMANCE - Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance. A common backbone (either wired or wireless) is employed that provides a common CLK (clock signal) to all of the various PNCs (piconet coordinators) of various piconets that may operate within a sufficiently close region such that interference could undesirably occur. By providing a very reliable CLK signal from a common backbone to all of the PNCs of the various piconets operating within a substantially close proximity to one another, very precise synchronization may be ensured for all of the communications performed therein. The various piconets may then even operate using TDMA (Time Division Multiple Access)—whose performance would be substantially compromised without effective synchronization. In addition, combined TFC (time frequency code) and TDMA may also be employed to support the communications therein thereby providing even another degree of orthogonality that provided by TDMA alone. | 01-15-2009 |
20100088516 | Systems and Methods For Providing Security to Different Functions - Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function. | 04-08-2010 |
20100290451 | Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance - Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance. A common backbone (either wired or wireless) is employed that provides a common CLK (clock signal) to all of the various PNCs (piconet coordinators) of various piconets that may operate within a sufficiently close region such that interference could undesirably occur. By providing a very reliable CLK signal from a common backbone to all of the PNCs of the various piconets operating within a substantially close proximity to one another, very precise synchronization may be ensured for all of the communications performed therein. The various piconets may then even operate using TDMA (Time Division Multiple Access)—whose performance would be substantially compromised without effective synchronization. In addition, combined TFC (time frequency code) and TDMA may also be employed to support the communications therein thereby providing even another degree of orthogonality that provided by TDMA alone. | 11-18-2010 |
20110271111 | Systems and Methods For Providing Security to Different Functions - Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function. | 11-03-2011 |
20120021723 | System and Method for Protecting Data in a Synchronized Environment - A system includes a mobile device providing a plurality of applications and an agent providing first and second authentication procedures for authenticating a user of the mobile device to first and second applications running on the mobile device. A first application is enabled by authenticating a user through a first authentication procedure, and a second application is enabled by authenticating a user through a second authentication procedure. The agent authenticates the user to the first application following the first authentication procedure, and the agent authenticates the user to the second application following the second authentication procedure. | 01-26-2012 |
20120106457 | COOPERATIVE TRANSCEIVING BETWEEN WIRELESS INTERFACE DEVICES OF A HOST DEVICE - A method and/or apparatus for cooperative transceiving between wireless interface devices of a host device includes processing that begins by providing an indication of receiving an inbound packet from one wireless interface device (e.g., Bluetooth compliant radio transceiver, IEEE 802.11 compliant radio transceiver, etc.) to another. The wireless interlace device receiving the indication processes the indication and, based on the processing, transmits an outbound packet in accordance with the processing of the indication. For example, the wireless interface device receiving the indication may delay transmission until the other wireless interface device has received the packet, or, if transmission of the packet would not interfere with the receiving of the packet by the other wireless interface device, the wireless interface device receiving the indication would transmit its packet. | 05-03-2012 |
20120218980 | Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance - Synchronized UWB piconets for SOP (Simultaneously Operating Piconet) performance. A common backbone (either wired or wireless) is employed that provides a common CLK (clock signal) to all of the various PNCs (piconet coordinators) of various piconets that may operate within a sufficiently close region such that interference could undesirably occur. By providing a very reliable CLK signal from a common backbone to all of the PNCs of the various piconets operating within a substantially close proximity to one another, very precise synchronization may be ensured for all of the communications performed therein. The various piconets may then even operate using TDMA (Time Division Multiple Access)—whose performance would be substantially compromised without effective synchronization. In addition, combined TFC (time frequency code) and TDMA may also be employed to support the communications therein thereby providing even another degree of orthogonality that provided by TDMA alone. | 08-30-2012 |
20120257609 | MULTI-MODE WLAN/PAN MAC - Multi-mode WLAN/PAN MAC. A novel solution is presented in which a MAC (Medium Access Controller) is implemented that includes multiple functionality types. This MAC may include functionality supporting communication according to one or more of the IEEE 802.11 WLAN (Wireless Local Area Network) related standards and also to one or more of the standards generated by the IEEE 802.15.3 PAN (Personal Area Network) working group. By providing this dual functionality of a multi-mode WLAN/PAN MAC, a communication device may adaptively change the manner in which it communicates with other communication devices. For example, in an effort to maximize throughput and overall efficiency of communication within a communication system, certain of the various devices may change from using the WLAN related standards to using the PAN related standards, and vice versa, based on any one or more of a variety of operational parameters including system configuration. | 10-11-2012 |
20120269107 | LOW POWER PROTOCOL FOR WIRELESS TERMINAL PEER-TO-PEER COMMUNICATIONS - A Wireless Local Area Network (WLAN) system based upon peer-to-peer communications. A wireless terminal for peer-to-peer communications acts either as a WLAN master or as a WLAN slave. When the wireless terminal acts a master, the wireless terminal undertakes mastering duties that include transmitting a beacon interval in the frame cycle. When the wireless terminal is not tethered to a power source, mastering duties alternate according to a round-robin WLAN mastering cycle, wherein the wireless terminal acts the WLAN master during at least one frame cycle and acts the WLAN slave during other frame cycles to conserve an untethered power source of the wireless terminal. | 10-25-2012 |
20120289198 | Authentication in a Roaming Environment - One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station), a second base station (e.g., a second base station controller and/or a second transceiver station), a mobile client, and a server coupled to the mobile client via either the first base station controller or the second base station. The first base station is coupled to an authentication center that authenticates an intended user so that the user can communicate a message between the mobile client and the server via the first base station. A credential (or status) of the authentication made at the authentication center is then transmitted from the first base station to the second base station when the mobile client moves to utilize the second base station to communicate with the server. | 11-15-2012 |
20130077782 | Method and Apparatus for Security Over Multiple Interfaces - A secure digital system including a number of ICs that exchange data among each other. Each of the ICs includes a key generator for generating a cipher key; a memory for securely storing the generated cipher key; an authenticating module for authenticating neighboring ICs of a respective IC; an encryption module for encrypting data communicated from the respective IC to the neighboring ICs; and a decryption module for decrypting data received from the neighboring ICs. | 03-28-2013 |
20130254543 | Systems And Methods For Providing Security To Different Functions - Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function. | 09-26-2013 |
20130286914 | LOW POWER PROTOCOL FOR WIRELESS TERMINAL PEER-TO-PEER COMMUNICATIONS - A Wireless Local Area Network (WLAN) system based upon peer-to-peer communications. A wireless terminal for peer-to-peer communications acts either as a WLAN master or as a WLAN slave. When the wireless terminal acts a master, the wireless terminal undertakes mastering duties that include transmitting a beacon interval in the frame cycle. When the wireless terminal is not tethered to a power source, mastering duties alternate according to a round-robin WLAN mastering cycle, wherein the wireless terminal acts the WLAN master during at least one frame cycle and acts the WLAN slave during other frame cycles to conserve an untethered power source of the wireless terminal. | 10-31-2013 |
20130314954 | POWER SUPPLY INPUT ROUTING - One embodiment of a power supply input routing apparatus can include a multilayer printed circuit board configured to accept only an alternating current (AC) line voltage, return and ground signals. The AC power jumper board can advantageously route AC power from one section of the power supply to another without burdening the power supply design with extra layer requirements or negatively increasing power supply area. Embodiments including an electronic device having a power supply as above are also disclosed. | 11-28-2013 |
20140050322 | AUTHENTICATION IN A ROAMING ENVIRONMENT - One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station), a second base station a second base station controller and/or a second transceiver station), a mobile client, and a server coupled to the mobile client via either the first base station controller or the second base station. The first base station is coupled to an authentication center that authenticates an intended user so that the user can communicate a message between the mobile client and the server via the first base station. A credential (or status) of the authentication made at the authentication center is then transmitted from the first base station to the second base station when the mobile client moves to utilize the second base station to communicate with the server. | 02-20-2014 |
20140106714 | Systems And Methods For Providing Security To Different Functions - Methods and systems provide secure functions for a mobile client. A circuit may include a memory configured to store a server access key and a first function authentication key. The circuit may also include authentication circuitry configured to access the server access key to authenticate access to a server to download a function capsule comprising a first function and to access the first function authentication key to authenticate use of the first function of the function capsule. | 04-17-2014 |