TECHNIQUES FOR AUTHENTICATING A DEVICE FOR WIRELESS DOCKING

Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authent...

Full description

Saved in:
Bibliographic Details
Main Authors LEVY, ELAD, GLIK, MICHAEL, KAHANA, YARON, PENTELKA, PAZ
Format Patent
LanguageEnglish
French
German
Published 20.01.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authentication process may be implemented. The first device may then wirelessly dock to the second device based on a successful authentication. Other examples are described and claimed.
Bibliography:Application Number: EP20140780011