Techniques for Authenticating a Device for Wireless Docking
Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authent...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
11.09.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authentication process may be implemented. The first device may then wirelessly dock to the second device based on a successful authentication. Other examples are described and claimed. |
---|---|
Bibliography: | Application Number: US201313794656 |