Techniques for Authenticating a Device for Wireless Docking

Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authent...

Full description

Saved in:
Bibliographic Details
Main Authors GLIK MICHAEL, LEVY ELAD, KAHANA YARON, PENTELKA PAZ
Format Patent
LanguageEnglish
Published 11.09.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authentication process may be implemented. The first device may then wirelessly dock to the second device based on a successful authentication. Other examples are described and claimed.
Bibliography:Application Number: US201313794656