Voice and data continuity between wireless devices
First Claim
1. A method of maintaining call continuity at a first wireless device, the method comprising:
- at the first wireless device;
establishing a radio resource control (RRC) connection to a base station of a wireless wide area network (WWAN);
receiving, from the base station, first data encrypted based on a Cipher Key (CK), wherein a portion of the first data is generated by a remote device;
establishing a local connection to a second wireless device;
sending a signaling message comprising key data to the second wireless device, wherein the key data is based on the CK; and
receiving, from the second wireless device, second data encrypted based on the CK via the local connection.
1 Assignment
0 Petitions
Accused Products
Abstract
An accessory wireless device partakes in a data session with a remote device. The data session may be a voice call or other service. To preserve the battery power of the accessory wireless device, the accessory wireless device opportunistically offloads medium-to-long range radio transmission and reception tasks to the companion wireless device while maintaining call continuity. The accessory wireless device and the companion wireless device communicate through a local connection. In one embodiment, the accessory wireless device pushes a wireless wide area network (WWAN) connection to the companion device by sharing selected security and network information with the companion wireless device. When the accessory device and/or the companion device determine that the local connection may not be sustainable, the accessory device pulls the WWAN connection of the companion device back to itself.
-
Citations
20 Claims
-
1. A method of maintaining call continuity at a first wireless device, the method comprising:
at the first wireless device; establishing a radio resource control (RRC) connection to a base station of a wireless wide area network (WWAN); receiving, from the base station, first data encrypted based on a Cipher Key (CK), wherein a portion of the first data is generated by a remote device; establishing a local connection to a second wireless device; sending a signaling message comprising key data to the second wireless device, wherein the key data is based on the CK; and receiving, from the second wireless device, second data encrypted based on the CK via the local connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A wireless device comprising:
-
a memory; one or more processors; and a secure element, wherein the memory includes instructions that when executed by a processor of the one or more processors, cause the wireless device to perform operations comprising; establishing a radio resource control (RRC) connection to a base station of a wireless wide area network (WWAN); receiving, from the base station, first data encrypted based on a Cipher Key (CK), wherein a portion of the first data is generated by a remote device; establishing a local connection to a second wireless device; sending a signaling message comprising key data to the second wireless device, wherein the key data is based on the CK; and receiving, from the second wireless device, second data encrypted based on the CK via the local connection. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium comprising instructions that when executed by a processor of a wireless device, cause the wireless device to perform operations comprising:
-
establishing a radio resource control (RRC) connection to a base station of a wireless wide area network (WWAN); receiving, from the base station, first data encrypted based on a Cipher Key (CK), wherein a portion of the first data is generated by a remote device; establishing a local connection to a second wireless device; sending a signaling message comprising key data to the second wireless device, wherein the key data is based on the CK; and receiving, from the second wireless device, second data encrypted based on the CK via the local connection. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification