METHOD AND SYSTEM FOR REDUCING BURDEN ON A BLUETOOTH LOW POWER END-POINT DEVICE
First Claim
1. A method for communication, the method comprising:
- acquiring, by a host wireless device, link security information from a trusted wireless device of said host wireless device, wherein said link security information is associated with a link between said trusted wireless device and a wireless end-point device;
establishing a link with said wireless end-point device using said acquired link security information and an assumed identity of said trusted wireless device; and
relaying content between said wireless end-point device and said trusted wireless device via said established link connection using said assumed identity of said trusted wireless device.
7 Assignments
0 Petitions
Accused Products
Abstract
A relay host wireless device is paired with a target host wireless device over a secure link. The relay host wireless device is operable to acquire link security information, which is associated with a link between the target host wireless device and a wireless end-point device, from the target host wireless device. The relay host wireless device is enabled to establish a link with the target host wireless device by faking its identity as an assumed identity of the target host wireless device. The acquired link security information is applied to the established link. The relay host wireless device is enabled to relay content between the target host wireless device and the wireless end-point device via the established fake link using said assumed identity of the target host wireless device and the secure link between the relay host wireless device and the target host wireless device, successively.
109 Citations
20 Claims
-
1. A method for communication, the method comprising:
-
acquiring, by a host wireless device, link security information from a trusted wireless device of said host wireless device, wherein said link security information is associated with a link between said trusted wireless device and a wireless end-point device; establishing a link with said wireless end-point device using said acquired link security information and an assumed identity of said trusted wireless device; and relaying content between said wireless end-point device and said trusted wireless device via said established link connection using said assumed identity of said trusted wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for communication, the system comprising:
-
one or more processors for use in a host wireless device, wherein said one or more processors is operable to acquire link security information from a trusted wireless device of said host wireless device, and said link security information is associated with a link between said trusted wireless device and a wireless end-point device; said one or more processors is operable to establish a fake link with said wireless end-point device using said acquired link security information and an assumed identity of said trusted wireless device; and said one or more processors is operable to relay content between said wireless end-point device and said trusted wireless device using said established link using said assumed identity of said trusted wireless device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification