Abstract:
Certain embodiments of the present disclosure relate to a method for increasing a capacity in a peer-to-peer (P2P) wireless network. A scheme has been proposed in which well-connected nodes of the P2P wireless network can be exploited in a manner that increases the overall connectivity of all the nodes in the network.
Abstract:
Devices and methods use a close range communication link, such as a near field communication (NFC) protocol link, to enable users to establish multiplayer gaming sessions conducted over a second communication link different from the close range link. Once two or more gaming devices are brought close enough together to establish a close range peer-to-peer communications link, the devices exchange gaming information that allows the devices to synchronize or otherwise initiate or join the game session. The devices may also exchange communication information useful for establishing the second communications link or for further game synchronization. Embodiments enable users to initiate or join multiplayer gaming sessions merely by bringing two or more game devices into close proximity.
Abstract:
Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a signature, a cryptographic key, and so on) is initially retrieved from a non-writable area of an external memory device (e.g., an one-time programmable (OTP) area of a NAND Flash device). A first program (e.g., a boot program) is retrieved from a writable or main area of the external memory device and authenticated based on the secure data. The first program is enabled for execution if authenticated. A second program may be retrieved from the main area of the external memory device and authenticated based on the secure data. The second program is enabled for execution if authenticated. Additional programs may be retrieved and authenticated. Each program may be authenticated using a secure hash function, a digital signature, and/or some other cryptographic technique.