Systems and methods for secure high-speed link maintenance via nfc

ABSTRACT

Systems, methods, and devices for communicating with a second apparatus in a wireless communications network are described herein. In some aspects, a first wireless communication unit is configured to communicate with the second apparatus via a first wireless protocol. The first wireless communication unit may transmit a first message to the second apparatus. A second wireless communication unit is configured to communicate with the second apparatus over a communication link via a second wireless protocol. The second wireless communication unit may be further configured to disconnect the communication link if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.

BACKGROUND

1. Field

The present application relates generally to wireless communications,and more specifically to systems, methods, and devices for maintaining alink using near field communications.

2. Background

In many telecommunication systems, communications networks are used toexchange messages among several interacting spatially-separated devices.Networks may be classified according to geographic scope, which couldbe, for example, a metropolitan area, a local area, or a personal area.Such networks would be designated respectively as a wide area network(WAN), metropolitan area network (MAN), local area network (LAN),wireless local area network (WLAN), or personal area network (PAN).Networks also differ according to the switching/routing technique usedto interconnect the various network nodes and devices (e.g. circuitswitching vs. packet switching), the type of physical media employed fortransmission (e.g. wired vs. wireless), and the set of communicationprotocols used (e.g. Internet protocol suite, SONET (Synchronous OpticalNetworking), Ethernet, etc.).

Wireless networks are often preferred when the network elements aremobile and thus have dynamic connectivity needs, or if the networkarchitecture is formed in an ad hoc, rather than fixed, topology.Wireless networks employ intangible physical media in an unguidedpropagation mode using electromagnetic waves in the radio, microwave,infra-red, optical, etc. frequency bands. Wireless networksadvantageously facilitate user mobility and rapid field deployment whencompared to fixed wired networks.

Wireless networks may include security protocols to protect data that istransferred wirelessly over the networks. Such security protocolsinclude wired equivalent privacy (WEP), Wi-Fi Protected Access (WPA),Advanced Encryption Standard (AES), a Pairwise Master Key (PMK), and thelike. In addition, wired networks may include security protocols toprotect data that is transferred, such as hypertext transfer protocolsecure (HTTPS), firewalls, and the like. However, these securityprotocols may be compromised if a person has access to the right toolsor equipment. In some situations, a higher level of security may bedesired when communicating via wired or wireless networks.

SUMMARY

The systems, methods, and devices of the invention each have severalaspects, no single one of which is solely responsible for its desirableattributes. Without limiting the scope of this invention as expressed bythe claims which follow, some features will now be discussed briefly.After considering this discussion, and particularly after reading thesection entitled “Detailed Description” one will understand how thefeatures of this invention provide advantages that include improvedcommunications between access points and stations in a wireless network.

One aspect of this disclosure provides a system comprising one or moreapparatuses that communicate with a second apparatus. The systemcomprises a first wireless communication unit configured to communicatewith the second apparatus via a first wireless protocol. The firstwireless communication unit may transmit a first message to the secondapparatus. The system further comprises a second wireless communicationunit configured to communicate with the second apparatus over acommunication link via a second wireless protocol. The second wirelesscommunication unit may be further configured to disconnect thecommunication link if the first wireless communication unit does notreceive a second message from the second apparatus within apredetermined amount of time after transmission of the first message.

Another aspect of this disclosure provides a method of communicatingwith a second apparatus. The method comprises communicating, by a firstwireless communication unit, with the second apparatus via a firstwireless protocol. The first wireless communication unit may transmit afirst message to the second apparatus. The method further comprisescommunicating, by a second wireless communication unit, with the secondapparatus over a communication link via a second wireless protocol. Themethod further comprises disconnecting, by the second wirelesscommunication unit, the communication link if the first wirelesscommunication unit does not receive a second message from the secondapparatus within a predetermined amount of time after transmission ofthe first message.

Another aspect of this disclosure provides an apparatus forcommunicating with a second apparatus. The apparatus comprises firstmeans for communicating with the second apparatus via a first wirelessprotocol. The first means for communicating may transmit a first messageto the second apparatus. The apparatus further comprises second meansfor communicating with the second apparatus over a communication linkvia a second wireless protocol. The apparatus further comprises meansfor disconnecting the communication link if the first means forcommunicating does not receive a second message from the secondapparatus within a predetermined amount of time after transmission ofthe first message.

Another aspect of this disclosure provides a non-transitorycomputer-readable medium comprising code that, when executed, causes anapparatus to communicate, using a first wireless communication unit,with a second apparatus via a first wireless protocol. The firstwireless communication unit may transmit a first message to the secondapparatus. The medium further comprises code that, when executed, causesan apparatus to communicate, using a second wireless communication unit,with the second apparatus over a communication link via a secondwireless protocol. The medium further comprises code that, whenexecuted, causes an apparatus to disconnect, using the second wirelesscommunication unit, the communication link if the first wirelesscommunication unit does not receive a second message from the secondapparatus within a predetermined amount of time after transmission ofthe first message.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an exemplary wireless communication system in which aspectsof the present disclosure may be employed.

FIG. 2 shows a functional block diagram of an exemplary wireless devicethat may be employed within the wireless communication system of FIG. 1.

FIG. 3 illustrates a wireless communication system in which a stationcommunicates via a short-range communication protocol and a long-rangecommunication protocol.

FIG. 4 illustrates another wireless communication system in which astation communicates via a short-range communication protocol and along-range communication protocol.

FIG. 5 illustrates a decision diagram for maintaining a secureconnection between a station and an access point.

FIG. 6 illustrates another decision diagram for maintaining a secureconnection between a station and an access point.

FIG. 7 is a flowchart of a process for communicating with a station inthe wireless communication systems of FIGS. 1, 3, and/or 4.

FIG. 8 is a functional block diagram of an exemplary device that may beemployed within the wireless communication systems FIGS. 1, 3, and/or 4.

DETAILED DESCRIPTION

Various aspects of the novel systems, apparatuses, and methods aredescribed more fully hereinafter with reference to the accompanyingdrawings. This disclosure may, however, be embodied in many differentforms and should not be construed as limited to any specific structureor function presented throughout this disclosure. Rather, these aspectsare provided so that this disclosure will be thorough and complete, andwill fully convey the scope of the disclosure to those skilled in theart. Based on the teachings herein one skilled in the art shouldappreciate that the scope of the disclosure is intended to cover anyaspect of the novel systems, apparatuses, and methods disclosed herein,whether implemented independently of, or combined with, any other aspectof the invention. For example, an apparatus may be implemented or amethod may be practiced using any number of the aspects set forthherein. In addition, the scope of the invention is intended to coversuch an apparatus or method which is practiced using other structure,functionality, or structure and functionality in addition to or otherthan the various aspects of the invention set forth herein. It should beunderstood that any aspect disclosed herein may be embodied by one ormore elements of a claim.

Although particular aspects are described herein, many variations andpermutations of these aspects fall within the scope of the disclosure.Although some benefits and advantages of the preferred aspects arementioned, the scope of the disclosure is not intended to be limited toparticular benefits, uses, or objectives. Rather, aspects of thedisclosure are intended to be broadly applicable to different wirelesstechnologies, system configurations, networks, and transmissionprotocols, some of which are illustrated by way of example in thefigures and in the following description of the preferred aspects. Thedetailed description and drawings are merely illustrative of thedisclosure rather than limiting, the scope of the disclosure beingdefined by the appended claims and equivalents thereof.

Popular wired and wireless network technologies may include varioustypes of short-range communications (e.g., near-field communication(NFC), radio-frequency identification (RFID), radio frequency (RF),etc.) and long-range communications. The short-range communications maybe characterized by communications between devices that are 0-4 cmapart. Long-range communications may include any local wireless areanetwork (WLAN) protocol (e.g., any IEEE 802.11 protocol, Bluetooth,etc.), any wireless wide area network (WWAN) protocol (e.g., LTE, CDMA,WiMAX, GSM, etc.), any wired network protocol (e.g., IEEE 1394,Ethernet, universal serial bus (USB), etc.), and the like. Inparticular, a WLAN may be used to interconnect nearby devices together,employing widely used networking protocols. A WWAN may be used tointerconnect devices separated by a distance, employing widely usednetworking protocols. The various aspects described herein may apply toany communication standard, such as a wireless protocol or a wiredprotocol.

In some aspects, wireless signals may be transmitted according to ashort-range communication protocol or a long-range communicationprotocol using orthogonal frequency-division multiplexing (OFDM),direct-sequence spread spectrum (DSSS) communications, a combination ofOFDM and DSSS communications, or other schemes. Wired signals may betransmitted according to a short-range communication protocol or along-range communication protocol using similar data transmission and/orcompression techniques. Implementations of such a protocol may be usedfor secure communications, mobile banking, mobile telephony, paymenttransactions, network access, and the like. Advantageously, aspects ofcertain devices implementing any of the above-mentioned protocols mayconsume less power than devices implementing other wired or wirelessprotocols, and/or may be used to transmit wired or wireless signalsacross a relatively long range, for example about one kilometer orlonger.

In some implementations, a short-range communication network and/or along-range communication network includes various devices which are thecomponents that access the wired or wireless network. For example, theremay be two types of devices: access points (“APs”) and clients (alsoreferred to as stations, or “STAs”). In general, an AP may serve as ahub or base station for the communication network and an STA serves as auser of the communication network. For example, an STA may be a laptopcomputer, a personal digital assistant (PDA), a mobile phone, etc. In anexample, an STA connects to an AP via a WiFi (e.g., an IEEE 802.11protocol) compliant wireless link or a mobile carrier compliant wirelesslink (e.g., LTE, CDMA, WiMAX, GSM, etc.) to obtain general connectivityto the Internet or to other wide area networks. In some implementationsan STA may also be used as an AP.

An access point (“AP”) may also comprise, be implemented as, or known asa NodeB, Radio Network Controller (“RNC”), eNodeB, Base StationController (“BSC”), Base Transceiver Station (“BTS”), Base Station(“BS”), Transceiver Function (“TF”), Radio Router, Radio Transceiver, orsome other terminology. An AP may further comprise a femto cell, a celltower, a wired or wireless gateway, a mobile prepaid card, an RFIDreader/writer, a portable electronic device, a computer, a dockingstation, a charging station, an automated teller machine (ATM), or thelike.

A station “STA” may also comprise, be implemented as, or known as anaccess terminal (“AT”), a subscriber station, a subscriber unit, amobile station, a remote station, a remote terminal, a user terminal, auser agent, a user device, user equipment, or some other terminology. Insome implementations an access terminal may comprise a cellulartelephone, a cordless telephone, a Session Initiation Protocol (“SIP”)phone, a wireless local loop (“WLL”) station, a personal digitalassistant (“PDA”), a handheld device having wireless connectioncapability, or some other suitable processing device connected to awireless modem. Accordingly, one or more aspects taught herein may beincorporated into a phone (e.g., a cellular phone or smartphone), acomputer (e.g., a laptop), a portable communication device, a headset, aportable computing device (e.g., a personal data assistant), anentertainment device (e.g., a music or video device, or a satelliteradio), a gaming device or system, a global positioning system device,or any other suitable device that is configured to communicate via awireless medium.

As discussed above, certain of the devices described herein mayimplement the a short-range and/or long-range communication protocol.Such devices, whether used as an STA or AP or other device, may be usedfor secure communications, mobile banking, mobile telephony, paymenttransactions, and/or network access. The devices may instead or inaddition be used in a healthcare context, for example for personalhealthcare. They may also be used for surveillance, to enableextended-range Internet connectivity (e.g. for use with hotspots), or toimplement machine-to-machine communications.

FIG. 1 shows an exemplary wireless communication system 100 in whichaspects of the present disclosure may be employed. The wirelesscommunication system 100 may operate pursuant to a wireless standard,for example the IEEE 802.11 standard. The wireless communication system100 may include an AP 104, which communicates with STAs 106.

A variety of processes and methods may be used for transmissions in thewireless communication system 100 between the AP 104 and the STAs 106.For example, signals may be sent and received between the AP 104 and theSTAs 106 in accordance with OFDM/OFDMA techniques. If this is the case,the wireless communication system 100 may be referred to as anOFDM/OFDMA system. Alternatively, signals may be sent and receivedbetween the AP 104 and the STAs 106 in accordance with CDMA techniques.If this is the case, the wireless communication system 100 may bereferred to as a CDMA system.

A communication link that facilitates transmission from the AP 104 toone or more of the STAs 106 may be referred to as a downlink (DL) 108,and a communication link that facilitates transmission from one or moreof the STAs 106 to the AP 104 may be referred to as an uplink (UL) 110.Alternatively, a downlink 108 may be referred to as a forward link or aforward channel, and an uplink 110 may be referred to as a reverse linkor a reverse channel.

The AP 104 may act as a base station and provide wireless communicationcoverage in a basic service area (BSA) 102. The AP 104 along with theSTAs 106 associated with the AP 104 and that use the AP 104 forcommunication may be referred to as a basic service set (BSS). It shouldbe noted that the wireless communication system 100 may not have acentral AP 104, but rather may function as a peer-to-peer networkbetween the STAs 106. Accordingly, the functions of the AP 104 describedherein may alternatively be performed by one or more of the STAs 106.

The AP 104 may transmit a beacon signal (or simply a “beacon”), via acommunication link such as the downlink 108, to other nodes STAs 106 ofthe system 100, which may help the other nodes STAs 106 to synchronizetheir timing with the AP 104, or which may provide other information orfunctionality. Such beacons may be transmitted periodically. In oneaspect, the period between successive transmissions may be referred toas a superframe. Transmission of a beacon may be divided into a numberof groups or intervals. In one aspect, the beacon may include, but isnot limited to, such information as timestamp information to set acommon clock, a peer-to-peer network identifier, a device identifier,capability information, a superframe duration, transmission directioninformation, reception direction information, a neighbor list, and/or anextended neighbor list, some of which are described in additional detailbelow. Thus, a beacon may include information both common (e.g. shared)amongst several devices, and information specific to a given device.

In some aspects, a STA 106 may be required to associate with the AP 104in order to send communications to and/or receive communications fromthe AP 104. In one aspect, information for associating is included in abeacon broadcast by the AP 104. To receive such a beacon, the STA 106may, for example, perform a broad coverage search over a coverageregion. A search may also be performed by the STA 106 by sweeping acoverage region in a lighthouse fashion, for example. After receivingthe information for associating, the STA 106 may transmit a referencesignal, such as an association probe or request, to the AP 104. In someaspects, the AP 104 may use backhaul services, for example, tocommunicate with a larger network, such as the Internet or a publicswitched telephone network (PSTN).

FIG. 2 shows an exemplary functional block diagram of a wireless device202 that may be employed within the wireless communication system 100 ofFIG. 1. The wireless device 202 is an example of a device that may beconfigured to implement the various methods described herein. Forexample, the wireless device 202 may comprise the AP 104 or one of theSTAs 106.

The wireless device 202 may include a processor 204 which controlsoperation of the wireless device 202. The processor 204 may also bereferred to as a central processing unit (CPU). Memory 206, which mayinclude both read-only memory (ROM) and random access memory (RAM), mayprovide instructions and data to the processor 204. A portion of thememory 206 may also include non-volatile random access memory (NVRAM).The processor 204 typically performs logical and arithmetic operationsbased on program instructions stored within the memory 206. Theinstructions in the memory 206 may be executable to implement themethods described herein.

The processor 204 may comprise or be a component of a processing systemimplemented with one or more processors. The one or more processors maybe implemented with any combination of general-purpose microprocessors,microcontrollers, digital signal processors (DSPs), field programmablegate array (FPGAs), programmable logic devices (PLDs), controllers,state machines, gated logic, discrete hardware components, dedicatedhardware finite state machines, or any other suitable entities that canperform calculations or other manipulations of information.

The processing system may also include machine-readable media forstoring software. Software shall be construed broadly to mean any typeof instructions, whether referred to as software, firmware, middleware,microcode, hardware description language, or otherwise. Instructions mayinclude code (e.g., in source code format, binary code format,executable code format, or any other suitable format of code). Theinstructions, when executed by the one or more processors, cause theprocessing system to perform the various functions described herein.

The wireless device 202 may also include a housing 208 that may includea transmitter 210 and/or a receiver 212 to allow transmission andreception of data between the wireless device 202 and a remote location.The transmitter 210 and receiver 212 may be combined into a transceiver214. An antenna 216 may be attached to the housing 208 and electricallycoupled to the transceiver 214. The wireless device 202 may also include(not shown) multiple transmitters, multiple receivers, multipletransceivers, and/or multiple antennas. For example, the wireless device202 may include a transceiver and/or antenna for short-rangecommunications and a transceiver and/or antenna for long-rangecommunications.

The wireless device 202 may also include a signal detector 218 that maybe used in an effort to detect and quantify the level of signalsreceived by the transceiver 214. The signal detector 218 may detect suchsignals as total energy, energy per subcarrier per symbol, powerspectral density and other signals. The wireless device 202 may alsoinclude a digital signal processor (DSP) 220 for use in processingsignals. The DSP 220 may be configured to generate a packet fortransmission. In some aspects, the packet may comprise a physical layerdata unit (PPDU).

The wireless device 202 may further comprise a user interface 222 insome aspects. The user interface 222 may comprise a keypad, amicrophone, a speaker, and/or a display. The user interface 222 mayinclude any element or component that conveys information to a user ofthe wireless device 202 and/or receives input from the user.

The various components of the wireless device 202 may be coupledtogether by a bus system 226. The bus system 226 may include a data bus,for example, as well as a power bus, a control signal bus, and a statussignal bus in addition to the data bus. Those of skill in the art willappreciate the components of the wireless device 202 may be coupledtogether or accept or provide inputs to each other using some othermechanism.

Although a number of separate components are illustrated in FIG. 2,those of skill in the art will recognize that one or more of thecomponents may be combined or commonly implemented. For example, theprocessor 204 may be used to implement not only the functionalitydescribed above with respect to the processor 204, but also to implementthe functionality described above with respect to the signal detector218 and/or the DSP 220. Further, each of the components illustrated inFIG. 2 may be implemented using a plurality of separate elements.

The wireless device 202 may comprise an AP 104 or an STA 106 and may beused to transmit and/or receive communications. That is, either AP 104or STA 106 may serve as transmitter or receiver devices. Certain aspectscontemplate signal detector 218 being used by software running on memory206 and processor 204 to detect the presence of a transmitter orreceiver.

As described above, wireless networks may include security protocols toprotect data that is transferred wirelessly over the networks. Suchsecurity protocols include wired equivalent privacy (WEP), Wi-FiProtected Access (WPA), Advanced Encryption Standard (AES), a PairwiseMaster Key (PMK), and the like. In addition, wired networks may includesecurity protocols to protect data that is transferred, such ashypertext transfer protocol secure (HTTPS), firewalls, and the like.However, these security protocols may be compromised if a person hasaccess to the right tools or equipment. For example, tools or equipmentmay be used to determine an encryption key and discreetly decrypttransmitted data.

The possibility that security protocols may be compromised could beespecially troublesome for certain applications. For example, ifsecurity protocols are compromised while a user is engaged in mobilebanking, the user may suffer a financial loss. Thus, in some situations,a higher level of security may be desired when communicating via wiredor wireless networks.

In some embodiments, a higher level of network security may be achievedvia devices capable of communicating via a short-range communication anda long-range communication. For example, the short-range communicationmay provide data or otherwise allow a device to communicate via a securelink over the long-range communication. Such embodiments and variationsthereof are disclosed in greater detail below with respect to FIGS. 3-8.

FIG. 3 illustrates a wireless communication system 300 in which a STA306 communicates via a short-range communication protocol and along-range communication protocol. In an embodiment, the transceiver 214of the STA 306 may include a short-range communication transceiverconfigured to communicate with a short-range base station (e.g., AP304A) via a short-range communication protocol 312 and a long-rangecommunication transceiver configured to communicate with a long-rangebase station (e.g., AP 304A) via a long-range communication protocol314. The short-range communication transceiver may be coupled to aprocessor, such as processor 204, and/or the long-range communicationtransceiver. For example, the short-range communication transceiver maybe hardwired to the processor 204 and/or the long-range communicationtransceiver.

Generally, a short-range base station may include an access point, afemto cell, a cell tower, a mobile prepaid card, an RFID reader/writer,a portable electronic device, a computer, a docking station, a chargingstation, an automated teller machine (ATM), or the like. A long-rangebase station may include an access point, a femto cell, a cell tower, awired or wireless gateway, a portable electronic device, a computer, anATM, or the like. As illustrated in FIG. 3, the short-range base stationand the long-range base station are the same device, AP 304A. Thus, theAP 304A may perform the functions of the short-range base station andthe long-range base station. In other embodiments, as illustrated inFIG. 4 below, the short-range base station and the long-range basestation are separate devices.

As illustrated in FIG. 3, the short-range communication protocol 312 maybe an NFC protocol and the long-range communication protocol 314 may bea WiFi protocol (e.g., an IEEE 802.11 protocol). While specificcommunication protocols are provided in FIG. 3, this is merelyillustrative as one skilled in the art will recognize that thedisclosure provided herein applies to any communication protocol.

In some embodiments, the AP 304A may relay communications between theSTA 306 and another AP 304B. The communications may be relayed overcommunication link 316. Such communications may be relayed using anywired or wireless communication protocol.

In an embodiment, the STA 306 may authenticate with a long-rangecommunication network via the rules determined by the long-rangecommunication protocol 314 to establish a communication link between theSTA 306 and the AP 304A in its capacity as a long-range base station.For example, the STA 306 may perform handshaking with the long-rangecommunication network via the AP 304A, including providing theappropriate security information (e.g., a passphrase, a key, a token,etc.), to gain access to the long-range communication network. The STA306 may perform this authentication while located at position 308.

In another embodiment, the STA 306 may authenticate with a long-rangecommunication network via the short-range communication protocol 312 toestablish a communication link between the STA 306 and the AP 304A inits capacity as a long-range base station. For example, the STA 306 maybe configured to receive data from the AP 304A in its capacity as ashort-range base station via the short-range communication protocol 312.The data may include a code (e.g., a passphrase, a key, a token, etc.)recognized by devices, such as the AP 304A, that communicate via thelong-range communication protocol 314. The code may provide access tothe long-range communication network. As an example, the data mayinclude a security key that provides access to a WiFi network. The STA306 may then request, from the AP 304A in its capacity as the long-rangebase station, access to the long-range communication network using thecode received via the short-range communication protocol 312.

The short-range communication protocol 312 may be further used tomaintain or modify the communication link between the STA 306 and the AP304A over the long-range communication protocol 314. For example, the AP304A in its capacity as the short-range base station may periodicallytransmit a message to the STA 306. In an embodiment, each message mayinclude a new code. The long-range communication network may request orotherwise expect the STA 306 to transmit the new code (or a derivativeof the new code) via the long-range communication protocol 314 in orderto maintain the communication link. The long-range communication networkmay also expect the STA 306 to use the new code (or a derivative of thenew code) to modify the security (or encryption) parameters of thecommunication link in order to maintain the communication link. If theSTA 306 receives the new code via the short-range communication protocol312 and transmits the new code (or a derivative of the new code) back tothe AP 304A in its capacity as the long-range base station or anotherdevice in the long-range communication network (or if the STA 306 usesthe new code or a derivative of the new code to modify the security orencryption parameters of the communication link), then the communicationlink may be maintained. If the STA 306 does not receive the new code viathe short-range communication protocol 312 and/or does not transmit thenew code (or a derivative of the new code) back to the AP 304A in itscapacity as the long-range base station or another device in thelong-range communication network, then the communication link may beterminated.

The STA 306 may periodically transmit a message to the AP 304A in itscapacity as the short-range base station. In an embodiment, the messagemay include an indication that the STA 306 is still present and withinrange of the AP 304A. In another embodiment, the message may includepayment information used to maintain the communication link. If the AP304A in its capacity as the short-range base station receives themessage or periodically receives messages during a requested interval,then the communication link may be maintained. If the AP 304A in itscapacity as the short-range base station does not receive the message ordoes not periodically receive messages during a requested interval, thenthe communication link may be terminated.

In another embodiment, the message may include a request to acknowledgereceipt. If the STA 306 transmits an acknowledgement message to the AP304A in its capacity as the short-range base station that acknowledgesreceipt of the message transmitted by the AP 304A in its capacity as theshort-range base station, then the AP 304A may maintain thecommunication link or provide information to the STA 306 (e.g., a code)that would allow the STA 306 to maintain the communication link. If theSTA 306 does not acknowledge receipt of the message transmitted by theAP 304A in its capacity as the short-range base station, then the AP304A may disconnect the communication link or not provide information tothe STA 306 that would allow the device to maintain the communicationlink.

The STA 306 may not receive the new code and/or may not acknowledgereceipt of the message from the AP 304A in its capacity as theshort-range base station if the STA 306A is moved to a differentlocation. In an embodiment, the STA 306 is configured to communicatewith the AP 304A via the short-range communication protocol 312 whenlocated near or at position 308. The position 308 may be within acertain distance of the AP 304A (e.g., 1 cm). However, the AP 304A inits capacity as the short-range base station and/or the short-rangecommunication transceiver of the AP 304A may only be configured totransmit messages for a short distance (e.g., 0-4 cms). If the STA 306is moved from the position 308 to another location, such as position310, then the STA 306 may no longer be able to communicate with the AP304A via the short-range communication protocol 312. Thus, the STA 306would not receive the new code and/or would not acknowledge receipt ofthe message from the AP 304A in its capacity as the short-range basestation. As illustrated in FIG. 3, the communication link via thelong-range communication protocol 314 may then be terminated afterwaiting a predetermined period of time for the STA 306 to respond.

In an embodiment, the AP 304A may also verify the identity of the STA306. For example, the STA 306 may transmit identifying data to the AP304A in its capacity as the long-range base station in addition to acode in order to authenticate and/or maintain a communication link viathe long-range communication protocol 314. Thus, if the STA 306 is movedaway from the position 308 or any other location close to the AP 304Aand another STA takes the place of STA 306, the AP 304A may beconfigured to disconnect the communication link even though a new codemay be transmitted and/or receipt of the message transmitted by the AP304A in its capacity as the short-range base station may be acknowledgedby the other STA.

FIG. 4 illustrates another wireless communication system 400 in which aSTA 406 communicates via a short-range communication protocol and along-range communication protocol. In an embodiment, the transceiver 214of the STA 406 may include a short-range communication transceiverconfigured to communicate with a short-range base station (e.g., AP404A) via a short-range communication protocol 412 and a long-rangecommunication transceiver configured to communicate with a long-rangebase station (e.g., AP 404B) via a long-range communication protocol414. The short-range communication transceiver may be coupled to aprocessor, such as processor 204, and/or the long-range communicationtransceiver. For example, the short-range communication transceiver maybe hardwired to the processor 204 and/or the long-range communicationtransceiver.

As illustrated in FIG. 4, the short-range base station and thelong-range base station are separate devices, AP 404A and AP 404B. Theshort-range communication protocol 412 may be an NFC protocol and thelong-range communication protocol 414 may be LTE. While specificcommunication protocols are provided in FIG. 4, this is merelyillustrative as one skilled in the art will recognize that thedisclosure provided herein applies to any communication protocol.

In an embodiment, the STA 406 may authenticate with a long-rangecommunication network via the rules determined by the long-rangecommunication protocol 414 to establish a communication link between theSTA 406 and the AP 404B. For example, the STA 406 may performhandshaking with the long-range communication network via the AP 404B,including providing the appropriate security information (e.g., apassphrase, a key, a token, etc.), to gain access to the long-rangecommunication network. The STA 406 may perform this authentication whilelocated at position 408.

In another embodiment, the STA 406 may authenticate with a long-rangecommunication network via the short-range communication protocol 412 toestablish a communication link between the STA 406 and the AP 404B. Forexample, the STA 406 may be configured to receive data from the AP 404Avia the short-range communication protocol 412. The data may include acode (e.g., a passphrase, a key, a token, etc.) recognized by devices,such as the AP 404B, that communicate via the long-range communicationprotocol 414. The code may provide access to the long-rangecommunication network. As an example, the data may include a securitykey that provides access to an LTE network. The STA 406 may thenrequest, from the AP 404B, access to the long-range communicationnetwork using the code received via the short-range communicationprotocol 412.

As described above, the short-range communication protocol 412 may befurther used to maintain of modify the communication link between theSTA 406 and the AP 404B over the long-range communication protocol 414.For example, the AP 404A may periodically transmit a message to the STA406. In an embodiment, each message may include a new code. Thelong-range communication network may request or otherwise expect the STA406 to transmit the new code (or a derivative of the new code) via thelong-range communication protocol 414 in order to maintain thecommunication link. The long-range communication network may also expectthe STA 306 to use the new code (or a derivative of the new code) tomodify the security (or encryption) parameters of the communication linkin order to maintain the communication link. If the STA 406 receives thenew code via the short-range communication protocol 412 and transmitsthe new code (or a derivative of the new code) to the AP 404B or anotherdevice in the long-range communication network (or if the STA 306 usesthe new code or a derivative of the new code to modify the security orencryption parameters of the communication link), then the communicationlink may be maintained. If the STA 406 does not receive the new code viathe short-range communication protocol 412 and/or does not transmit thenew code (or a derivative of the new code) to the AP 404B or anotherdevice in the long-range communication network, then the communicationlink may be terminated.

The STA 406 may periodically transmit a message to the AP 404A. In anembodiment, the message may include an indication that the STA 406 isstill present and within range of the AP 404A. In another embodiment,the message may include payment information used to maintain thecommunication link. If the AP 404A receives the message or periodicallyreceives messages during a requested interval, then the communicationlink may be maintained. If the AP 404A does not receive the message ordoes not periodically receive messages during a requested interval, thenthe communication link may be terminated.

In another embodiment, the message may include a request to acknowledgereceipt. If the STA 406 transmits an acknowledgement message to the AP404A that acknowledges receipt of the message transmitted by the AP404A, then the AP 404A may inform the AP 404B via link 416 to maintainthe communication link or provide information to the STA 406 (e.g., acode) that would allow the STA 406 to maintain the communication link.If the STA 406 does not acknowledge receipt of the message transmittedby the AP 404A, then the AP 404A may inform the AP 404B via link 416 todisconnect the communication link or not provide information to the STA406 that would allow the STA 406 to maintain the communication link.

The STA 406 may not receive the new code and/or may not acknowledgereceipt of the message from the AP 404A if the STA 406 is moved from theposition 408 to a different location, such as position 410. In anembodiment, the STA 406 is configured to communicate with the AP 404Awhen located near or at position 408. The position 408 may be within acertain distance of the AP 404A (e.g., 1 cm). However, the AP 404Aand/or the short-range communication transceiver of the AP 404A may onlybe configured to transmit messages for a short distance (e.g., 0-4 cms).If the STA 406 is moved from the position 408 to another location, suchas position 410, then the STA 406 may no longer be able to communicatewith the AP 404A. Thus, the AP 406 would not receive the new code and/orwould not acknowledge receipt of the message from the AP 404A. Asillustrated in FIG. 4, the communication link via the long-rangecommunication protocol 414 may then be terminated after waiting apredetermined period of time for the STA 406 to respond.

In an embodiment, the AP 404A and/or the AP 404B may also verify theidentity of the STA 406. For example, the STA 406 may transmitidentifying data to the AP 404B in addition to a code in order toauthenticate and/or maintain a communication link via the long-rangecommunication protocol 414. Thus, if the STA 406 is moved away from theposition 408 or any location close to the AP 404A and another STA takesthe place of STA 406, then the AP 404B may be configured to disconnectthe communication link even though a new code may be transmitted and/orreceipt of the message transmitted by the AP 404A may be acknowledged bythe other STA.

Example Use Case

The STAs 306 and/or 406 and APs 304A, 404A, and/or 404B described hereinmay be implemented in a variety of applications. In an embodiment, a STAmay be a mobile phone and the short-range and long-range base stationsmay be an ATM. The mobile phone may be configured to communicate withthe ATM via NFC and WiFi. For example, when the mobile phone is placednear or on the ATM, the mobile phone may receive a code via NFC. Themobile phone may use the code to connect to the WiFi network operated bythe ATM. Once connected to the ATM WiFi network, a user may be able toconduct secure transactions with the ATM via the mobile phone (e.g., themobile phone may include an application that the user interacts with).As soon as the mobile phone is moved a certain distance away from theATM (e.g., from position 308 to position 310), the ATM may disconnectthe communication link between the mobile phone and the ATM over theWiFi network (e.g., the application may be disabled).

In another example, the STA may be a mobile phone, the short-range basestation may be an NFC hub (e.g., a port or device that is configured tocommunicate via NFC), and the long-range base station may be a WiFi AP.The mobile phone may be configured to communicate with the NFC hub viaNFC and with the WiFi AP via WiFi. For example, when the mobile phone isplaced near or on the NFC hub, the mobile phone may transmit paymentinformation to the NFC hub. The payment information may include datathat allows the NFC hub to charge the user of the mobile phone a fee.The mobile phone may periodically transmit this payment informationevery few seconds. In response to receiving the payment information, theNFC hub may provide a code to the mobile phone that allows the mobilephone to connect to the WiFi network. The code may be transmitted onceor a new code may be transmitted each time payment information isreceived. Alternatively, in response to receiving the paymentinformation, the NFC hub may inform the WiFi AP that the mobile phonehas supplied payment information. The WiFi AP may then allow the mobilephone to connect to its WiFi network as long as payment information istransmitted to the NFC hub (e.g., as long as the mobile phone is notmoved away from the NFC hub).

Flowcharts and Diagrams

FIG. 5 illustrates a decision diagram 500 for maintaining a secureconnection between a STA and an AP. In an embodiment, the decisiondiagram 500 may be executed by a processor, such as the processor 204,of a short-range base station (e.g., the APs 304A and/or 404A). Asillustrated in FIG. 5, the process for maintaining a secure connectionstarts at block 502.

At block 504, a message is sent to a device, such as the STA 306 or 406,via a first wireless protocol. In an embodiment, the first wirelessprotocol is a short-range communication protocol. At block 506, theshort-range base station determines whether a reply to the message wasreceived. If a reply is received, the diagram 500 proceeds to block 508.If a reply is not received, the diagram 500 proceeds to block 510.

At block 508, a communication link is established between the device anda long-range base station via a second wireless protocol. In anembodiment, the second wireless protocol is a long-range communicationprotocol. At block 510, a communication link is not established betweenthe device and the long-range base station via the second wirelessprotocol. After block 510, the diagram 500 proceeds back to block 504.

At block 512, a second message is sent to the device via the firstwireless protocol. At block 514, the short-range base station determineswhether a reply to the second message was received. If a reply isreceived, the diagram 500 proceeds to block 516. If a reply is notreceived, the diagram 500 proceeds to block 518.

At block 516, the communication link via the second wireless protocolbetween the device and the long-range base station is maintained. Afterblock 516, the diagram 500 proceeds back to block 512.

At block 518, the communication link via the second wireless protocolbetween the device and the long-range base station is disconnected. Inan embodiment, the short-range base station and/or the long-range basestation may disconnect the communication link. After block 518, thediagram 500 proceeds to block 520 and ends.

FIG. 6 illustrates another decision diagram 600 for maintaining a secureconnection between a STA and an AP. In an embodiment, the decisiondiagram 600 may be executed by a processor, such as the processor 204,of a short-range base station and/or a long-range base station (e.g.,the APs 304A, 404A, and/or 404B). As illustrated in FIG. 6, the processfor maintaining a secure connection starts at block 602.

At block 604, a code is sent to a device, such as the STA 306 or 406,via a first wireless protocol. In an embodiment, the first wirelessprotocol is a short-range communication protocol. At block 606, theshort-range and/or long-range base station determines whether the codeis received via a second wireless protocol. In an embodiment, the secondwireless protocol is a long-range communication protocol. If the code isreceived, the diagram 600 proceeds to block 608. If the code is notreceived, the diagram 600 proceeds to block 610.

At block 608, a communication link is established between the device andthe long-range base station via the second wireless protocol. At block610, a communication link is not established between the device and thelong-range base station via the second wireless protocol. After block610, the diagram 600 proceeds back to block 604.

At block 612, a new code is generated. At block 614, the new code issent to the device via the first wireless protocol. At block 616, theshort-range and/or long range base station determines whether the newcode is received via the second wireless protocol. If the new code isreceived, the diagram 600 proceeds to block 618. If the new code is notreceived, the diagram 600 proceeds to block 622.

At block 618, the communication link via the second wireless protocolbetween the device and the long-range base station is maintained and/orthe security (or encryption) of the communication link via the secondwireless protocol is modified based on the new code. In an embodiment,modifying the security (or encryption) of the communication link via thesecond wireless protocol each time a new code is received enhances thesecurity of the connection between the device and the long-range basestation. At block 620, the short-range base station waits apredetermined period of time. In an embodiment, the short-range basestation periodically generates new codes. The period of time maycorrespond to the duration of time that elapses between the generationof codes by the short-range base station. After block 620, the diagram600 proceeds back to block 612.

At block 622, the communication link via the second wireless protocolbetween the device and the long-range base station is disconnected. Inan embodiment, the short-range base station and/or the long-range basestation may disconnect the communication link. After block 622, thediagram 600 proceeds to block 624 and ends.

FIG. 7 is a flowchart of a process 700 for communicating with a STA inthe wireless communication systems of FIGS. 1, 3, and/or 4. At block702, a first wireless communication unit communicates with a secondapparatus via a first wireless protocol. In an embodiment, the firstwireless communication unit is a short-range base station. In a furtherembodiment, the second apparatus is a STA. In a further embodiment, thefirst wireless protocol is a short-range communication protocol. In afurther embodiment, a first message is transmitted via the firstwireless protocol.

At block 704, a second wireless communication unit communicates with thesecond apparatus over a communication link via a second wirelessprotocol. In an embodiment, the second wireless communication unit is along-range base station. In a further embodiment, the second wirelessprotocol is a long-range communication protocol.

At block 706, the communication link is disconnected by the secondwireless communication unit if the first wireless communication unitdoes not receive a second message from the second apparatus within apredetermined amount of time after transmission of the first message.After block 706, the process 700 ends.

FIG. 8 is a functional block diagram of an exemplary device 800 that maybe employed within the wireless communication systems 100, 300, and/or400. The device 800 includes first means 802 for communicating with thesecond apparatus via a first wireless protocol. In an embodiment, firstmeans 802 for communicating with the second apparatus via a firstwireless protocol may be configured to perform one or more of thefunctions discussed above with respect to block 702. The device 800further includes second means 804 for communicating with the secondapparatus over a communication link via a second wireless protocol. Inan embodiment, second means 804 for communicating with the secondapparatus over a communication link via a second wireless protocol maybe configured to perform one or more of the functions discussed abovewith respect to block 704. The device 800 further includes means 806 fordisconnecting the communication link if the first means forcommunicating does not receive a second message from the secondapparatus within a predetermined amount of time after transmission ofthe first message. In an embodiment, means 806 for disconnecting thecommunication link if the first means for communicating does not receivea second message from the second apparatus within a predetermined amountof time after transmission of the first message may be configured toperform one or more of the functions discussed above with respect toblock 706.

As used herein, the term “determining” encompasses a wide variety ofactions. For example, “determining” may include calculating, computing,processing, deriving, investigating, looking up (e.g., looking up in atable, a database or another data structure), ascertaining and the like.Also, “determining” may include receiving (e.g., receiving information),accessing (e.g., accessing data in a memory) and the like. Also,“determining” may include resolving, selecting, choosing, establishingand the like. Further, a “channel width” as used herein may encompass ormay also be referred to as a bandwidth in certain aspects.

As used herein, a phrase referring to “at least one of” a list of itemsrefers to any combination of those items, including single members. Asan example, “at least one of: a, b, or c” is intended to cover: a, b, c,a-b, a-c, b-c, and a-b-c.

The various operations of methods described above may be performed byany suitable means capable of performing the operations, such as varioushardware and/or software component(s), circuits, and/or module(s).Generally, any operations illustrated in the Figures may be performed bycorresponding functional means capable of performing the operations.

The various illustrative logical blocks, modules and circuits describedin connection with the present disclosure may be implemented orperformed with a general purpose processor, a digital signal processor(DSP), an application specific integrated circuit (ASIC), a fieldprogrammable gate array signal (FPGA) or other programmable logic device(PLD), discrete gate or transistor logic, discrete hardware componentsor any combination thereof designed to perform the functions describedherein. A general purpose processor may be a microprocessor, but in thealternative, the processor may be any commercially available processor,controller, microcontroller or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

In one or more aspects, the functions described may be implemented inhardware, software, firmware, or any combination thereof. If implementedin software, the functions may be stored on or transmitted over as oneor more instructions or code on a computer-readable medium.Computer-readable media includes both computer storage media andcommunication media including any medium that facilitates transfer of acomputer program from one place to another. A storage media may be anyavailable media that can be accessed by a computer. By way of example,and not limitation, such computer-readable media can comprise RAM, ROM,EEPROM, CD-ROM or other optical disk storage, magnetic disk storage orother magnetic storage devices, or any other medium that can be used tocarry or store desired program code in the form of instructions or datastructures and that can be accessed by a computer. Also, any connectionis properly termed a computer-readable medium. For example, if thesoftware is transmitted from a website, server, or other remote sourceusing a coaxial cable, fiber optic cable, twisted pair, digitalsubscriber line (DSL), or wireless technologies such as infrared, radio,and microwave, then the coaxial cable, fiber optic cable, twisted pair,DSL, or wireless technologies such as infrared, radio, and microwave areincluded in the definition of medium. Disk and disc, as used herein,includes compact disc (CD), laser disc, optical disc, digital versatiledisc (DVD), floppy disk and Blu-ray® disc where disks usually reproducedata magnetically, while discs reproduce data optically with lasers.Thus, in some aspects computer readable medium may comprisenon-transitory computer readable medium (e.g., tangible media). Inaddition, in some aspects computer readable medium may comprisetransitory computer readable medium (e.g., a signal). Combinations ofthe above should also be included within the scope of computer-readablemedia.

The methods disclosed herein comprise one or more steps or actions forachieving the described method. The method steps and/or actions may beinterchanged with one another without departing from the scope of theclaims. In other words, unless a specific order of steps or actions isspecified, the order and/or use of specific steps and/or actions may bemodified without departing from the scope of the claims.

Thus, certain aspects may comprise a computer program product forperforming the operations presented herein. For example, such a computerprogram product may comprise a computer readable medium havinginstructions stored (and/or encoded) thereon, the instructions beingexecutable by one or more processors to perform the operations describedherein. For certain aspects, the computer program product may includepackaging material.

Software or instructions may also be transmitted over a transmissionmedium. For example, if the software is transmitted from a website,server, or other remote source using a coaxial cable, fiber optic cable,twisted pair, digital subscriber line (DSL), or wireless technologiessuch as infrared, radio, and microwave, then the coaxial cable, fiberoptic cable, twisted pair, DSL, or wireless technologies such asinfrared, radio, and microwave are included in the definition oftransmission medium.

Further, it should be appreciated that modules and/or other appropriatemeans for performing the methods and techniques described herein can bedownloaded and/or otherwise obtained by a user terminal and/or basestation as applicable. For example, such a device can be coupled to aserver to facilitate the transfer of means for performing the methodsdescribed herein. Alternatively, various methods described herein can beprovided via storage means (e.g., RAM, ROM, a physical storage mediumsuch as a compact disc (CD) or floppy disk, etc.), such that a userterminal and/or base station can obtain the various methods uponcoupling or providing the storage means to the device. Moreover, anyother suitable technique for providing the methods and techniquesdescribed herein to a device can be utilized.

It is to be understood that the claims are not limited to the preciseconfiguration and components illustrated above. Various modifications,changes and variations may be made in the arrangement, operation anddetails of the methods and apparatus described above without departingfrom the scope of the claims.

While the foregoing is directed to aspects of the present disclosure,other and further aspects of the disclosure may be devised withoutdeparting from the basic scope thereof, and the scope thereof isdetermined by the claims that follow.

What is claimed is:
 1. A system comprising one or more apparatuses thatcommunicate with a second apparatus, comprising: a first wirelesscommunication unit configured to communicate with the second apparatusvia a first wireless protocol, wherein the first wireless communicationunit transmits a first message to the second apparatus; and a secondwireless communication unit configured to communicate with the secondapparatus over a communication link via a second wireless protocol,wherein the second wireless communication unit is further configured todisconnect the communication link if the first wireless communicationunit does not receive a second message from the second apparatus withina predetermined amount of time after transmission of the first message.2. The system of claim 1, wherein the first wireless protocol comprisesone of a near field communication (NFC) standard or radio-frequencyidentification (RFID), and wherein the second wireless protocolcomprises one of an IEEE 802.11 protocol or a wireless wide area network(WWAN) protocol.
 3. The system of claim 1, wherein the second messagecomprises an acknowledgement that the first message was received by thesecond apparatus.
 4. The system of claim 1, wherein the first wirelessprotocol is used to authenticate the second apparatus for the purpose ofestablishing the communication link.
 5. The system of claim 4, whereinthe first wireless communication unit transmits a first code to thesecond apparatus, wherein the first code is an encryption key configuredto one of maintain or modify the communication link, and wherein thecommunication link is established if the second wireless communicationunit receives the first code via the second wireless protocol.
 6. Thesystem of claim 5, wherein the first wireless communication unittransmits a second code to the second apparatus, wherein the second codeis a second encryption key configured to one of maintain or modify thecommunication link, and wherein the communication link is disconnectedif the second wireless communication unit does not receive the secondcode via the second wireless protocol.
 7. The system of claim 5, whereinthe first wireless communication unit is further configured toperiodically generate a new code, wherein the first wirelesscommunication unit transmits the respective new code when the respectivenew code is generated, wherein the new code is a new encryption keyconfigured to one of maintain or modify the communication link, andwherein the communication link is disconnected if the second wirelesscommunication unit does not receive the respective new code.
 8. Thesystem of claim 1, wherein the first wireless communication unit isfurther configured to periodically transmit messages to the secondapparatus via the first wireless protocol, and wherein the secondwireless communication unit is further configured to disconnect thecommunication link if the first wireless communication unit does notreceive a confirmation message from the second apparatus in response toany one of the messages transmitted to the second apparatus.
 9. Thesystem of claim 1, wherein the second apparatus is configured toperiodically transmit messages to the second wireless communicationunit, and wherein the second wireless communication unit is furtherconfigured to disconnect the communication link if the second wirelesscommunication unit does not receive any one of the messages.
 10. Thesystem of claim 1, wherein the first wireless communication unittransmits the first message to the second apparatus when the secondapparatus is located at a first position, wherein the second wirelesscommunication unit receives the second message if the second apparatusis located at the first position, and wherein the second wirelesscommunication unit does not receive the second message if the secondapparatus is located at a second position different from the firstposition.
 11. The system of claim 1, wherein a first apparatus in theone or more apparatuses comprises the first wireless communication unitand the second wireless communication unit.
 12. The system of claim 1,wherein a first apparatus in the one or more apparatuses comprises thefirst wireless communication unit and a third apparatus in the one ormore apparatuses comprises the second wireless communication unit.
 13. Amethod of communicating with a second apparatus, comprising:communicating, by a first wireless communication unit, with the secondapparatus via a first wireless protocol, wherein the first wirelesscommunication unit transmits a first message to the second apparatus;communicating, by a second wireless communication unit, with the secondapparatus over a communication link via a second wireless protocol; anddisconnecting, by the second wireless communication unit, thecommunication link if the first wireless communication unit does notreceive a second message from the second apparatus within apredetermined amount of time after transmission of the first message.14. The method of claim 13, wherein the first wireless protocolcomprises one of a near field communication (NFC) standard orradio-frequency identification (RFID), and wherein the second wirelessprotocol comprises one of an IEEE 802.11 protocol or a wireless widearea network (WWAN) protocol.
 15. The method of claim 13, wherein thesecond message comprises an acknowledgement that the first message wasreceived by the second apparatus.
 16. The method of claim 13, whereinthe first wireless protocol is used to authenticate the second apparatusfor the purpose of establishing the communication link.
 17. The methodof claim 16, further comprising transmitting, by the first wirelesscommunication unit, a first code to the second apparatus, wherein thefirst code is an encryption key configured to one of maintain or modifythe communication link, wherein the communication link is established ifthe second wireless communication unit receives the first code via thesecond wireless protocol.
 18. The method of claim 17, further comprisingtransmitting, by the first wireless communication unit, a second code tothe second apparatus, wherein the second code is a second encryption keyconfigured to one of maintain or modify the communication link, whereinthe communication link is disconnected if the second wirelesscommunication unit does not receive the second code via the secondwireless protocol.
 19. The method of claim 17, further comprising:periodically generating a new code, wherein the new code is a newencryption key configured to one of maintain or modify the communicationlink; and transmitting the respective new code when the respective newcode is generated, wherein the communication link is disconnected if thesecond wireless communication unit does not receive the respective newcode.
 20. The method of claim 13, further comprising: periodicallytransmitting, by the first wireless communication unit, messages to thesecond apparatus via the first wireless protocol; and disconnecting, bythe second wireless communication unit, the communication link if thefirst wireless communication unit does not receive a confirmationmessage from the second apparatus in response to any one of the messagestransmitted to the second apparatus.
 21. The method of claim 13, whereinthe second apparatus is configured to periodically transmit messages tothe second wireless communication unit, and further comprisingdisconnecting, by the second wireless communication unit, thecommunication link if the second wireless communication unit does notreceive any one of the messages.
 22. The method of claim 13, wherein thefirst wireless communication unit transmits the first message to thesecond apparatus when the second apparatus is located at a firstposition, wherein the second wireless communication unit receives thesecond message if the second apparatus is located at the first position,and wherein the second wireless communication unit does not receive thesecond message if the second apparatus is located at a second positiondifferent from the first position.
 23. The method of claim 13, wherein afirst apparatus comprises the first wireless communication unit and thesecond wireless communication unit.
 24. The method of claim 13, whereina first apparatus comprises the first wireless communication unit and athird apparatus comprises the second wireless communication unit.
 25. Anapparatus for communicating with a second apparatus, comprising: firstmeans for communicating with the second apparatus via a first wirelessprotocol, wherein the first means for communicating transmits a firstmessage to the second apparatus; second means for communicating with thesecond apparatus over a communication link via a second wirelessprotocol; and means for disconnecting the communication link if thefirst means for communicating does not receive a second message from thesecond apparatus within a predetermined amount of time aftertransmission of the first message.
 26. The apparatus of claim 25,wherein the first wireless protocol comprises one of a near fieldcommunication (NFC) standard or radio-frequency identification (RFID),and wherein the second wireless protocol comprises one of an IEEE 802.11protocol or a wireless wide area network (WWAN) protocol.
 27. Theapparatus of claim 25, wherein the second message comprises anacknowledgement that the first message was received by the secondapparatus.
 28. The apparatus of claim 25, wherein the first wirelessprotocol is used to authenticate the second apparatus for the purpose ofestablishing the communication link.
 29. The apparatus of claim 28,further comprising means for transmitting a first code to the secondapparatus, wherein the first code is an encryption key configured to oneof maintain or modify the communication link, wherein the communicationlink is established if the second means for communicating receives thefirst code via the second wireless protocol.
 30. The apparatus of claim29, further comprising means for transmitting a second code to thesecond apparatus, wherein the second code is a second encryption keyconfigured to one of maintain or modify the communication link, whereinthe communication link is disconnected if the second means forcommunicating does not receive the second code via the second wirelessprotocol.
 31. The apparatus of claim 29, further comprising: means forperiodically generating a new code, wherein the new code is a newencryption key configured to one of maintain or modify the communicationlink; and means for transmitting the respective new code when therespective new code is generated, wherein the communication link isdisconnected if the second means for communicating does not receive therespective new code.
 32. The apparatus of claim 25, further comprising:means for periodically transmitting messages to the second apparatus viathe first wireless protocol; and means for disconnecting thecommunication link if the first means for communicating does not receivea confirmation message from the second apparatus in response to any oneof the messages transmitted to the second apparatus.
 33. The apparatusof claim 25, wherein the second apparatus is configured to periodicallytransmit messages to the second means for communicating, and furthercomprising means for disconnecting the communication link if the secondmeans for communicating does not receive any one of the messages. 34.The apparatus of claim 25, wherein the first means for communicatingtransmits the first message to the second apparatus when the secondapparatus is located at a first position, wherein the second means forcommunicating receives the second message if the second apparatus islocated at the first position, and wherein the second means forcommunicating does not receive the second message if the secondapparatus is located at a second position different from the firstposition.
 35. The apparatus of claim 25, wherein the first means forcommunicating comprises a first wireless communication unit, and whereinthe second means for communicating and the means for disconnectingcomprise a second wireless communication unit.
 36. A non-transitorycomputer-readable medium comprising code that, when executed, causes anapparatus to: communicate, using a first wireless communication unit,with a second apparatus via a first wireless protocol, wherein the firstwireless communication unit transmits a first message to the secondapparatus; communicate, using a second wireless communication unit, withthe second apparatus over a communication link via a second wirelessprotocol; and disconnect, using the second wireless communication unit,the communication link if the first wireless communication unit does notreceive a second message from the second apparatus within apredetermined amount of time after transmission of the first message.37. The medium of claim 36, wherein the first wireless protocolcomprises one of a near field communication (NFC) standard orradio-frequency identification (RFID), and wherein the second wirelessprotocol comprises one of an IEEE 802.11 protocol or a wireless widearea network (WWAN) protocol.
 38. The medium of claim 36, wherein thesecond message comprises an acknowledgement that the first message wasreceived by the second apparatus.
 39. The medium of claim 36, whereinthe first wireless protocol is used to authenticate the second apparatusfor the purpose of establishing the communication link.
 40. The mediumof claim 39, further comprising code that, when executed, causes anapparatus to transmit, using the first wireless communication unit, afirst code to the second apparatus, wherein the first code is anencryption key configured to one of maintain or modify the communicationlink, wherein the communication link is established if the secondwireless communication unit receives the first code via the secondwireless protocol.
 41. The medium of claim 40, further comprising codethat, when executed, causes an apparatus to transmit, using the firstwireless communication unit, a second code to the second apparatus,wherein the second code is a second encryption key configured to one ofmaintain or modify the communication link, wherein the communicationlink is disconnected if the second wireless communication unit does notreceive the second code via the second wireless protocol.
 42. The mediumof claim 40, further comprising code that, when executed, causes anapparatus to: periodically generate a new code, wherein the new code isa new encryption key configured to one of maintain or modify thecommunication link; and transmit the respective new code when therespective new code is generated, wherein the communication link isdisconnected if the second wireless communication unit does not receivethe respective new code.
 43. The medium of claim 36, further comprisingcode that, when executed, causes an apparatus to: periodically transmit,using the first wireless communication unit, messages to the secondapparatus via the first wireless protocol; and disconnect, using thesecond wireless communication unit, the communication link if the firstwireless communication unit does not receive a confirmation message fromthe second apparatus in response to any one of the messages transmittedto the second apparatus.
 44. The medium of claim 36, wherein the secondapparatus is configured to periodically transmit messages to the secondwireless communication unit, and further comprising code that, whenexecuted, causes an apparatus to disconnect, using the second wirelesscommunication unit, the communication link if the second wirelesscommunication unit does not receive any one of the messages.
 45. Themedium of claim 36, wherein the first wireless communication unittransmits the first message to the second apparatus when the secondapparatus is located at a first position, wherein the second wirelesscommunication unit receives the second message if the second apparatusis located at the first position, and wherein the second wirelesscommunication unit does not receive the second message if the secondapparatus is located at a second position different from the firstposition.