Automated pairing of remote devices with compressed identifiers

ABSTRACT

In embodiments, apparatuses, methods and storage media are described that are associated with remote control of media devices. A remote control and a content player may be configured to facilitate a secured pairing process. The remote control may be configured to send non-secured signals (such as through an IR transmitter) as well as send and receive secured signals (such as via an RF transceiver). The remote control may non-securely broadcast an uncompressed identifier of itself. Then, in response to being turned on or asked to pair, the remote control may send a pairing request to the player that includes a compressed identifier. The player may then identify the remote control based on the compressed identifier and the previously-broadcast uncompressed identifier and the remote control and player may then perform a pairing process without requiring additional action on the part of a user. Other embodiments may be described and/or claimed.

RELATED APPLICATION

This application is a continuation-in-part of U.S. application Ser. No. 13/802,352, filed Mar. 13, 2013, and titled “Automated Pairing of Remote Devices,” the specification of which is hereby incorporated by reference.

TECHNICAL FIELD

The present disclosure relates to the field of data processing, in particular, to apparatuses, methods and systems associated with remote control of media devices.

BACKGROUND

The background description provided herein is for the purpose of generally presenting the context of the disclosure. Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.

Advances in computing, networking and related technologies have led to proliferation in the availability of content, and the manners in which the content is consumed. Today, myriad content may be made available from various sources of content, including but not limited to fixed medium (e.g., Digital Versatile Disk (DVD)), broadcast, cable operators, satellite channels, Internet, and so forth. Users may consume content with a television set, a laptop or desktop computer, a tablet, a smartphone, or other devices of the like. Users may also wish to view content from one or more content consumption devices, and may desire facilitated control of these devices.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments will be readily understood by the following detailed description in conjunction with the accompanying drawings. To facilitate this description, like reference numerals designate like structural elements. Embodiments are illustrated by way of example, and not by way of limitation, in the Figures of the accompanying drawings.

FIG. 1 illustrates an example arrangement for content distribution and consumption, in accordance with various embodiments.

FIG. 2 illustrates an example arrangement of a remote control and a player in accordance with various embodiments.

FIG. 3 illustrates an example state diagram for the remote control, in accordance with various embodiments.

FIG. 4 illustrates an example state diagram for the player, in accordance with various embodiments.

FIG. 5 illustrates an example process performed by the remote control for controlling the player, in accordance with various embodiments.

FIG. 6 illustrates an example process performed by the player for accepting control from the remote control, in accordance with various embodiments.

FIG. 7 illustrates an example process performed by the remote control for controlling the player using a compressed identifier, in accordance with various embodiments.

FIG. 8 illustrates an example process performed by the player for accepting control from the remote control using a compressed identifier, in accordance with various embodiments.

FIG. 9 illustrates an example computing environment suitable for practicing various aspects of the present disclosure, in accordance with various embodiments.

FIG. 10 illustrates an example storage medium with instructions configured to enable an apparatus to practice various aspects of the present disclosure, in accordance with various embodiments.

DETAILED DESCRIPTION

In the following detailed description, reference is made to the accompanying drawings which form a part hereof wherein like numerals designate like parts throughout, and in which is shown by way of illustration embodiments that may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present disclosure. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of embodiments is defined by the appended claims and their equivalents.

Various operations may be described as multiple discrete actions or operations in turn, in a manner that is most helpful in understanding the claimed subject matter. However, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations may not be performed in the order of presentation. Operations described may be performed in a different order than the described embodiment. Various additional operations may be performed and/or described operations may be omitted in additional embodiments.

For the purposes of the present disclosure, the phrase “A and/or B” means (A), (B), or (A and B). For the purposes of the present disclosure, the phrase “A, B, and/or C” means (A), (B), (C), (A and B), (A and C), (B and C), or (A, B and C).

The description may use the phrases “in an embodiment,” or “in embodiments,” which may each refer to one or more of the same or different embodiments. Furthermore, the terms “comprising,” “including,” “having,” and the like, as used with respect to embodiments of the present disclosure, are synonymous.

As used herein, the term “logic” and “module” may refer to, be part of, or include an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group) that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.

Referring now to FIG. 1, an arrangement for content distribution and consumption, in accordance with various embodiments, is illustrated. As shown, in embodiments, arrangement 100 for distribution and consumption of content may include a number of content consumption devices 108 coupled with one or more content aggregator/distributor servers 104 via one or more networks 106. Content aggregator/distributor servers 104 may be configured to aggregate and distribute content to content consumption devices 108 for consumption, e.g., via one or more networks 106.

In embodiments, as shown, content aggregator/distributor servers 104 may include encoder 112, storage 114 and content provisioning 116, which may be coupled to each other as shown. Encoder 112 may be configured to encode content 102 from various content providers, and storage 114 may be configured to store encoded content. Content provisioning 116 may be configured to selectively retrieve and provide encoded content to the various content consumption devices 108 in response to requests from the various content consumption devices 108. Content 102 may be media content of various types, having video, audio, and/or closed captions, from a variety of content creators and/or providers. Examples of content may include, but are not limited to, movies, TV programming, user created content (such as YouTube video, iReporter video), music albums/titles/pieces, and so forth. Examples of content creators and/or providers may include, but are not limited to, movie studios/distributors, television programmers, television broadcasters, satellite programming broadcasters, cable operators, online users, and so forth.

In various embodiments, for efficiency of operation, encoder 112 may be configured to encode the various content 102, typically in different encoding formats, into a subset of one or more common encoding formats. However, encoder 112 may be configured to nonetheless maintain indices or cross-references to the corresponding content in their original encoding formats. Similarly, for flexibility of operation, encoder 112 may encode or otherwise process each or selected ones of content 102 into multiple versions of different quality levels. The different versions may provide different resolutions, different bitrates, and/or different frame rates for transmission and/or playing. In various embodiments, the encoder 112 may publish, or otherwise make available, information on the available different resolutions, different bitrates, and/or different frame rates. For example, the encoder 112 may publish bitrates at which it may provide video or audio content to the content consumption device(s) 108. Encoding of audio data may be performed in accordance with, e.g., but are not limited to, the MP3 standard, promulgated by the Moving Picture Experts Group (MPEG). Encoding of video data may be performed in accordance with, e.g., but are not limited to, the H264 standard, promulgated by the International Telecommunication Unit (ITU) Video Coding Experts Group (VCEG). Encoder 112 may include one or more computing devices configured to perform content portioning, encoding, and/or transcoding, such as described herein.

Storage 114 may be temporal and/or persistent storage of any type, including, but are not limited to, volatile and non-volatile memory, optical, magnetic and/or solid state mass storage, and so forth. Volatile memory may include, but are not limited to, static and/or dynamic random access memory. Non-volatile memory may include, but are not limited to, electrically erasable programmable read-only memory, phase change memory, resistive memory, and so forth.

In various embodiments, content provisioning 116 may be configured to provide encoded content as discrete files and/or as continuous streams of encoded content. Content provisioning 116 may be configured to transmit the encoded audio/video data (and closed captions, if provided) in accordance with any one of a number of streaming and/or transmission protocols. The streaming protocols may include, but are not limited to, the Real-Time Streaming Protocol (RTSP). Transmission protocols may include, but are not limited to, the transmission control protocol (TCP), user datagram protocol (UDP), and so forth. In various embodiments, content provisioning 116 may be configured to provide media files that are packaged according to one or more output packaging formats. In various embodiments, content provisioning 116 may include a transpackager, such as illustrated in FIG. 2 below, which may be configured to package content files encoded by the encoder 112 in one or more output packaging formats for subsequent provisioning. Particular embodiments of transpackagers and transpackaging may be described below.

Networks 106 may be any combinations of private and/or public, wired and/or wireless, local and/or wide area networks. Private networks may include, e.g., but are not limited to, enterprise networks. Public networks, may include, e.g., but is not limited to the Internet. Wired networks, may include, e.g., but are not limited to, Ethernet networks. Wireless networks, may include, e.g., but are not limited to, Wi-Fi, or 3G/4G networks. It would be appreciated that at the content distribution end, networks 106 may include one or more local area networks with gateways and firewalls, through which content aggregator/distributor server 104 communicate with content consumption devices 108. Similarly, at the content consumption end, networks 106 may include base stations and/or access points, through which consumption devices 108 communicate with content aggregator/distributor server 104. In between the two ends may be any number of network routers, switches and other networking equipment of the like. However, for ease of understanding, these gateways, firewalls, routers, switches, base stations, access points and the like are not shown.

In various embodiments, as shown, a content consumption device 108 may include player 122, display 124 and user input device 126. Player 122 may be configured to receive streamed content, decode and recover the content from the content stream, and present the recovered content on display 124, in response to user selections/inputs from user input device 126.

In various embodiments, player 122 may include decoder 132, presentation engine 134 and user interface engine 136. Decoder 132 may be configured to receive streamed content, decode and recover the content from the content stream. Presentation engine 134 may be configured to present the recovered content on display 124, in response to user selections/inputs. In various embodiments, decoder 132 and/or presentation engine 134 may be configured to present audio and/or video content to a user that has been encoded using varying encoding control variable settings in a substantially seamless manner. Thus, in various embodiments, the decoder 132 and/or presentation engine 134 may be configured to present two portions of content that vary in resolution, frame rate, and/or compression settings without interrupting presentation of the content. User interface engine 136 may be configured to receive signals from user input device 126 that are indicative of the user selections/inputs from a user, and to selectively render a contextual information interface as described herein.

While shown as part of a content consumption device 108, display 124 and/or user input device(s) 126 may be stand-alone devices or integrated, for different embodiments of content consumption devices 108. For example, for a television arrangement, display 124 may be a stand alone television set, Liquid Crystal Display (LCD), Plasma and the like, while player 122 may be part of a separate set-top set, and user input device 126 may be a separate remote control (such as described below), gaming controller, keyboard, or another similar device. Similarly, for a desktop computer arrangement, player 122, display 124 and user input device(s) 126 may all be separate stand alone units. On the other hand, for a tablet arrangement, display 124 may be a touch sensitive display screen that includes user input device(s) 126, and player 122 may be a computing platform with a soft keyboard that also includes one of the user input device(s) 126. Further, display 124 and player 122 may be integrated within a single form factor. Similarly, for a smartphone arrangement, player 122, display 124 and user input device(s) 126 may be likewise integrated.

Referring now to FIG. 2, an example arrangement of a remote control 128 and a player 122 is illustrated in accordance with various embodiments. In various embodiments, the remote control 126 may include one or more implementations of the user input device(s) 126 described above. In various embodiments, the remote control 128 and the player 122 may be configured to communicate via one or more communication channels. For example, the remote control 128 may be configured to send commands to the player 122 to control the player 122. In some embodiments, the player 122 may likewise be able to send commands and/or information to the remote control 128, such as to affect one or more displays on the remote control 128.

In various embodiments, the remote control 128 and the player 122 may be configured to communicate via non-secured signals. For example, the remote control may include a line-of sight transmitter, such as and infrared (“IR”) transmitter 250, that is configured to transmit signals to the player 122. In various embodiments, the signals sent by the IR transmitter 250 may be receivable and understandable by the player without requiring that a secure communication channel be previously established between the remote control 128 and the player 122. In various embodiments, the player may thus be configured to receive the non-secured signals, such as through an IR receiver 255. In various embodiments, the IR transmitter of the remote control 128 and/or the IR receiver of the player 122 may be combined with an IR receiver and/or IR transmitter, respectively to form an IR transceiver. Thus, in some embodiments, two-way non-secured communications may be performed between the remote control 128 and the player 122.

In various embodiments, the remote control 128 and the player 122 may be configured to communicate via a secure communication channel. For example, in some embodiments, the remote control 128 and the player 122 may be configured to communicate through a Bluetooth™ communication channel. In various embodiments, the remote control 128 and the player 122 may be configured to communication via the secure communication channel using radio frequency (“RF”) transceivers 260 and 265, respectively. In various embodiments, however, the remote control 128 and the player 122 may be configured to establish the secure communication channel prior to communicating via the secure communication channel. The remote control 128 and the player 122 may be configured to establish the secure communication channel through a pairing process that incorporates the sharing of an identifier for the remote control 128 and/or the player 122 and the sharing of encryption keys between the remote control 128 and the player 122.

In various embodiments, the RF transceivers 260 and 265 may be configured to communicate in a non-secure fashion as well. For example, in some embodiments, the remote control 128 may broadcast an identifier for the remote control 128, such as a media access control address (“MAC address”) 215, via its RF transceiver 260 prior to a pairing process. In various embodiments, this identifier may be transmitted in an uncompressed form, as compared to a compressed identifier, which may later be transmitted as part of a pairing process, as described herein. In various embodiments, multiple remote controls 128 may broadcast their own uncompressed identifiers to facilitate possible later pairing with the player 122. In various embodiments, the player 122 may be configured to record and store these uncompressed identifiers to facilitate future pairing communications.

In various embodiments, the remote control 128 and the player 122 may be configured to facilitate performance of the pairing process through communication of non-secured signals. For example, the remote control 128 may be configured to send a pairing request to the player 122 using the IR transmitter 150. In various embodiments, the pairing request may include an identifier for the remote control 128, which may be maintained on the remote control 128, as shown. In various embodiments, identifier may include the MAC address. In other embodiments, the identifier may include a compressed identifier, such as a hashed version of the MAC address. In various embodiments, the MAC address 215 and/or the compressed identifier may be pre-programmed into the remote control 128 to be maintained thereby, avoiding the need to separately configured the remote control 128 with the MAC address 215.

In various embodiments, the remote control 128 may be configured to transmit the pairing request in response to a user-based indication to pair the remote control 128 and the player 122. For example, remote control 128 may include a pairing button 270, demarcated from other buttons and user-interface elements 230, which, when activated, may cause the remote control 128 to transmit the pairing request. In other embodiments, the remote control 128 may transmit the pairing request in response to other user actions, such as insertion of a battery (not shown) into remote control 128 or removal of a tab adjacent to a battery to complete an electronic circuit in the remote control 128. In various embodiments, the pairing request may facilitate the pairing process without requiring the use of separate entry of a personal identification number (“PIN”) or other secure code by a user of the remote control 128. This may allow the user to more easily initiate the pairing process through a single action and without additional effort.

In various embodiments, the player 122 may be configured, in response to receipt of the pairing request by the IR receiver 255 of the player 122, to initiate pairing communications with the remote control 128. The player 122 may be configured to initiate pairing communications by sending an initial pairing communication using the RF transmitter 265. In various embodiments, the initial pairing communication (as well as subsequent pairing communications) may incorporate the MAC address 215 of the remote control 128.

In various embodiments, the player 122 may be configured to, prior to initiating pairing communications, identify the remote control 128 based on the pairing request. Thus, in various embodiments, the player 122 may identify the compressed identifier from the pairing request and may compare the compressed identifier to known uncompressed identifiers to identify the remote. In various embodiments, if the compressed identifier was created from an uncompressed identifier (such as a MAC address) based on a known compression technique, such as a hashing technique. Then, the player 122 may perform the identification by, for example, using the same hashing technique on each of the uncompressed identifiers it knows of and comparing the hash result to the received compressed identifier.

In various embodiments, the use of a compressed identifier or an uncompressed identifier may provide increased efficiencies, such as speech and/or battery life. For example, a MAC address, used as an uncompressed identifier, may include six bytes of data, while that uncompressed MAC address may be hashed into a one byte compressed identifier. Because the use of IR is slower than RF, it may be desirable to transmit the one-byte compressed identifier via the IR to save on time and transmission energy. Though, in some embodiments, the use of the compressed identifier may be supplemented by a previous broadcast of the uncompressed identifier, if this uncompressed identifier is broadcast via RF, an energy savings may still be maintained over IR transmission of the full, uncompressed identifier.

In various embodiments, the player 122 may initiate the pairing communications after performing an authorization check to determine if the MAC address 215 of the remote control 128 is identified in a MAC table 225 (or other data structure) that includes authorized MAC addresses. In various embodiments, the MAC table 225 may be obtained by the player 122 from a separate source, such as by downloading the MAC table 225 via network 106 or another network from a separate computing device (not shown). In various embodiments, if the remote control 128 is configured to send a hash of its MAC address 215 to the player 122, the player 122 may be configured to maintain hashes in the MAC table 225 rather than full MAC addresses.

In various embodiments, after initiating pairing communications, the player 122 and the remote control 128 may continue pairing communications using the RF transceivers 165 and 160, respectively. After completion of the pairing communications (which may include known Bluetooth™ pairing protocols) the remote control 128 and player 122 may establish a secure communication channel, including exchange of encryption keys to be used in subsequent secure communications. In various embodiments, the communications between the remote control 128 and the player 122 may establish a paring between the two devices, or both connection and pairing, as may be understood. Thereafter, there remote control 128 may be configured to send commands to the player 122 via the secure communication channel using the RF transceiver 160. In various embodiments, performance of the actions described above may be facilitated through the use of hardware or software logic 210 and/or 220 located on the remote control 128 and/or player 122 respectively.

FIG. 3 illustrates an example state diagram for the remote control 128, in accordance with various embodiments. In various embodiments, the logic 210 of the remote control 128 may be configured to maintain or cause transitions between various logical states to effect the actions and operations described herein. For example, the remote control 128 may, in various embodiments, include a not connected/sleeping state (State 1), where the remote control 128 is not actively connected to any player 122. From State 1, if a button press occurs, such as activation of the pairing button 270, the remote control may be configured to transition to an auto-pairing state (State 2). During this transition, the remote control 128 may transmit the pairing request via the IR transmitter 250. The remote control 128 may also exchange encryption keys with the player 122; State 2 may be reached after these keys are exchanged.

In State 2, the remote control 128 may be in an auto-pairing state. In this state, the remote control 128 may communicate with the player 122 (such as via IR and/or RF) to pair the two devices. Once the two are connected, the remote control 128 may be configured to transition to a paired & connected state (State 3). However, the remote control 128 may be configured to stay in State 2 for a pre-determined amount of time (e.g., 30 seconds). Thus, if the remote control 128 has not transitioned to State 3 after the time has elapsed, the remote control 128 may return to State 1, where it may be not connected.

Once reaching State 3, however, the remote control 128 may stay paired & connected unless disconnected. If a traditional disconnect occurs, then the remote control 128 may return to State 2 to resume auto-pairing. If, however, the remote control 128 receives a command to force a disconnect (such as through user indication through a dedicated user interface element), then the remote control 128 may return to the not connected/sleeping state of State 1. During this transition, the remote control 128 may clear its pairing and keys and disconnect.

FIG. 4 illustrates an example state diagram for the player 122, in accordance with various embodiments. In various embodiments, the logic 210 of the remote control 128 may be configured to maintain or cause transitions between various logical states to effect the actions and operations described herein. For example, the player 122 may include a state where it is not paired and not connected with any remote control 128 (State 0). Upon receipt of a pairing request from a remote control 128, however, the player 122 may transition to State 1. At State 1, the player 122 may be configured to notify other local players 122 (such as players 122 that are present on the network 106) to disconnect the remote control 128 that was identified in the pairing request.

Next, the player 122 may transition to State 2, where the player 122 may perform Bluetooth™ discovery, as may be understood. While in this state, the player 122 may also be configured to authorize the MAC address received in the pairing request against its MAC table 225. From State 2, if no match is found to authorize the remote control 128, or if a timeout occurs, then the player 122 may return to State 0, where it is not paired and not connected. if however, the MAC address is matched, and thus the remote control 128 is authorized to control the player 122, then the player 122 may transition to State 3, where Bluetooth™ pairing/bonding between the player 122 and the remote control 128 may occur, as may be understood. If the player 122 is unable to perform the pairing, then the player 122 may transition to State 0. If, by contrast, the player 122 and remote control 128 experience repeated failure or an encryption key error, then the player 122 may transition to State 6, where the player 122 may remove encryption key and device data that was shared from the remote control 128, and then transition to State 0.

If, however, the player 122 pairs with the remote control 128, then the player 122 may transition to State 4, where the two devices may be paired and connected. If the player 122 drops the connection with the remote control 128, then the player 122 may transition to State 5, where it may be paired and not connected. From State 5, if the player 122 receives another pairing request identifying the same MAC address as previously received during pairing communications, then the player 122 may understand that the last-connected remote control 128 is attempting to re-establish connection, and may return to State 4, where the two devices are connected. If, however, the player 122, while at State 5, receives a pairing request from a new remote control 128 (such as one identified by a MAC address other than that used in the last pairing), then the player 122 may transition to State 6, where the device and key data for the last-paired remote control 128 may be removed, and the player 122 may then return to State 0, where it is not paired and not connected.

FIG. 5 illustrates an example process 500 performed by the remote control 128 for controlling the player 122, in accordance with various embodiments. While FIG. 5 illustrates particular example operations for process 500, in various embodiments, process 500 may include additional operations, omit illustrated operations, and/or combine illustrated operations. The process may begin at operation 510, where the remote control 128 may receive an indication to begin pairing with the player 122. In various embodiments, this indication may be received e.g., from a user, via activation of a pairing button 270, insertion of batteries into the remote control 128, and/or removal of a tab or other non-conductive material to complete a power circuit in the remote control 128.

Next, at operation 520, the remote control 128 may generate a hash from its internally-maintained MAC address 215. Next, the remote control 128 may transmit a pairing request that includes the hash of the MAC address 215 to the player 122 via the IR transmitter 250. In some embodiments, while use of a hash may reduce complexity and/or length of the pairing request, rather than generate a hash, the remote control 128 may include the MAC address 215 without additional processing.

Next, at operation 540, the remote control 128 may receive an initial pairing communication from the player 122. This initial pairing communication may, in various embodiments, be transmitted and received, via the RF transceivers 265 and 260, respectively. In various embodiments, this initial communication may identify the remote control 128, such as by the MAC address 215. Next, at operation 550, the remote control 128 may receive and transmit encryption keys with the player 122 to establish the secure communication channel to be used for subsequent communications. In various embodiments, communications performed at operation 550 may also be performed via the RF transceivers 265 and 260. Next, at operation 560, the remote control 128 may transmit commands via the RF transceiver 260 to the player 122 via the established secure communication channel. In various embodiments, operations 540-560 may include one or more implementations of Bluetooth™ pairing and connection communications, as may be understood. the process may then end.

FIG. 6 illustrates an example process 600 performed by the player 122 for accepting control from the remote control 128, in accordance with various embodiments. While FIG. 6 illustrates particular example operations for process 600, in various embodiments, process 600 may include additional operations, omit illustrated operations, and/or combine illustrated operations. The process may begin at operation 610, where the player 122 may optionally obtain the MAC table 225 from an outside server. Next, at operation 620, the player 122 may receive a pairing request from the remote control 128 that includes the hashed MAC. In various embodiments, the player 122 may receive the request via its IR receiver 255. Next, at operation 630, the player 122 may notify other players 122, such as those on network 106, to forget the remote control 128 identified by the received MAC address 122.

Next, at operation 640, the player 122 may compare the hashed MAC address to hashes maintained in its MAC table 225. In embodiments where the remote control 128 sends an unhashed MAC address 215 in its pairing request, the player 122 may be configured to compare the actual MAC address 215 to those in its MAC table 225. If the player 122 determines at operation 640 that the remote control 128 is not authorized, then the process may then end. If, however, the remote control 128 is authorized, then at operation 650, the player 122 may transmit an initial pairing communication to the remote control 128. In various embodiments, this initial pairing communication may be transmitted by the RF transceiver 265 and received by the RF transceiver 260. The initial pairing communication may, in various embodiments, identify the remote control 128, such as by the MAC address 215. Next, at operation 660, the player 122 may receive and transmit encryption keys with the remote control 128 to establish the secure communication channel to be used for subsequent communications. In various embodiments, communications performed at operation 660 may also be performed via the RF transceivers 265 and 260. Next, at operation 670, the player 122 may receive commands via the RF transceiver 265 from the remote control 128 via the established secure communication channel. In various embodiments, operations 650-670 may include one or more implementations of Bluetooth™ pairing and connection communications, as may be understood. the process may then end.

FIG. 7 illustrates an example process 700 performed by the remote control 128 for controlling the player 122 using a compressed identifier, in accordance with various embodiments. In various embodiments, process 700 may be performed in place of all or part of process 500 of FIG. 5. While FIG. 7 illustrates particular example operations for process 700, in various embodiments, process 700 may include additional operations, omit illustrated operations, and/or combine illustrated operations. The process may begin at operation 710, where the remote control 128 may broadcast an uncompressed identifier, such as a MAC address, via RF. In various embodiments, multiple remote controls 128 may broadcast uncompressed identifiers prior to beginning pairing communications. In some embodiments, a remote control 128 may broadcast an uncompressed identifier without later initiating pairing.

Next, at operation 720, the remote control 128 may receive an indication to begin pairing with the player 122. In various embodiments, this indication may be received e.g., from a user, via activation of a pairing button 270, insertion of batteries into the remote control 128, and/or removal of a tab or other non-conductive material to complete a power circuit in the remote control 128.

Next, at operation 730, the remote control 128 may generate a compressed identifier from its associated uncompressed identifier, such as its internally-maintained MAC address 215. In some embodiments, the remote control 128 may maintain the compressed identifier internally as well, and may instead look up the compressed identifier at operation 730.

Next, at operation 740, the remote control 128 may transmit a pairing request that includes the compressed identifier to the player 122 via the IR transmitter 250. Next, at operation 750, the remote control 128 may proceed with pairing and transmitting of future commands via RF. In various embodiments, operation 750 may proceed via techniques described above. The process may then end.

FIG. 8 illustrates an example process 800 performed by the player 122 for accepting control from the remote control 128 using a compressed identifier, in accordance with various embodiments. In various embodiments, process 800 may be performed in place of all or part of process 600 of FIG. 6. While FIG. 8 illustrates particular example operations for process 800, in various embodiments, process 800 may include additional operations, omit illustrated operations, and/or combine illustrated operations.

The process may begin at operation 810, where the player 122 may receive uncompressed identifiers broadcast from one or more remote controls 128. Receipt of the uncompressed identifiers may occur via RF broadcast. Next, at operation 820, the player 122 may record the uncompressed identifiers. In various embodiments, operations 810 and 820 may be repeated multiple times.

However, in various embodiments, at operation 830, the player 122 may receive a pairing request via IR from the remote control 128 that includes a compressed identifier. For example, in various embodiments, the player 122 may receive a pairing request that includes a hash of a MAC address for a remote control 128. Next, at operation 840, the player 122 may compare hashes of its recorded uncompressed identifiers to the received compressed identifier. Through this comparison, at operation 850 the player 122 may then identify the remote control 128 that requested the pairing. It may be noted that, by maintaining previously-broadcast uncompressed identifiers, the player 122 facilitates pairing using the smaller, compressed identifier rather than requiring an entire uncompressed identifier to be sent via RF. Next, at operation 860, the player 122 may proceed with pairing and receiving future commands from the requesting remote control via RF. In various embodiments, operation 860 may proceed via techniques described above. The process may then end.

Referring now to FIG. 9, an example computing device suitable for use as various components to practice processes of FIGS. 7 and 8 is illustrated in accordance with various embodiments. As shown, computing device 900 may include one or more processors or processor cores 902, and system memory 904. For the purpose of this application, including the claims, the terms “processor” and “processor cores” may be considered synonymous, unless the context clearly requires otherwise. Additionally, computing device 900 may include mass storage devices 906 (such as diskette, hard drive, compact disc read only memory (CD-ROM) and so forth), input/output devices 908 (such as display, keyboard, cursor control, remote control, gaming controller, image capture device, and so forth) and communication interfaces 910 (such as network interface cards, modems, infrared receivers, radio receivers (e.g., Bluetooth), and so forth). The elements may be coupled to each other via system bus 912, which may represent one or more buses. In the case of multiple buses, they may be bridged by one or more bus bridges (not shown).

Each of these elements may perform its conventional functions known in the art. In particular, system memory 904 and mass storage devices 906 may be employed to store a working copy and a permanent copy of the programming instructions implementing the operations associated with content consumption device 108, e.g., operations associated with player 122 or remote control 128, shown in FIGS. 5-8. The various elements may be implemented by assembler instructions supported by processor(s) 902 or high-level languages, such as, for example, C, that can be compiled into such instructions.

The permanent copy of the programming instructions may be placed into permanent storage devices 906 in the factory, or in the field, through, for example, a distribution medium (not shown), such as a compact disc (CD), or through communication interface 910 (from a distribution server (not shown)). That is, one or more distribution media having an implementation of the agent program may be employed to distribute the agent and program various computing devices.

The number, capability and/or capacity of these elements 910-912 may vary, depending on whether computing device 900 is used as a content aggregator/distributor server 104, content consumption device 108 with player 122, or remote control 128. Their constitutions are otherwise known, and accordingly will not be further described.

FIG. 10 illustrates an example least one computer-readable storage medium 1002 having instructions configured to practice all or selected ones of the operations associated with content consumption devices 108, earlier described, in accordance with various embodiments. As illustrated, least one computer-readable storage medium 1002 may include a number of programming instructions 1004. Programming instructions 1004 may be configured to enable a device, e.g., computing device 900, in response to execution of the programming instructions, to perform, e.g., various operations of processes of FIGS. 5-8, e.g., but not limited to, to the various operations performed to perform pairing and connection of the remote control 128 and the player 122 using compressed identifiers. In alternate embodiments, programming instructions 1004 may be disposed on multiple least one computer-readable storage media 1002 instead.

Referring back to FIG. 9, for one embodiment, at least one of processors 902 may be packaged together with computational logic 922 configured to practice aspects of processes of FIGS. 5-8. For one embodiment, at least one of processors 902 may be packaged together with computational logic 822 configured to practice aspects of processes of FIGS. 5-8 to form a System in Package (SiP). For one embodiment, at least one of processors 902 may be integrated on the same die with computational logic 922 configured to practice aspects of processes of FIGS. 5-8. For one embodiment, at least one of processors 902 may be packaged together with computational logic 922 configured to practice aspects of processes of FIGS. 5-8 to form a System on Chip (SoC). For at least one embodiment, the SoC may be utilized in, e.g., but not limited to, a computing tablet.

Various embodiments of the present disclosure have been described. These embodiments include, but are not limited to, those described in the following paragraphs.

Example 1 includes an apparatus for controlling a controllable device. The apparatus include: a wireless transmitter configured to send non-secured signals and a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel. The apparatus also includes logic operably coupled with the wireless transmitter and wireless transceiver. The logic is configured to send a non-secured pairing request to the controllable device via the wireless transmitter, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the apparatus, the uncompressed identifier being previously known to the controllable device. The logic is configured to receive communication from the controllable device, via the wireless transceiver, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier. The logic is also configured to exchange communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.

Example 2 includes the apparatus of Example 1, wherein the logic is further configured to broadcast the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.

Example 3 includes the apparatus of Example 2, wherein the logic is further configured to broadcast the uncompressed identifier via the wireless transceiver in a non-secured fashion.

Example 4 includes the apparatus of any of Examples 1-3, wherein the uncompressed identifier for the apparatus is based at least in part on a media access control (MAC) address for the apparatus.

Example 5 includes the apparatus of any of Examples 1-4, wherein the logic is further configured to generate the compressed identifier by compression of the uncompressed identifier.

Example 6 includes the apparatus of any of Examples 1-5, wherein the compressed identifier comprises a hash of the uncompressed identifier.

Example 7 includes the apparatus of any of Examples 1-6, wherein the wireless transmitter comprises an infrared transmitter.

Example 8 includes the apparatus of any of Examples 1-7, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the device using a Bluetooth protocol.

Example 9 includes the apparatus of any of Examples 1-8, wherein the logic is further configured to receive an indication to establish the secure communication channel from a user and send the pairing request in response to receipt of the indication.

Example 10 includes the apparatus of any of Examples 1-9, wherein the apparatus comprises a remote control.

Example 11 includes an apparatus for receiving control from a remote control device. The apparatus includes a wireless receiver configured to receive non-secured signals and a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel. The apparatus also includes logic operably coupled with the wireless receiver and wireless transceiver. The logic is configured to receive one or more uncompressed identifiers of respective remote control devices via the wireless transceiver. The logic is also configured to receive a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device. The logic is also configured to identify the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers. The logic is also configured to send communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver. The logic is also configured to exchange communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.

Example 12 includes the apparatus of Example 11, wherein the logic is configured to receive the one or more uncompressed identifiers via the wireless transceiver.

Example 13 includes the apparatus of Example 12, wherein the logic is configured to receive the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.

Example 14 includes the apparatus of any of Examples 11-13, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.

Example 15 includes the apparatus of Example 14, wherein the logic configured to identify the requesting remote control device through performance of a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers and comparison of the received compressed identifiers with the hashes of the received one or more uncompressed identifiers.

Example 16 includes the apparatus of any of Examples 11-15, wherein the uncompressed identifier for the remote control device is based at least in part on a media access control (MAC) address for the remote control device.

Example 17 includes the apparatus of any of Examples 11-16, wherein the wireless receiver comprises an infrared receiver.

Example 18 includes the apparatus of any of Examples 11-17, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the remote control device using a Bluetooth protocol.

Example 19 includes a computer-implemented method for controlling a controllable device. The method includes sending, via a wireless transmitter of a computing device being configured to send non-secured signals, a non-secured pairing request to a controllable device, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the computing device, the uncompressed identifier being previously known to the controllable device. The method also includes receiving communication from the controllable device, via a wireless transceiver of the computing device and configured to facilitate send and receive of non-secured secured signals over a secure communication channel, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier. The method also includes exchanging communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.

Example 20 includes the method of Example 19, further comprising broadcasting the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.

Example 21 includes the method of Example 20, wherein broadcasting the uncompressed identifier further comprises broadcasting the uncompressed identifier in a non-secured fashion.

Example 22 includes the method of any of Examples 19-21, wherein the uncompressed identifier for the apparatus is based at least in part on a media access control (MAC) address for the apparatus.

Example 23 includes the method of any of Examples 19-22, further comprising generating, by the computing device, the compressed identifier by compression of the uncompressed identifier.

Example 24 includes the method of any of Examples 19-23, wherein the compressed identifier comprises a hash of the uncompressed identifier.

Example 25 includes the method of any of Examples 19-24, wherein the wireless transmitter comprises an infrared transmitter.

Example 26 includes the method of any of Examples 19-25, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the device using a Bluetooth protocol.

Example 27 includes the method of any of Examples 19-26, further comprising receiving, by the computing device, an indication to establish the secure communication channel from a user; and sending, by the computing device, the pairing request in response to receipt of the indication.

Example 28 includes the method of any of Examples 19-27, wherein the computing device comprises a remote control.

Example 29 includes an apparatus for controlling a controllable device. The apparatus includes means for sending, via a wireless transmitter configured to send non-secured signals, a non-secured pairing request to a controllable device, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the apparatus, the uncompressed identifier being previously known to the controllable device. The apparatus also includes means for receiving communication from the controllable device, via a wireless transceiver configured to facilitate send and receive of non-secured secured signals over a secure communication channel, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier. The apparatus also includes means for exchanging communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.

Example 30 includes the apparatus of Example 29, further comprising means for broadcasting the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.

Example 31 includes the apparatus of Example 30, wherein means for broadcasting the uncompressed identifier further comprises means for broadcasting the uncompressed identifier in a non-secured fashion.

Example 32 includes the apparatus of any of Examples 29-31, wherein the uncompressed identifier for the apparatus is based at least in part on a media access control (MAC) address for the apparatus.

Example 33 includes the apparatus of any of Examples 29-32, further comprising means for generating the compressed identifier by compression of the uncompressed identifier.

Example 34 includes the apparatus of any of Examples 29-33, wherein the compressed identifier comprises a hash of the uncompressed identifier.

Example 35 includes the apparatus of any of Examples 29-34, wherein the wireless transmitter comprises an infrared transmitter.

Example 36 includes the apparatus of any of Examples 29-35, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the device using a Bluetooth protocol.

Example 37 includes the apparatus of any of Examples 29-36, further comprising means for receiving an indication to establish the secure communication channel from a user and means for sending the pairing request in response to receipt of the indication.

Example 38 includes the apparatus of any of Examples 29-37, wherein the apparatus comprises a remote control.

Example 39 includes one or more computer-readable storage media comprising a plurality of instructions configured to cause a computing device, in response to execution of the instructions by the computing device, to control a controllable device. The instructions cause the computing device to send, via a wireless transmitter of the computing device being configured to send non-secured signals, a non-secured pairing request to a controllable device, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the computing device, the uncompressed identifier being previously known to the controllable device. The instructions also cause the computing device to receive communication from the controllable device, via a wireless transceiver of the computing device and configured to facilitate send and receive of non-secured secured signals over a secure communication channel, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier. The instructions also cause the computing device to exchange communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.

Example 40 includes the computer-readable storage media of Example 39, wherein the instructions are further configured to cause the computing device to broadcast the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.

Example 41 includes the computer-readable storage media of Example 40, wherein broadcast the uncompressed identifier further comprises broadcast the uncompressed identifier in a non-secured fashion.

Example 42 includes the computer-readable storage media of any of Examples 39-41, wherein the uncompressed identifier for the apparatus is based at least in part on a media access control (MAC) address for the apparatus.

Example 43 includes the computer-readable storage media of any of Examples 39-42, wherein the instructions are further configured to cause the computing device to generate the compressed identifier by compression of the uncompressed identifier.

Example 44 includes the computer-readable storage media of any of Examples 39-43, wherein the compressed identifier comprises a hash of the uncompressed identifier.

Example 45 includes the computer-readable storage media of any of Examples 39-44, wherein the wireless transmitter comprises an infrared transmitter.

Example 46 includes the computer-readable storage media of any of Examples 39-45, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the device using a Bluetooth protocol.

Example 47 includes the computer-readable storage media of any of Examples 39-46, wherein the instructions are further configured to cause the computing device to receive an indication to establish the secure communication channel from a user and send the pairing request in response to receipt of the indication.

Example 48 includes the computer-readable storage of any of Examples 39-47, wherein the computing device comprises a remote control.

Example 49 includes a computer-implemented method for receiving control from a remote control device. The method includes receiving, via a wireless transceiver of a computing device and configured to facilitate send and receive of secured signals over a secure communication channel, one or more uncompressed identifiers of respective remote control devices via the wireless transceiver. The method also includes receiving, via a wireless receiver of the computing device and configured to receive non-secured signals, a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device. The method also includes identifying, by the computing device, the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers. The method also includes sending communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver. The method also includes exchanging communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.

Example 50 includes the method of Example 49, further comprising receiving the one or more uncompressed identifiers via the wireless transceiver.

Example 51 includes the method of Example 50, wherein receiving the one or more uncompressed identifiers comprises receiving the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.

Example 52 includes the method of any of Examples 49-51, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.

Example 53 includes the method of Example 52, further comprising performing, by the computing device, a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers and comparing, by the computing device, the received compressed identifiers with the hashes of the received one or more uncompressed identifiers.

Example 54 includes the method of any of Examples 49-53, wherein the uncompressed identifier for the remote control device is based at least in part on a media access control (MAC) address for the remote control device.

Example 55 includes the method of any of Examples 49-54, wherein the wireless receiver comprises an infrared receiver.

Example 56 includes the method of any of Examples 49-55, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the remote control device using a Bluetooth protocol.

Example 57 includes an apparatus for receiving control from a remote control device. The apparatus includes means for receiving, via a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel, one or more uncompressed identifiers of respective remote control devices via the wireless transceiver. The apparatus also includes means for receiving, via a wireless receiver and configured to receive non-secured signals, a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device. The apparatus also includes means for identifying the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers. The apparatus also includes means for sending communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver. The apparatus also includes means for exchanging communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.

Example 58 includes the apparatus of Example 57, further comprising means for receiving the one or more uncompressed identifiers via the wireless transceiver.

Example 59 includes the apparatus of Example 58, wherein means for receiving the one or more uncompressed identifiers comprises means for receiving the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.

Example 60 includes the apparatus of any of Examples 57-59, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.

Example 61 includes the apparatus of Example 60, further comprising means for performing a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers and means for comparing the received compressed identifiers with the hashes of the received one or more uncompressed identifiers.

Example 62 includes the apparatus of any of Examples 57-61, wherein the uncompressed identifier for the remote control device is based at least in part on a media access control (MAC) address for the remote control device.

Example 63 includes the apparatus of any of Examples 57-62, wherein the wireless receiver comprises an infrared receiver.

Example 64 includes the apparatus of any of Examples 57-63, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the remote control device using a Bluetooth protocol.

Example 65 includes one or more computer-readable storage media comprising a plurality of instructions configured to cause a computing device, in response to execution of the instructions by the computing device, to receive control from a remote control device. The instructions cause the computing device to receive, via a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel, one or more uncompressed identifiers of respective remote control devices via the wireless transceiver. The instructions also cause the computing device to receive, via a wireless receiver and configured to receive non-secured signals, a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device. The instructions also cause the computing device to identify the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers. The instructions also cause the computing device to send communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver. The instructions also cause the computing device to exchange communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.

Example 66 includes the computer-readable storage media of Example 65, wherein the instructions are further configured to cause the computing device to receive the one or more uncompressed identifiers via the wireless transceiver.

Example 67 includes the computer-readable storage media of Example 66, wherein receive the one or more uncompressed identifiers comprises receive the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.

Example 68 includes the computer-readable storage media of any of Examples 65-67, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.

Example 69 includes the computer-readable storage media of Example 68, wherein the instructions are further configured to cause the computing device to perform a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers and compare the received compressed identifiers with the hashes of the received one or more uncompressed identifiers.

Example 70 includes the computer-readable storage media of any of Examples 65-69, wherein the uncompressed identifier for the remote control device is based at least in part on a media access control (MAC) address for the remote control device.

Example 71 includes the computer-readable storage media of any of Examples 65-70, wherein the wireless receiver comprises an infrared receiver.

Example 72 includes the computer-readable storage media of any of Examples 65-71, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the remote control device using a Bluetooth protocol.

Computer-readable media (including least one computer-readable media), methods, apparatuses, systems and devices for performing the above-described techniques are illustrative examples of embodiments disclosed herein. Additionally, other devices in the above-described interactions may be configured to perform various disclosed techniques.

Although certain embodiments have been illustrated and described herein for purposes of description, a wide variety of alternate and/or equivalent embodiments or implementations calculated to achieve the same purposes may be substituted for the embodiments shown and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that embodiments described herein be limited only by the claims.

Where the disclosure recites “a” or “a first” element or the equivalent thereof, such disclosure includes one or more such elements, neither requiring nor excluding two or more such elements. Further, ordinal indicators (e.g., first, second or third) for identified elements are used to distinguish between the elements, and do not indicate or imply a required or limited number of such elements, nor do they indicate a particular position or order of such elements unless otherwise specifically stated. 

What is claimed is:
 1. An apparatus comprising: a wireless transmitter configured to send non-secured signals; a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel; and logic operably coupled with the wireless transmitter and wireless transceiver and configured to: send a non-secured pairing request to the controllable device via the wireless transmitter, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the apparatus, the uncompressed identifier being previously known to the controllable device, receive communication from the controllable device, via the wireless transceiver, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier; and exchange communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.
 2. The apparatus of claim 1, wherein the logic is further configured to broadcast the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.
 3. The apparatus of claim 2, wherein the logic is further configured to broadcast the uncompressed identifier via the wireless transceiver in a non-secured fashion.
 4. The apparatus of claim 1, wherein the uncompressed identifier for the apparatus is based at least in part on a media access control (MAC) address for the apparatus.
 5. The apparatus of claim 1, wherein the logic is further configured to generate the compressed identifier by compression of the uncompressed identifier.
 6. The apparatus of claim 1, wherein the compressed identifier comprises a hash of the uncompressed identifier.
 7. The apparatus of claim 1, wherein the wireless transmitter comprises an infrared transmitter.
 8. The apparatus of claim 1, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the device using a Bluetooth protocol.
 9. The apparatus of claim 1, wherein the logic is further configured to: receive an indication to establish the secure communication channel from a user; and send the pairing request in response to receipt of the indication.
 10. The apparatus of claim 1, wherein the apparatus comprises a remote control.
 11. An apparatus comprising: a wireless receiver configured to receive non-secured signals; a wireless transceiver configured to facilitate send and receive of secured signals over a secure communication channel; logic operably coupled with the wireless receiver and wireless transceiver and configured to: receive one or more uncompressed identifiers of respective remote control devices via the wireless transceiver; receive a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device; identify the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers; send communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver; and exchange communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.
 12. The apparatus of claim 11, wherein the logic is configured to receive the one or more uncompressed identifiers via the wireless transceiver.
 13. The apparatus of claim 12, wherein the logic is configured to receive the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.
 14. The apparatus of claim 11, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.
 15. The apparatus of claim 14, wherein the logic configured to identify the requesting remote control device through: performance of a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers; and comparison of the received compressed identifiers with the hashes of the received one or more uncompressed identifiers.
 16. The apparatus of claim 11, wherein the uncompressed identifier for the remote control device is based at least in part on a media access control (MAC) address for the remote control device.
 17. The apparatus of claim 11, wherein the wireless receiver comprises an infrared receiver.
 18. The apparatus of claim 11, wherein the wireless transceiver comprises a radio frequency transceiver configured to communicate with the remote control device using a Bluetooth protocol.
 19. A computer-implemented method for controlling a controllable device, the method comprising: sending, via a wireless transmitter of a computing device being configured to send non-secured signals, a non-secured pairing request to a controllable device, wherein the pairing request includes a compressed identifier being associated with an uncompressed identifier for the computing device, the uncompressed identifier being previously known to the controllable device, receiving communication from the controllable device, via a wireless transceiver of the computing device and configured to facilitate send and receive of non-secured secured signals over a secure communication channel, to establish a secure communication channel between the controllable device and the wireless transceiver based on the controllable device identifying the apparatus based on the compressed identifier; and exchanging communication with the controllable device based on the uncompressed identifier, via the wireless transceiver and over the secure communication channel, to pair the controllable device with the apparatus to enable the apparatus to subsequently control the controllable device.
 20. The method of claim 19, further comprising broadcasting the uncompressed identifier via the wireless transceiver prior to the send of the non-secured pairing request, such that the controllable device may be aware of the uncompressed identifier.
 21. The method of claim 19, wherein the compressed identifier comprises a hash of the uncompressed identifier.
 22. A computer-implemented method for receiving control from a remote control device, the method comprising: receiving, via a wireless transceiver of a computing device and configured to facilitate send and receive of secured signals over a secure communication channel, one or more uncompressed identifiers of respective remote control devices via the wireless transceiver; receiving, via a wireless receiver of the computing device and configured to receive non-secured signals, a non-secured pairing request from a requesting remote control device of the one or more remote control devices via the wireless receiver, wherein the pairing request includes a compressed identifier associated with an uncompressed identifier for the requesting remote control device; identifying, by the computing device, the requesting remote control device based on the compressed identifier and the previously-received one or more uncompressed identifiers; sending communication to the identified remote control device, via the wireless transceiver, to establish a secure communication channel between the identified remote control device and the wireless transceiver; and exchanging communication with the identified remote control device, via the wireless transceiver and over the secure communication channel, to pair the remote control device with the apparatus to enable the identified remote control device to subsequently control the apparatus.
 23. The method of claim 22, further comprising receiving the one or more uncompressed identifiers via the wireless transceiver in a non-secured fashion.
 24. The method of claim 22, wherein the compressed identifier comprises a hash of the uncompressed identifier for the requesting remote control device.
 25. The method of claim 22, further comprising: performing, by the computing device, a hashing technique on each of the received one or more uncompressed identifiers to generate one or more hashes for the received one or more uncompressed identifiers; and comparing, by the computing device, the received compressed identifiers with the hashes of the received one or more uncompressed identifiers. 