Methods and apparatus to connect wireless-enabled devices

ABSTRACT

Examples to establish a connection between wireless-enabled devices involve collecting first biophysical signal data via a first wireless-enabled device, using the first biophysical signal data as a key to decrypt encrypted information received from a second wireless-enabled device to recover first information, and establishing a wireless connection between the first wireless-enabled device and the second wireless-enabled device based on a comparison of the first information and second information stored in the first wireless-enabled device.

RELATED APPLICATIONS

This patent arises from a continuation of U.S. patent application Ser.No. 13/635,326, filed on Sep. 14, 2012, which is a national phase entryof PCT/US11/25720, filed on Feb. 22, 2011, both of which are herebyincorporated herein by reference in their entireties.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to mobile communication devicesand, more particularly, to methods and apparatus to connectwireless-enabled devices.

BACKGROUND

Wireless radio communication technologies are used in many devices toenable such devices to establish wireless connections with one another.Such wireless radio communication technologies include Bluetooth®wireless technology, IEEE® 802.11 wireless technology, and otherwireless technologies capable of short-range wireless connections. Knowntechniques for establishing wireless connections between devicestypically require users to enter passwords or pass codes and/or performother user entry operations prior to making a successful connection toensure that the connection is intended and that the user is aware of andconsents to the connection being established. For example, synching orpairing of phones, smart phones, or other devices over wirelessconnections (e.g., Bluetooth® wireless connections) using knowntechniques involves a user-driven process in which a user is heavilyinvolved throughout the process of establishing a connection. Forexample, user involvement in such known techniques for enablingBluetooth® radios and/or other wireless technology radios to synch orconnect mobile devices typically require users to activate aconnecting/pairing process, initiate discovery of devices, and selectdiscovered devices with which to connect. After a user has successfullynavigated through several graphical user interfaces, provided thecorrect information, and made a number of selections, a wirelessconnection between two devices may be established.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an example manner of using bio-certification processes toestablish wireless connections between wireless-enabled devices.

FIG. 2 depicts an example wireless-enabled device of FIG. 1 configuredto establish wireless connections with other wireless-enabled devicesbased on a bio-certification process.

FIG. 3 depicts an example graphical user interface for use with theexample wireless-enabled device of FIGS. 1 and 2 to setup thewireless-enabled device for using a bio-certification process toestablish wireless connections with other wireless-enabled devices.

FIG. 4 depicts an example graphical user interface for displaying amessage via the example wireless-enabled device of FIGS. 1 and 2requesting user-confirmation to establish a wireless connection withanother wireless-enabled device.

FIG. 5 depicts an example apparatus to enable the examplewireless-enabled device of FIGS. 1 and 2 to establish wirelessconnections based on bio-certification processes.

FIG. 6 depicts an example block diagram of the wireless-enabled deviceof FIGS. 1 and 2.

FIGS. 7A and 7B depict an example flow diagram representative ofcomputer readable instructions that may be used to initiate abio-certification process to establish a wireless connection between twowireless-enabled devices.

FIGS. 8A and 8B depict an example flow diagram representative ofcomputer readable instructions that may be used to receive a requestfrom a wireless-enabled device to establish a wireless connection basedon a bio-certification process.

DETAILED DESCRIPTION

Although the following discloses example methods, apparatus, andarticles of manufacture including, among other components, softwareexecuted on hardware, it should be noted that such methods, apparatus,and articles of manufacture are merely illustrative and should not beconsidered as limiting. For example, it is contemplated that any or allof these hardware and software components could be embodied exclusivelyin hardware, exclusively in software, exclusively in firmware, or in anycombination of hardware, software, and/or firmware. Accordingly, whilethe following describes example methods, apparatus, and articles ofmanufacture, persons having ordinary skill in the art will readilyappreciate that the examples provided are not the only way to implementsuch methods, apparatus, and articles of manufacture.

It will be appreciated that for simplicity and clarity of illustration,where considered appropriate, reference numerals may be repeated amongthe figures to indicate corresponding or analogous elements. Inaddition, numerous specific details are set forth in order to provide athorough understanding of example embodiments disclosed herein. However,it will be understood by those of ordinary skill in the art that exampleembodiments disclosed herein may be practiced without these specificdetails. In other instances, well-known methods, procedures andcomponents have not been described in detail so as not to obscureexample embodiments disclosed herein. Also, the description is not to beconsidered as limiting the scope of example embodiments disclosedherein.

Example methods, apparatus, and articles of manufacture are disclosedherein in connection with wireless-enabled devices, which may be anymobile communication device, mobile computing device, or any otherelement, entity, device, or service capable of communicating wirelessly.Mobile devices, also referred to as terminals, wireless terminals,mobile stations, communication stations, or user equipment (UE), mayinclude mobile smart phones (e.g., BlackBerry® smart phones), wirelesspersonal digital assistants (PDA), laptop/notebook/netbook computerswith wireless adapters, etc. Example methods, apparatus, and articles ofmanufacture are disclosed herein in connection with Bluetooth® wirelesscommunication technologies. However, such disclosed example methods,apparatus, and articles of manufacture may additionally or alternativelybe implemented in connection with other wireless communication standardsincluding the wireless local area network (WLAN) communication standardknown as IEEE® 802.11, ZIGBEE® radio technology, wireless USB radiotechnology, and ultra-wideband (UWB) radio technology, or any other WLANstandards or personal area network (PAN) standards.

Example methods, apparatus, and articles of manufacture disclosed hereinmay be used to securely establish connections between devices based onbio-certification processes. Such example methods, apparatus, andarticles of manufacture enable securely connecting two wireless-enableddevices by using biophysical signals generated by a person to confirmthat both devices are in contact with the same person and, thus, withincontrol of the same user. That is, known techniques require users toenter passwords and/or perform other user entry operations prior tomaking a successful connection to ensure that the connection is intendedand that the user is aware of and consents to the connection beingestablished. For example, synching or pairing of phones, smart phones,or other devices over wireless connections (e.g., Bluetooth® wirelessconnections) using known techniques involves a cumbersome user-drivenprocess. User involvement in such known techniques for enablingBluetooth® radios and/or other wireless technology radios to synch orconnect mobile devices typically require users to activate aconnecting/pairing process, initiate discovery of devices, and selectdiscovered devices with which to connect. Such known connectionprocesses burden users with a steep learning curve to understand how toproperly navigate user interfaces and enter correct information (e.g.,pass codes, device selections, etc.) to successfully establishdevice-to-device connections.

Unlike such known techniques that require much user involvement prior tomaking successful connections, example methods, apparatus, and articlesof manufacture disclosed herein enable connections between devices basedon those devices being in physical contact with the same person. Thatis, two devices in physical contact with the same person record and/ormeasure a biophysical signal of the person and compare collectedbiophysical signal data to confirm that the devices are actually incontact with the same person (e.g., being held by or worn by the sameperson). After both devices confirm that they have detected and/ormeasured the same biophysical signal, the devices can establish aconnection between one another to transfer information therebetween(e.g., transfer files, exchange messages, stream audio and/or video,share an internet connection, etc.).

Example techniques disclosed herein enable users to use an intuitive,one-step or minimal-step process to establish device-to-deviceconnections while allowing users to maintain control of specifyingdevices with which connections are permitted and when such connectionsare permitted. Example techniques disclosed herein also enable devicesto be available at all times for establishing a connection in a securemanner. In this manner, operations such as synchronizing, exchanging,transferring, and/or streaming data can be automated without requiringusers to perform a cumbersome manually-driven process to establishconnections. Comparing collected biophysical signal data to confirm thatconnections can be made is referred to herein as bio-certification. Suchbio-certification enables certifying that the same user is in control oftwo or more devices seeking to establish a connection(s) between oneanother.

FIG. 1 depicts an example manner of using example bio-certificationprocesses to establish wireless connections between wireless-enableddevices. In the illustrated example, a person 100 holds examplewireless-enabled mobile devices 102 and 104 and wears examplewireless-enabled headphones 106. As discussed in detail below, theexample wireless-enabled devices 102, 104, and 106 are configured to useexample bio-certification processes disclosed herein to establishwireless connections between one another.

In the illustrated example of FIG. 1, bio-certification processes use aheart rate generated by a beating heart 108 of the person 100. As theheart 108 pumps blood through the body of the person 100, biophysicalsignals 110 in the form of a heart pulse are generated by and travelthrough the body of the person 100. Such biophysical signals 110 can bedetected and/or measured using sensors (e.g., biophysical signalsensors, biometric sensors, etc.). In the illustrated example of FIG. 1,each of the wireless-enabled devices 102, 104, and 106 is provided witha respective sensor to detect the biophysical signals 110 andcollect/store biophysical signal data based on those biophysical signals110. The wireless-enabled devices 102, 104, and 106 can then exchangethe collected biophysical signal data and perform comparisons betweenreceived biophysical signal data and their locally collected biophysicalsignal data to determine whether such data matches to enableestablishing wireless connections between one another.

As shown in the illustrated example of FIG. 1, the wireless-enableddevice 102 can detect the biophysical signals 110 of the person 100 andcollect biophysical signal data 112 to initiate a bio-certificationprocess to establish a wireless connection 114 with the wireless-enableddevice 104. In the illustrated example, the biophysical signal data 112is a heart rate or heart frequency calculated by the wireless-enableddevice 102. Additionally or alternatively, the biophysical signal data112 may be a heartbeat wavelength or some other pattern(s) or number(s)calculated based on the pumping action of the heart 108. In someexamples, the biophysical signal data 112 may be related to, based on,or otherwise indicative of other characteristics of the person 110 suchas blood pressure, body temperature, etc.

To request the wireless connection 114, the wireless-enabled device 102broadcasts or otherwise sends the biophysical signal data 112 to thewireless-enabled device 104 via a broadcast channel or any othersuitable communication channel (e.g., an open communication channel)prior to establishing the wireless connection 114. When thewireless-enabled device 104 receives the biophysical signal data 112, itcompares the biophysical signal data 112 to locally collectedbiophysical signal data 113 collected by the wireless-enabled device 104based on its operations of detecting the biophysical signals 110. Whenthe wireless-enabled device 104 confirms that the biophysical signaldata 112 matches (or substantially matches within a difference thresholdrange defined by, for example, a matching score range or threshold) itslocally collected biophysical signal data 113, the wireless-enableddevice 104 can accept the request from the wireless-enabled device 102to establish the wireless connection 114. A similar process can be usedto establish a wireless connection between one or both of thewireless-enabled devices 102 and/or 104 and the wireless-enabledheadphones 106. For example, the wireless-enabled headphones 106 may beprovided with sensors to detect the biophysical signals 110 at an earregion of the person 100. In some examples, to establish wirelessconnections, the wireless-enabled devices 102, 104, and 106 send theirrespective biophysical signal data (e.g., the biophysical signal data112 and 113) to a central location (e.g., another device or a server).The biophysical signal data can then be compared at the central location(rather than at the wireless-enabled devices that collected thebiophysical signal data) to confirm whether a match (or substantialmatch) is found. Comparison results or any other indications of whethera wireless connection can be established can then be communicated backto the wireless-enabled devices.

In the illustrated example, one or more of the wireless-enabled devices102, 104, and 106 can initiate a request to establish a wirelessconnection (e.g., the wireless connection 114) based on a user-input(e.g., a user depressing a hardware button on a respective device or asoft icon displayed by a respective device) or based on a user (e.g.,the person 100) coming into physical contact therewith. For example, anyof the wireless-enabled devices 102, 104, and 106 may automaticallybegin a bio-certification process in response to detecting a biophysicalsignal 110 of the person 100 (e.g., when the person 100 picks up or putson the wireless-enabled device). In some examples, the wireless-enableddevices 102, 104, and 106 may be configurable to initiatebio-certification processes based on automatic detection of biophysicalsignals 110 or based on user-input(s) requesting to initiate thebio-certification processes.

In the illustrated example, the wireless connection 114 remainsestablished until the person 110 releases one or both of thewireless-enabled devices 102 and 104. In some examples, the wirelessconnection 114 may remain established until a requested data transfer(e.g., a file transfer) or media stream is finished. In such examples,the wireless connection 114 may be re-established via abio-certification process each time a new data transfer (e.g., a filetransfer) or media stream is requested.

In the illustrated example, the wireless-enabled devices 102 and 104 mayestablish the wireless connection 114 using Bluetooth® wirelesstechnology, Institute of Electrical and Electronics Engineers (IEEE®)802.11 wireless technology, or any other wireless technology suitablefor connecting devices. In addition, although the example of FIG. 1shows the wireless-enabled device 102 connecting to the wireless-enableddevice 104, example techniques disclosed herein may also be used toestablish wireless connections between any one or more of thewireless-enabled device 102, the wireless-enabled device 104, and/or thewireless-enabled headphones 106 and any other device not shown. Suchother wireless-enabled devices may be tablet computing devices (e.g.,the Research In Motion® BlackBerry® PlayBook™ tablet), personalcomputers, printers, projectors, or any other wireless-enabled device.Any such wireless-enabled device may be provided with a sensor tocontact or engage a person (e.g., the person 100) for detecting abiophysical signal (e.g., the biophysical signals 110) of the person foruse in establishing wireless connections (e.g., the wireless connection114) with other devices as disclosed herein. Sensors for detectingbiophysical signals may be integrally formed with a housing of awireless-enabled device or may be attachable as a peripheral to awireless-enabled device. For example, a desktop or laptop personalcomputer may have a sensor connected thereto via a universal serial bus(USB) connection or other wired or wireless connection.

In the illustrated example, the wireless-enabled devices 102, 104, and106 beneficially use instant or currently measured biophysical signaldata (e.g., the biophysical signal data 112) to enable establishingwireless connections (e.g., the wireless connection 114) instead ofusing previously measured and stored biophysical signal data.Configuring the wireless-enabled devices 102, 104, and 106 to useinstant or currently measured biophysical signal data to compare toreceived biophysical signal data (e.g., the biophysical signal data 112)measured at and received from other devices increases the likelihoodthat two wireless-enabled devices held by or in contact with the sameperson (e.g., the person 100) will produce biophysical signal dataresulting in an exact or near-exact match. For example, for instances inwhich the biophysical signal data 112 is based on heart-related signals(e.g., electrocardiogram (EKG) signals, heart rate, etc.) of the person100, comparing current heart-related signal data with previouslymeasured and stored heart-related signal data is more likely to producenon-matching results because a person's heart rate can fluctuatesignificantly over time. Thus, although not necessary, the examplewireless-enabled device 102 of the illustrated example of FIG. 1measures and collects instant or current biophysical signal data (e.g.,the biophysical signal data 112) of the person 100 and sends the same tothe wireless-enabled device 104. The wireless-enabled device 104 alsomeasures and collects instant or current biophysical signal data of theperson 100 and compares the locally collected biophysical signal data113 with the received biophysical signal data 112 to determine whetherthe same person 100 is holding (and, thus, in control of) both of thewireless-enabled devices 102 and 104.

In some examples, wireless-enabled devices (e.g., the wireless-enableddevices 104 and/or 106) receiving a request to establish a wirelessconnection (e.g., the wireless connection 114) may compare receivedbiophysical signal data (e.g., the biophysical signal data 112) withlocally stored historical biophysical signal data rather thaninstantaneous or currently collected biophysical signal data such as thelocally collected biophysical signal data 113. In such some examples,the historical biophysical signal data may be stored in association withlocation and time tags indicating a location at which a wireless-enableddevice (e.g., the wireless-enabled device 104 or 106) was located whenthe historical biophysical signal data was collected and a time of daywhen the data was collected. In this manner, the wireless-enabled devicemay store multiple sets of historical biophysical signal data, eachtagged with corresponding location and time tags. When anotherwireless-enabled device (e.g., the wireless-enabled device 102) sends arequest for connection it sends current biophysical signal data (e.g.,the biophysical signal data 112) reflective of a person's current heartrate along with location and time tags indicating a current location ofthe wireless-enabled device and a current time of day. In this manner, awireless-enabled device (e.g., the wireless-enabled device 104 or 106)receiving the request for connection and the current biophysical signaldata can use the received location and time tags to retrieve storedhistorical biophysical signal data having the same (or substantially thesame within an acceptable tolerance or threshold) location and timetags. By retrieving historical biophysical signal data associated withthe same location and time tags, there is a greater likelihood that theretrieved historical biophysical signal data will match (orsubstantially match) the current biophysical signal data received fromthe wireless-enabled device requesting a connection so long as thecurrent biophysical signal data is collected from the same person fromwhich the historical biophysical signal data was collected. That is, theperson's heart rate will likely be influenced by the same environmentalfactors when the person is located at the same location (e.g., work,home, a gym, a shopping center, a coffee shop, a retail establishment,etc.) at the same time of day. Thus, the person's heart rate on anygiven day at a particular location at a particular time of day will beexpected to vary by only some small amount, if at all, from that sameperson's heart rate on any prior day at the same location and time whenhistorical biophysical signal data was collected. In some examples,multiple sets of historical biophysical signal data collected ondifferent days could be averaged (or processed using some othermathematical/statistical operation) to form a standard or averagehistorical biophysical signal data for a particular time and location.In such some examples, an acceptable variation can be determined basedon the average variation between multiple, separate historicalbiophysical signal data for a particular time and location. Theacceptable variation can then be used to form a tolerance or thresholdmatching score that indicates an acceptable substantial match betweencurrent biophysical signal data and historical biophysical signal data.If at any subsequent time a wireless connection cannot be establisheddue to the current biophysical signal data varying from the historicalbiophysical signal data by more than the determined acceptablevariation, one or both of the wireless-enabled devices sought to bewirelessly connected can be configured to display icons on a graphicaluser interface that are selectable by the user to suggest activitiesthat would affect the user's current heart rate (or a heart waveformsuch as an EKG waveform) to match the historical biophysical signaldata. In this manner, a person's current biophysical signal data canmatch (or sufficiently match) that same person's stored historicalbiophysical signal data to allow establishing a wireless connectionbetween wireless-enabled devices.

FIG. 2 depicts the example wireless-enabled device 102 of FIG. 1configured to establish wireless connections (e.g., the wirelessconnection 114 of FIG. 1) with other wireless-enabled devices (e.g., oneor both of the wireless-enabled devices 104 and 106 of FIG. 1) based ona bio-certification process as discussed above in connection withFIG. 1. In the illustrated example of FIG. 1, the wireless-enableddevice 102 is depicted as a smart phone. However, the structures andfeatures disclosed in connection with FIG. 2 to enable performingbio-certification processes may be implemented in connection with othertypes of wireless-enabled devices.

As shown in FIG. 2, the wireless-enabled device 102 is provided with asensor 202 to detect the biophysical signals 110 of the person 100 shownin FIG. 1. In the illustrated example, the sensor 202 is configured tocontact or engage one or more fingers of the person 100 and/or the palmof a hand of the person 100 when the person 100 holds thewireless-enabled device 102. Such surface contact with the person 100facilitates detecting and measuring the biophysical signals 110 via thesensor 202. The example sensor 202 of FIG. 2 is connected to one or morecircuits in the wireless-enabled device 102 that enable thewireless-enabled device 102 to measure the biophysical signals 110 andcollect the biophysical signal data 112 (FIG. 1) based on thebiophysical signals 110. In some examples, the wireless-enabled device102 may be configured to automatically detect the biophysical signals110 and automatically begin a bio-certification process in response to auser grabbing, holding, or wearing the wireless-enabled device 102 orotherwise physically contacting the sensor 202.

Although the sensor 202 is shown as protruding from the wireless-enableddevice 102, in other examples, the sensor 202 may be flat, seamless,and/or unitarily formed with the housing 206. In some examples, thesensor 202 may be a substantially large portion of a surface area of thehousing 206 to enable contacting a relatively larger surface area of theperson 100. In some examples, the wireless-enabled device 102 may beprovided with multiple sensors substantially similar or identical to thesensor 202 to facilitate measuring and collecting biophysical signaldata 112 based on various techniques employed by the person 100 or anyother person for holding or wearing the wireless-enabled device 102.Sensors substantially similar to the sensor 202 of FIG. 2 may be adaptedfor use in connection with wireless-enabled devices that are wearablesuch as the wireless-enabled headphones 106 of FIG. 1. For example,sensors for wearable wireless-enabled devices may be structured andlocated on the devices in configurations that facilitate contact withbody parts or body locations of users at which biophysical signals(e.g., the biophysical signals 110 of FIG. 1) can be detected.

Also shown in FIG. 2, the wireless-enabled device 102 is provided with ahardware button 204 (e.g., a convenience key that is user-programmableto start a particular process or application) located on and/orprotruding from a housing 206 of the wireless-enabled device 102. Thewireless-enabled device 102 is also shown displaying an icon 208 on adisplay 210 of the wireless-enabled device 102. In the illustratedexample of FIG. 2, the hardware button 204 and the icon 208 areconfigured to receive user inputs to initiate bio-certificationprocesses to establish wireless connections (e.g., the wirelessconnection 114 of FIG. 1) as described above in connection with FIG. 1.For example, when in physical contact with the sensor 202, the person100 (FIG. 1) may depress the button 204 or select the icon 208 toinitiate a bio-certification process during which the wireless-enableddevice 102 measures and collects the biophysical signal data 112 via thesensor 202 based on the biophysical signals 110 of FIG. 1. In someexamples, the wireless-enabled device 102 may be provided with only oneof the button 204 or the icon 208 to initiate bio-certificationprocesses.

FIG. 3 depicts an example bio-certification setup graphical userinterface (GUI) 300 for use with the example wireless-enabled device 102of FIGS. 1 and 2 to setup the wireless-enabled device 102 for using abio-certification process to establish wireless connections (e.g., thewireless connection 114 of FIG. 1) with other wireless-enabled devices(e.g., the wireless-enabled devices 104 and 106 of FIG. 1). In theillustrated example, the bio-certification setup GUI 300 is providedwith an approved-devices setup display area 302 and a user-confirmationsetup display area 304. In the illustrated example, the approved-devicessetup display area 302 enables users to specify devices with which thewireless-enabled device 102 may establish wireless connections (e.g.,the wireless connection 114 of FIG. 1) using bio-certificationprocesses. In the example of FIG. 3, a user has specified that thewireless-enabled device 102 may use bio-certification processes toestablish wireless connections with a tablet device, headphones, acomputer, a second phone, a watch, a car, an appliance. In otherexamples, fewer of the devices listed in FIG. 3 may be selected orapproved by a user.

In the illustrated example, the user-confirmation setup display area 304enables users to specify devices that require user-confirmation beforesuccessfully establishing wireless connections (e.g., the wirelessconnection 114 of FIG. 1) between the wireless-enabled device 102 andsuch devices specified in the user-confirmation setup display area 304.In the illustrated example of FIG. 3, a user has specified thatuser-confirmation is required before establishing a wireless connectionwith a ‘computer,’ a ‘second phone,’ and an ‘appliance,’ whileuser-confirmation is not required for a ‘tablet device,’ ‘headphones,’ a‘watch,’ or a ‘car.’

According to the user-specified setup shown in the user-confirmationsetup display area 304, a bio-certification process between thewireless-enabled device 102 and the computer may be initiated, but willresult in successfully establishing a wireless connection only ifmatching (or substantially matching) biophysical signal data is foundand if a user confirms that the wireless connection may be established.For devices not requiring user-confirmation based on theuser-confirmation setup display area 304 of FIG. 3, such devices canestablish a wireless connection setup with the wireless-enabled device102 without user confirmation. Thus, a bio-certification process betweenthe wireless-enabled device 102 and the ‘tablet device’ listed in theuser-confirmation setup display area 304 will result in successfullyestablishing a wireless connection if matching (or substantiallymatching) biophysical signal data is found without needing to receiveuser confirmation that the wireless connection may be established.

While the devices listed in FIG. 3 are indicated by generic device typenames, in other examples the devices listed in FIG. 3 may be indicatedby more specific identifiers (e.g., identifiers to uniquely identifyparticular devices discovered by the wireless-enabled device 102). Forexample, instead of ‘tablet device’, a unique identifier may be ‘Joe'sBlackBerry® PlayBook™’ and instead of ‘appliance’, a unique identifiermay be ‘family room television’ or ‘Acme-brand television.’

FIG. 4 depicts an example GUI message 400 to be displayed via theexample wireless-enabled device 102 of FIGS. 1 and 2 (or any otherwireless-enabled device) requesting user-confirmation to establish awireless connection with another wireless-enabled device (e.g., thewireless-enabled device 104 or the wireless-enabled headphones 106 ofFIG. 1). In the illustrated example of FIG. 4, the GUI message 400requests a user to confirm whether the wireless-enabled device canproceed with establishing a wireless connection (e.g., the wirelessconnection 114 of FIG. 1) with a computer. In some examples, thewireless-enabled device 102 displays the GUI message 400 of theillustrated example (or a similar GUI message) in response to receivingan acknowledgement from the discovered wireless-enabled device thatbiophysical signal data collected at the discovered wireless-enableddevice matches (or substantially matches) biophysical signal data (e.g.,the biophysical signal data 112 of FIG. 1) collected at thewireless-enabled device 102. If a user (e.g., the person 100 of FIG. 1)selects a ‘YES’ option 402 of the GUI message 400, the wireless-enableddevice 102 and the discovered wireless-enabled device establish awireless connection therebetween (provided matching (or substantiallymatching) biophysical signal data is found between the twowireless-enabled devices). If the user selects a ‘NO’ option 404 of theGUI message 400, a wireless connection is not established between thewireless-enabled device 102 and the discovered wireless-enabled device.

FIG. 5 depicts an example apparatus 500 to enable the examplewireless-enabled device 102 (and/or the wireless-enabled devices 104and/or 106) of FIGS. 1 and 2 to establish wireless connections (e.g.,the wireless connection 114 of FIG. 1) based on bio-certificationprocesses. In some examples, the apparatus 500 of the illustratedexample may be implemented using the example processor system describedbelow in connection with FIG. 6. In the illustrated example of FIG. 5,the apparatus 500 is provided with a configuration data store 502, aconnection arbiter 504, a biophysical signal data collector 506, acomparator 508, one or more communication interface(s) 510, and anencryption codec 512. The configuration data store 502, the connectionarbiter 504, the biophysical signal data collector 506, the comparator508, the communication interface(s) 510, and/or the encryption codecs512 may be implemented using any desired combination of hardware,firmware, and/or software. For example, one or more integrated circuits,discrete semiconductor components, and/or passive electronic componentsmay be used. Thus, for example, the configuration data store 502, theconnection arbiter 504, the biophysical signal data collector 506, thecomparator 508, the communication interface(s) 510, and/or theencryption codec 512 or parts thereof, could be implemented using one ormore circuit(s), programmable processor(s), application specificintegrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)),field programmable logic device(s) (FPLD(s)), etc. The configurationdata store 502, the connection arbiter 504, the biophysical signal datacollector 506, the comparator 508, the communication interface(s) 510,and/or the encryption codec 512 or parts thereof, may be implementedusing instructions, code, and/or other software and/or firmware, etc.stored on a machine accessible medium and executable by, for example, aprocessor (e.g., the main processor 602 of FIG. 6). When any of theappended claims are read to cover a purely software implementation, atleast one of the configuration data store 502, the connection arbiter504, the biophysical signal data collector 506, the comparator 508, thecommunication interface(s) 510, or the encryption codec 512 is herebyexpressly defined to include a tangible medium such as a solid statememory, a magnetic memory, a DVD, a CD, etc.

Turning in detail to FIG. 5, the apparatus 500 is provided with theconfiguration data store 502 to store user-specified preferencesassociated with using bio-certification processes to connect with otherwireless-enabled devices. In the illustrated example, the configurationdata store 502 stores preferences specified by a user via thebio-certification setup GUI 300 of FIG. 3. Additionally oralternatively, the configuration data store 502 may store preferencesspecified by a user through means other than the bio-certification setupGUI 300. Such other means include one or more of, for example, otherGUIs displayable by the wireless-enabled device 102, a computer capableof communicating with the wireless-enabled device 102, a web page, orany other suitable device and/or interface.

To determine whether wireless connections (e.g., the wireless connection114 of FIG. 1) are allowable and/or can be established, the apparatus500 of the illustrated example is provided with the connection arbiter504. In the illustrated example, the connection arbiter 504 accesses theconfiguration data store 502 to determine which devices (e.g., deviceslisted in the bio-certification setup GUI 300) a user has specified asapproved for bio-certification and which devices the user has approvedfor automatically establishing wireless connections without requiringuser confirmation. During a bio-certification process, thewireless-enabled device 102 performs a discovery process to find otherwireless-enabled devices within communication proximity. When thewireless-enabled device 102 receives identities of nearby discovereddevices, the connection arbiter 504 compares the discovered devices withdevices approved for bio-certification in the configuration data store502.

The connection arbiter 504 also analyzes comparison results of locallycollected biophysical signal data (e.g., the locally collectedbiophysical signal data 113 of FIG. 1) with biophysical signal data(e.g., the biophysical signal data 112 of FIG. 1) received from anotherwireless-enabled device. In this manner, if the connection arbiter 504determines that the two sets of data match or substantially match, theconnection arbiter 504 allows the bio-certification process to proceed.In the illustrated example, a substantial match occurs when twobiophysical signal data sets match within an acceptable tolerance orthreshold based on a matching score associated with the comparedbiophysical signal data. In the illustrated example, the connectionarbiter 504 stores or can access a stored matching score thresholdindicative of a worst-case inexact match for which the connectionarbiter 504 can approve establishing a wireless connection. In someexamples, one or more matching score threshold(s) can be defined by auser, a device manufacturer, or a telecommunication system networkoperator to indicate worst-case inexact matches for which the connectionarbiter 504 can allow establishing of wireless connections. In someexamples, matching score thresholds are stored in the configuration datastore 502. In addition, respective matching score thresholds may bespecified for different devices (e.g., the devices listed in thebio-certification setup GUI 300 of FIG. 3).

In addition, while performing a bio-certification process with anapproved device and prior to successfully establishing a wirelessconnection, the connection arbiter 504 checks the configuration datastore 502 to determine whether user-confirmation is required for theparticular approved device before establishing the wireless connection.If user-confirmation is required, the connection arbiter 504 does notallow or permit establishing of the wireless connection until it hasreceived user confirmation to allow the wireless connection. Such userconfirmation may be solicited and received via the GUI message 400 ofFIG. 4.

To collect biophysical signal data (e.g., the biophysical signal data112 of FIG. 1), the apparatus 500 of the illustrated example is providedwith the biophysical signal data collector 506. In the illustratedexample, the biophysical signal data collector 506 is in communicationwith a sensor (e.g., the sensor 202) configured to engage or contact aperson (e.g., the person 100 of FIG. 1) at a location on the person'sbody that provides access to detecting biophysical signals (e.g., thebiophysical signals 110 of FIG. 1) of the person. The biophysical signaldata collector 506 of the illustrated example receives signals (e.g.,electrical signals) from the sensor 202 representative of thebiophysical signals 110, translates or converts the signals into adigital format, and measures the digital signals to collect biophysicalsignal data (e.g., the biophysical signal data 112 of FIG. 1). In theillustrated example, the biophysical signal data collector 506 analyzesthe digital signals to determine a heart pulse rate or frequency. Thebiophysical signal data collector 506 then uses the heart pulse rate orfrequency as the biophysical signal data 112. In some examples, thebiophysical signal data collector 506 may collect heart beat waveforms(e.g., EKG waveforms) and use such waveforms as the biophysical signaldata 112. In yet other examples, the biophysical signal data collector506 may determine, form, or generate any other type of data (e.g.,amplitudes of maximum or minimum heart beat pulses, quantity of maximumor minimum heart beat pulses above/below a threshold, encrypted or hashor random values using heart rates as seed values or keys or basevalues, etc.) based on the digital form of the detected biophysicalsignals 110 to generate the biophysical signal data 112 for purposes ofperforming comparisons during bio-certification processes.

To compare locally collected biophysical signal data (e.g., the locallycollected biophysical signal data 113 of FIG. 1) to biophysical signaldata (e.g., the biophysical signal data 112 of FIG. 1) received fromother wireless-enabled devices, the apparatus 500 of the illustratedexample is provided with a comparator 508. In the illustrated example,the comparator 508 is configured to compare heart pulse rate orfrequency data. Additionally or alternatively, the comparator 508 may beconfigured to compare any other type of data that is represented inbiophysical signal data (e.g., the biophysical signal data 112) and mayinvolve comparisons of values and/or comparisons of patterns orwaveforms. Such other data may be, for example, heart beat waveforms(e.g., EKG waveforms), amplitudes of maximum or minimum heart beatpulses, quantity of maximum or minimum heart beat pulses above/below athreshold, encrypted or random values using heart rates as seed or basevalues, etc.

In the illustrated example of FIG. 5, the comparator 508 determines amatching score indicative of how comparatively close two compared dataare to one another. For example, the comparator 508 of the illustratedexample generates a match score of one (1) for an exact match betweentwo compared biophysical signal data and produces match scores of lessthan one (1) for inexact matches. In the illustrated example, thecomparator 508 sends match scores to the connection arbiter 504, and theconnection arbiter 504 compares the match scores to a match scorethreshold indicative of a worst-case inexact match for which theconnection arbiter 504 can approve establishing a wireless connection.

In the illustrated example, the apparatus 500 is provided with one ormore communication interface(s) 510 via which wireless connections(e.g., the wireless connection 114 of FIG. 1) are established. In theillustrated example, the communication interface(s) 510 are wireless.Example wireless communication technologies that may be employed toimplement the one or more communication subsystem(s) 1012 include, forexample, IEEE® 802.11 radio technology, BLUETOOTH® radio technology,ZIGBEE® radio technology, wireless USB radio technology, andultra-wideband (UWB) radio technology. Although example methods,apparatus, and articles of manufacture are disclosed herein inconnection with establishing wireless connections, such as the wirelessconnection 114, between devices, such example methods, apparatus, andarticles of manufacture disclosed herein may be similarly used toestablish wired connections between devices based on bio-certificationprocesses. In such examples, the communication interface(s) 510 mayinclude one or more wired communication interfaces.

In some examples, the apparatus 500 is provided with the encryptioncodec 512 to generate, encipher or code hash values based on biophysicalsignal data (e.g., the biophysical signal data 112 of FIG. 1) to send toother wireless-enabled devices for establishing wireless connectionsbased on bio-certification. The encryption codec 512 also enables theapparatus 500 to decode or decipher hash values received from otherwireless-enabled devices based on locally collected biophysical signaldata (e.g., the locally collected biophysical signal data 113 of FIG.1). In such examples, the encryption codec 512 at the wireless-enableddevice 102 of FIG. 1 uses the biophysical signal data 112 collected atthe wireless-enabled device 102 as a private key to generate a hash ofpublic or shared information (e.g., a value or information that is knownto all wireless-enabled devices). The wireless-enabled device 102 thenbroadcasts the hash to all wireless-enabled devices in communicationrange. The wireless-enabled device 104 receives the broadcast hash anduses its encryption codec (which is substantially similar or identicalto the encryption codec 512 of FIG. 5) to decode or decipher thereceived hash using the locally collected biophysical signal data 113 ofFIG. 1 as the private key. If the biophysical signal data 112 and thelocally collected biophysical signal data 113 corresponding to the sameperson as shown in FIG. 1, the private key used to decode the hash atthe wireless-enabled device 104 is the same or substantially the same asthe private key used to encode the hash at the wireless-enabled device102. Thus, when the wireless-enabled device 104 decodes the hash, itwill recover the same public or shared information. The wireless-enableddevice 104 can then use its comparator (which is substantially the sameor identical to the comparator 508) to compare the recovered informationto its locally stored public or shared information to confirm a match. Aconfirmed match informs a connection arbiter 504 of the wireless-enableddevice 104 that a wireless connection (e.g., the wireless connection 114of FIG. 1) is allowed or permissible.

FIG. 6 depicts a block diagram of an example implementation of aprocessor system that may be used to implement the wireless-enableddevice 102. Although the processor system of FIG. 6 is described asimplementing the wireless-enabled device 102, a processor systemidentical or similar to the processor system depicted in FIG. 6 may beused to implement the wireless-enabled device 104 of FIG. 1, thewireless-enabled headphones 106 of FIG. 1, and/or the apparatus 500 ofFIG. 5. In the illustrated example, the wireless-enabled device 102 is atwo-way communication device with advanced data communicationcapabilities including the capability to communicate with otherwireless-enabled devices or computer systems through a network oftransceiver stations. The wireless-enabled device 102 may also have thecapability to allow voice communication. Depending on the functionalityprovided by the wireless-enabled device 102, it may be referred to as adata messaging device, a two-way pager, a cellular telephone with datamessaging capabilities, a smart phone, a wireless Internet appliance, ora data communication device (with or without telephony capabilities). Toaid the reader in understanding the structure of the wireless-enableddevice 102 and how it communicates with other devices and host systems,FIG. 6 will now be described in detail.

Referring to FIG. 6, the wireless-enabled device 102 includes a numberof components such as a main processor 602 that controls the overalloperation of the wireless-enabled device 102. In the illustratedexample, the sensor 202 and the button (convenience key) 204 describedabove in connection with FIG. 2 are connected to the main processor 602.Communication functions, including data and voice communications, areperformed through a communication subsystem 604. The communicationsubsystem 604 receives messages from and sends messages to a wirelessnetwork 605. In the illustrated example of the wireless-enabled device102, the communication subsystem 604 is configured in accordance withthe Global System for Mobile Communication (GSM) and General PacketRadio Services (GPRS) standards. The GSM/GPRS wireless network is usedworldwide and it is expected that these standards will be supersededeventually by Enhanced Data GSM Environment (EDGE) and Universal MobileTelecommunications Service (UMTS). New standards are still beingdefined, but it is believed that they will have similarities to thenetwork behavior described herein, and it will also be understood bypersons skilled in the art that the example implementations describedherein are intended to use any other suitable standards that aredeveloped in the future. The wireless link connecting the communicationsubsystem 604 with the wireless network 605 represents one or moredifferent Radio Frequency (RF) channels, operating according to definedprotocols specified for GSM/GPRS communications. With newer networkprotocols, these channels are capable of supporting both circuitswitched voice communications and packet switched data communications.

Although the wireless network 605 associated with the wireless-enableddevice 102 is a GSM/GPRS wireless network in one exemplaryimplementation, other wireless networks may also be associated with thewireless-enabled device 102 in variant implementations. The differenttypes of wireless networks that may be employed include, for example,data-centric wireless networks, voice-centric wireless networks, anddual-mode networks that can support both voice and data communicationsover the same physical base stations. Combined dual-mode networksinclude, but are not limited to, Code Division Multiple Access (CDMA) orCDMA2000 networks, GSM/GPRS networks (as mentioned above), and futurethird-generation (3G) networks like EDGE and UMTS. Some other examplesof data-centric networks include WiFi 802.11, MOBITEX® and DATATAC®network communication systems. Examples of other voice-centric datanetworks include Personal Communication Systems (PCS) networks like GSMand Time Division Multiple Access (TDMA) systems.

The main processor 602 also interacts with additional subsystems such asa Random Access Memory (RAM) 1106, a persistent memory 608 (e.g., anon-volatile memory), a display 610, an auxiliary input/output (I/O)subsystem 612, a data port 614, a keyboard 616, a speaker 618, amicrophone 620, short-range communications 622, and other devicesubsystems 624.

Some of the subsystems of the wireless-enabled device 102 performcommunication-related functions, whereas other subsystems may provide“resident” or on-device functions. By way of example, the display 610and the keyboard 616 may be used for both communication-relatedfunctions, such as entering a text message for transmission over thenetwork 605, and device-resident functions such as a calculator or tasklist.

The wireless-enabled device 102 can send and receive communicationsignals over the wireless network 605 after required networkregistration or activation procedures have been completed. Networkaccess is associated with a subscriber or user of the wireless-enableddevice 102. To identify a subscriber, the wireless-enabled device 102requires a SIM/RUIM card 626 (i.e. Subscriber Identity Module or aRemovable User Identity Module) to be inserted into a SIM/RUIM interface628 in order to communicate with a network. The SIM card or RUIM 626 isone type of a conventional “smart card” that can be used to identify asubscriber of the wireless-enabled device 102 and to personalize thewireless-enabled device 102, among other things. Without the SIM card626, the wireless-enabled device 102 is not fully operational forcommunication with the wireless network 605. By inserting the SIMcard/RUIM 626 into the SIM/RUIM interface 628, a subscriber can accessall subscribed services. Services may include: web browsing andmessaging such as e-mail, voice mail, Short Message Service (SMS), andMultimedia Messaging Services (MMS). More advanced services may include:point of sale, field service and sales force automation,bio-certification processes to establish wireless connections, such asthe wireless connection 114 of FIG. 1. The SIM card/RUIM 626 includes aprocessor and memory for storing information. Once the SIM card/RUIM 626is inserted into the SIM/RUIM interface 628, it is coupled to the mainprocessor 602. In order to identify the subscriber, the SIM card/RUIM626 can include some user parameters such as an International MobileSubscriber Identity (IMSI). An advantage of using the SIM card/RUIM 626is that a subscriber is not necessarily bound by any single physicalmobile device. The SIM card/RUIM 626 may store additional subscriberinformation for a wireless-enabled device or mobile device as well,including datebook (or calendar) information and recent callinformation. Alternatively, user identification information can also beprogrammed into the persistent memory 608.

The wireless-enabled device 102 is a battery-powered device and includesa battery interface 632 for receiving one or more rechargeable batteries630. In at least some embodiments, the battery 630 can be a smartbattery with an embedded microprocessor. The battery interface 632 iscoupled to a regulator (not shown), which assists the battery 630 inproviding power V+ to the wireless-enabled device 102. Although currenttechnology makes use of a battery, future technologies such as microfuel cells may provide the power to the wireless-enabled device 102.

The wireless-enabled device 102 also includes an operating system 634and software components 636 to 646 which are described in more detailbelow. The operating system 634 and the software components 636 to 646that are executed by the main processor 602 are typically stored in apersistent store such as the persistent memory 608, which mayalternatively be a read-only memory (ROM) or similar storage element(not shown). Those skilled in the art will appreciate that portions ofthe operating system 634 and the software components 636 to 646, such asspecific device applications, or parts thereof, may be temporarilyloaded into a volatile store such as the RAM 606. Other softwarecomponents can also be included, as is well known to those skilled inthe art.

The subset of software applications 636 that control basic deviceoperations, including data and voice communication applications, willnormally be installed on the wireless-enabled device 102 during itsmanufacture. Other software applications include a message application638 that can be any suitable software program that allows a user of thewireless-enabled device 102 to send and receive electronic messages.Various alternatives exist for the message application 638 as is wellknown to those skilled in the art. Messages that have been sent orreceived by the user are typically stored in the persistent memory 608of the wireless-enabled device 102 or some other suitable storageelement in the wireless-enabled device 102. In at least someembodiments, some of the sent and received messages may be storedremotely from the wireless-enabled device 102 such as in a data store ofan associated host system that the wireless-enabled device 102communicates with.

The software applications can further include a device state module 640,a Personal Information Manager (PIM) 642, and other suitable modules(not shown). The device state module 640 provides persistence (i.e., thedevice state module 640 ensures that important device data is stored inpersistent memory, such as the persistent memory 608, so that the datais not lost when the wireless-enabled device 102 is turned off or losespower).

The PIM 642 includes functionality for organizing and managing dataitems of interest to the user, such as, but not limited to, e-mail,contacts, calendar events, voice mails, appointments, and task items. APIM application has the ability to send and receive data items via thewireless network 605. PIM data items may be seamlessly integrated,synchronized, and updated via the wireless network 605 with the mobiledevice subscriber's corresponding data items stored and/or associatedwith a host computer system. This functionality creates a mirrored hostcomputer on the wireless-enabled device 102 with respect to such items.This can be particularly advantageous when the host computer system isthe mobile device subscriber's office computer system.

The wireless-enabled device 102 also includes a connect module 644, andan IT policy module 646. The connect module 644 implements thecommunication protocols that are required for the wireless-enableddevice 102 to communicate with the wireless infrastructure and any hostsystem, such as an enterprise system, that the wireless-enabled device102 is authorized to interface with.

The connect module 644 includes a set of APIs that can be integratedwith the wireless-enabled device 102 to allow the wireless-enableddevice 102 to use any number of services associated with the enterprisesystem. The connect module 644 allows the wireless-enabled device 102 toestablish an end-to-end secure, authenticated communication pipe withthe host system. A subset of applications for which access is providedby the connect module 644 can be used to pass IT policy commands fromthe host system (e.g., from an IT policy server of a host system) to thewireless-enabled device 102. This can be done in a wireless or wiredmanner. These instructions can then be passed to the IT policy module646 to modify the configuration of the wireless-enabled device 102.Alternatively, in some cases, the IT policy update can also be done overa wired connection.

The IT policy module 646 receives IT policy data that encodes the ITpolicy. The IT policy module 646 then ensures that the IT policy data isauthenticated by the wireless-enabled device 102. The IT policy data canthen be stored in the flash memory 606 in its native form. After the ITpolicy data is stored, a global notification can be sent by the ITpolicy module 646 to all of the applications residing on thewireless-enabled device 102. Applications for which the IT policy may beapplicable then respond by reading the IT policy data to look for ITpolicy rules that are applicable.

The IT policy module 646 can include a parser (not shown), which can beused by the applications to read the IT policy rules. In some cases,another module or application can provide the parser. Grouped IT policyrules, described in more detail below, are retrieved as byte streams,which are then sent (recursively, in a sense) into the parser todetermine the values of each IT policy rule defined within the groupedIT policy rule. In at least some embodiments, the IT policy module 1146can determine which applications (e.g., bio-certification processes toestablish wireless communications based on comparisons of biophysicalsignal data, such as the biophysical signal data 112 of FIG. 1) areaffected by the IT policy data and send a notification to only thoseapplications. In either of these cases, for applications that aren'trunning at the time of the notification, the applications can call theparser or the IT policy module 646 when they are executed to determineif there are any relevant IT policy rules in the newly received ITpolicy data.

All applications that support rules in the IT Policy are coded to knowthe type of data to expect. For example, the value that is set for the“WEP User Name” IT policy rule is known to be a string; therefore thevalue in the IT policy data that corresponds to this rule is interpretedas a string. As another example, the setting for the “Set MaximumPassword Attempts” IT policy rule is known to be an integer, andtherefore the value in the IT policy data that corresponds to this ruleis interpreted as such.

After the IT policy rules have been applied to the applicableapplications or configuration files, the IT policy module 646 sends anacknowledgement back to the host system to indicate that the IT policydata was received and successfully applied.

Other types of software applications can also be installed on thewireless-enabled device 102. These software applications can be thirdparty applications, which are added after the manufacture of thewireless-enabled device 102. Examples of third party applicationsinclude games, calculators, utilities, etc.

The additional applications can be loaded onto the wireless-enableddevice 102 through at least one of the wireless network 605, theauxiliary I/O subsystem 612, the data port 614, the short-rangecommunications subsystem 622, or any other suitable device subsystem624. This flexibility in application installation increases thefunctionality of the wireless-enabled device 102 and may provideenhanced on-device functions, communication-related functions, or both.For example, secure communication applications may enable electroniccommerce functions and other such financial transactions to be performedusing the wireless-enabled device 102.

The data port 614 enables a subscriber to set preferences through anexternal device or software application and extends the capabilities ofthe wireless-enabled device 102 by providing for information or softwaredownloads to the wireless-enabled device 102 other than through awireless communication network. The alternate download path may, forexample, be used to load an encryption key onto the wireless-enableddevice 102 through a direct and thus reliable and trusted connection toprovide secure device communication.

The data port 614 can be any suitable port that enables datacommunication between the wireless-enabled device 102 and anothercomputing device. The data port 614 can be a serial or a parallel port.In some instances, the data port 614 can be a USB port that includesdata lines for data transfer and a supply line that can provide acharging current to charge the battery 630 of the wireless-enableddevice 102.

The short-range communications subsystem 622 provides for communicationbetween the wireless-enabled device 102 and different systems ordevices, without the use of the wireless network 605. For example, thesubsystem 622 may include an infrared device and associated circuits andcomponents for short-range communication. Examples of short-rangecommunication standards include standards developed by the Infrared DataAssociation (IrDA), Bluetooth, and the 802.11 family of standardsdeveloped by IEEE.

In use, a received signal such as a text message, an e-mail message, webpage download, media content, etc. will be processed by thecommunication subsystem 604 and input to the main processor 602. Themain processor 602 will then process the received signal for output tothe display 610 or alternatively to the auxiliary I/O subsystem 612. Asubscriber may also compose data items, such as e-mail messages, forexample, using the keyboard 616 in conjunction with the display 610 andpossibly the auxiliary I/O subsystem 612. The auxiliary subsystem 612may include devices such as: a touch screen, mouse, track ball, infraredfingerprint detector, or a roller wheel with dynamic button pressingcapability. The keyboard 616 is preferably an alphanumeric keyboardand/or telephone-type keypad. However, other types of keyboards may alsobe used. A composed item may be transmitted over the wireless network605 through the communication subsystem 604.

For voice communications, the overall operation of the wireless-enableddevice 102 is substantially similar, except that the received signalsare output to the speaker 618, and signals for transmission aregenerated by the microphone 620. Alternative voice or audio I/Osubsystems, such as a voice message recording subsystem, can also beimplemented on the wireless-enabled device 102. Although voice or audiosignal output is accomplished primarily through the speaker 618, thedisplay 610 can also be used to provide additional information such asthe identity of a calling party, duration of a voice call, or othervoice call related information.

FIGS. 7A, 7B, 8A, and 8B depict example flow diagrams representative ofprocesses that may be implemented using, for example, computer readableinstructions stored on a computer-readable medium to implementbio-certification processes to establish wireless connections betweenwireless-enabled devices. The example processes of FIGS. 7A, 7B, 8A, and8B may be performed using one or more processors, controllers, and/orany other suitable processing devices. For example, the exampleprocesses of FIGS. 7A, 7B, 8A, and 8B may be implemented using codedinstructions (e.g., computer readable instructions) stored on one ormore tangible computer readable media such as flash memory, read-onlymemory (ROM), and/or random-access memory (RAM). As used herein, theterm tangible computer readable medium is expressly defined to includeany type of computer readable storage and to exclude propagatingsignals. Additionally or alternatively, the example processes of FIGS.7A, 7B, 8A, and 8B may be implemented using coded instructions (e.g.,computer readable instructions) stored on one or more non-transitorycomputer readable media such as flash memory, read-only memory (ROM),random-access memory (RAM), cache, or any other storage media in whichinformation is stored for any duration (e.g., for extended time periods,permanently, brief instances, for temporarily buffering, and/or forcaching of the information). As used herein, the term non-transitorycomputer readable medium is expressly defined to include any type ofcomputer readable medium and to exclude propagating signals.

Alternatively, some or all of the example processes of FIGS. 7A, 7B, 8A,and 8B may be implemented using any combination(s) of applicationspecific integrated circuit(s) (ASIC(s)), programmable logic device(s)(PLD(s)), field programmable logic device(s) (FPLD(s)), discrete logic,hardware, firmware, etc. Also, some or all of the example processes ofFIGS. 7A, 7B, 8A, and 8B may be implemented manually or as anycombination(s) of any of the foregoing techniques, for example, anycombination of firmware, software, discrete logic and/or hardware.Further, although the example processes of FIGS. 7A, 7B, 8A, and 8B aredescribed with reference to the flow diagrams of FIGS. 7A, 7B, 8A, and8B, other methods of implementing the processes of FIGS. 7A, 7B, 8A, and8B may be employed. For example, the order of execution of the blocksmay be changed, and/or some of the blocks described may be changed,eliminated, sub-divided, or combined. Additionally, any or all of theexample processes of FIGS. 7A, 7B, 8A, and 8B may be performedsequentially and/or in parallel by, for example, separate processingthreads, processors, devices, discrete logic, circuits, etc.

Now turning to FIGS. 7A and 7B, the depicted flow diagram isrepresentative of an example process that may be used to initiate abio-certification process to establish a wireless connection between twowireless-enabled devices. The example process is described below asbeing performed by the wireless-enabled device 102 as implemented usingthe apparatus 500 of FIG. 5 to establish a wireless connection (e.g.,the wireless connection 114 of FIG. 1) with the wireless-enabled device104. However, the example process may alternatively be performed by thewireless-enabled device 104 and/or the wireless-enabled headphones 106(or any other device) to establish a wireless connection with thewireless-enabled device 102 (or any other device).

Referring to FIG. 7A, initially, the wireless-enabled device 102receives a user-request to establish a wireless connection (e.g., thewireless connection 114 of FIG. 1) using a bio-certification process(block 702). For example, the person 100 of FIG. 1 may press the button204 or select the icon 208 of FIG. 2 (and/or pick up/hold/touch thewireless-enabled device 102 to engage the sensor 202 of FIG. 2) toinitiate a bio-certification process.

The wireless-enabled device 102 performs a discovery process to discovernearby wireless-enabled device(s) (block 704). For example, thewireless-enabled device 102 may use one of the communication interfaces510 to perform a device discovery process (e.g., a Bluetooth® discoveryprocess) to discover one or both of the wireless-enabled device 104and/or the wireless-enabled headphones 106 of FIG. 1.

The wireless-enabled device 102 determines whether it found any otherwireless-enabled device(s) (block 706). If the wireless-enabled device102 does not find any other wireless-enabled device(s), control advancesto block 736 of FIG. 7B.

If the wireless-enabled device 102 finds at least one wireless-enableddevice (e.g., the wireless-enabled device 104 of FIG. 1) (block 706),the connection arbiter 504 (FIG. 5) determines whether one or more ofthe discovered devices is/are eligible to connect using abio-certification process (block 708). For example, the connectionarbiter 504 can access a listing in the configuration data store 502(FIG. 5) indicative of devices approved for bio-certification. If theconnection arbiter 504 determines that no discovered devices is/areeligible to connect using a bio-certification process, control advancesto block 736 of FIG. 7B.

If the connection arbiter 504 determines that at least one of thediscovered devices is approved for establishing wireless connectionsbased on bio-certification processes (block 708), control advances toblock 710, at which the biophysical signal data collector 506 (FIG. 5)monitors for the presence of a biophysical signal (e.g., the biophysicalsignals 110 of FIG. 1) (block 710).

If a biophysical signal 110 is not detected (block 712), the connectionarbiter 504 determines whether a timeout has been reached (block 714).For example, the connection arbiter 504 may start a timeout timerproviding sufficient time within which the biophysical signal datacollector 506 should detect a biophysical signal 110 before timing outand informing a user that a wireless connection cannot be establishedbecause biophysical signals have not been detected. When the timeout hasnot expired at block 714, control returns to the example operations ofblocks 710 and 712 to determine whether the biophysical signal datacollector 506 has detected a biophysical signal 110. When the timeouthas expired at block 714, control advances to block 736 of FIG. 7B.

When the biophysical signal data collector 506 has detected abiophysical signal 110 (block 712), control advances to block 716, atwhich the biophysical signal data collector 506 collects biophysicalsignal data (e.g., the biophysical signal data 112 of FIG. 1) (block716). The encryption codec 512 (FIG. 5) determines whether to usehashing to request a wireless connection (block 718). For example, theconfiguration data store 502 may store preferences or settingsindicating whether hashing or encryption techniques should be usedduring bio-certification processes to establish wireless connections. Ifthe encryption codec 512 determines that it should not use hashing,control advances to block 722 of FIG. 7B.

If the encryption codec 512 determines that it should use hashing, theencryption codec 512 generates a hash value based on the biophysicalsignal data collected at block 716 (block 720). In the illustratedexample, the encryption codec 512 uses the biophysical signal data 112collected at the wireless-enabled device 102 as a private key togenerate a hash of public or shared information (e.g., a value orinformation that is known to all wireless-enabled devices).

After generating the hash value at block 720 or if the encryption codec512 determines at block 718 that it should not use hashing, thewireless-enabled device 102 sends a device-request for a wirelessconnection and the collected biophysical signal data 112 (or a hashvalue generated at block 720) to eligible ones of the wireless-enableddevices identified at block 708 (block 722) (FIG. 7B). In theillustrated example, the wireless-enabled device 102 uses one of thecommunication interfaces 510 (FIG. 5) to send the device-request and thecollected biophysical signal data 112 to the wireless-enabled device 104via a broadcast channel or any other channel (e.g., an open channel)suitable for sending such a communication. In some examples, thewireless-enabled device 102 is not configured to generate hash values.In such some examples, the operations of blocks 718 and 720 may beomitted, and control advances from block 716 to block 722.

After a predetermined amount of time has passed, the connection arbiter504 determines whether it has received a connection acceptance message(block 724) from, for example, the wireless-enabled device 104. In theillustrated example, the connection arbiter 504 will receive aconnection acceptance message from the wireless-enabled device 104 ifthe wireless-enabled device 104 has locally collected biophysical signaldata 113 and confirmed a sufficient match between the locally collectedbiophysical signal data 113 and the biophysical signal data 112 receivedfrom the wireless-enabled device 102. An example process that may beimplemented by the wireless-enabled device 104 to perform biophysicalsignal data comparisons is described below in connection with theexample flow diagram of FIGS. 8A and 8B. In some instances, a user willbe in contact with only two wireless-enabled devices, one of which isthe wireless-enabled device 102 that initiates and sends thedevice-request at block 722. During such instances, the wireless-enableddevice 102 typically will receive a connection acceptance from only onewireless-enabled device (e.g., the wireless-enabled device 104).However, if the wireless-enabled device 102 receives connectionacceptance messages from more than one wireless-enabled device (e.g.,the wireless-enabled device 104 and the wireless-enabled headphones 106of FIG. 1), the wireless-enabled device 102 may present a dialog message(e.g., via the display 610 of FIG. 6) to a user requesting the user toselect a device with which to continue the bio-certification process toestablish a wireless connection. In this manner, the wireless-enableddevice 102 may ignore connection acceptance messages received fromnon-selected device(s). If the connection arbiter 504 determines that ithas not received a connection acceptance message, control advances toblock 736.

If the connection arbiter 504 determines that it has received aconnection acceptance message (block 724), the connection arbiter 504determines whether user confirmation is required to connect with thewireless-enabled device 104 (block 726). For example, the connectionarbiter 504 can access a listing in the configuration data store 502(FIG. 5) indicative of devices that require user-confirmation prior toallowing or permitting a wireless connection. If the connection arbiter504 determines that user confirmation is not required to connect withthe wireless-enabled device 104, control advances to block 732.

If the connection arbiter 504 determines that user confirmation isrequired to connect with the wireless-enabled device 104, the connectionarbiter 504 requests a user confirmation (block 728). In the illustratedexample, the connection arbiter 504 causes the wireless-enabled device102 to present a message (e.g., via the display 610 of FIG. 6) similarto the GUI message 400 of FIG. 4 to request user confirmation that it isok to establish a wireless connection (e.g., the wireless connection 114of FIG. 1) with the wireless-enabled device 104.

If at block 730 the connection arbiter 504 receives a user confirmationaccepting the establishing of the wireless connection 114, theconnection arbiter 504 allows or permits the establishing of thewireless connection 114 and control advances to block 732.

At block 732, the wireless-enabled device 102 establishes the wirelessconnection 114 with the wireless-enabled device 104 via, for example,one of the communication interfaces 510.

Returning to block 730, if the connection arbiter 504 determines that auser did not confirm acceptance to establish the wireless connection114, control advances to block 734, at which the wireless-enabled device102 sends a connection rejection response to the wireless-enabled device104 via, for example, one of the communication interfaces 510. In someexamples, when the user does not confirm acceptance to establish thewireless connection 114, the wireless-enabled device 102 may ignore theconnection acceptance message received at block 724 instead of sendingthe rejection response at block 734.

At block 736, the wireless-enabled device 102 informs a user (e.g., theperson 100 of FIG. 1) that no eligible devices with which to establish awireless connection were found (block 736).

After informing a user that no eligible devices were found (block 736),or after sending a connection rejection response (block 734), or afterestablishing the wireless connection 114 (block 732), the exampleprocess of FIGS. 7A and 7B is ended.

Now turning to FIGS. 8A and 8B, the depicted flow diagram isrepresentative of an example process that may be implemented by awireless-enabled device (e.g., the wireless-enabled device 104 or thewireless-enabled headphones 106 of FIG. 1) to receive a request fromanother wireless-enabled device (e.g., the wireless-enabled device 102of FIG. 1) to establish a wireless connection (e.g., the wirelessconnection 114 of FIG. 1) based on a bio-certification process. Althoughthe example process is described as being performed by thewireless-enabled device 104 as implemented using an apparatussubstantially similar or identical to the example apparatus 500 of FIG.5, the example process may instead be performed by any other device(e.g., the wireless-enabled device 102 and/or the wireless-enabledheadphones 106 of FIG. 1). In the illustrated example, the exampleprocess of FIGS. 8A and 8B is performed by the wireless-enabled device104 in response to receiving a device-request for connection sent by thewireless-enabled device 102 at block 722 of the example process of FIGS.7A and 7B.

Referring to FIG. 8A, initially, the wireless-enabled device 104receives a device-request for connection based on bio-certification(block 802). In the illustrated example, the wireless-enabled device 104receives the device-request for connection sent by the wireless-enableddevice 102 at block 722 of the example process of FIGS. 7A and 7B. Atblock 802, the wireless-enabled device 104 also receives the biophysicalsignal data 112 (or a hash value generated at block 720 of FIG. 7A).

The wireless-enabled device 104 determines whether it is eligible forestablishing a wireless connection (e.g. the wireless connection 114)with the wireless-enabled device 102 based on bio-certification (block804). For example, the wireless-enabled device 104 may use itsconnection arbiter 504 of FIG. 5 to access a listing in itsconfiguration data store 502 (FIG. 5) indicative of devices approved forbio-certification. If the wireless-enabled device 104 determines that itis not eligible for establishing a wireless connection with thewireless-enabled device 102 based on bio-certification, control advancesto block 838 of FIG. 8B, where the wireless-enabled device 104 ignoresthe device-request for connection received at block 802.

If the connection arbiter 504 determines that the wireless-enableddevice 102 is approved for connecting with based on bio-certification(block 804), the wireless-enabled device 104 monitors for the presenceof a biophysical signal 110 (FIG. 1) (block 806). For example, thewireless-enabled device 104 may use its biophysical signal datacollector 506 to determine whether it can detect a biophysical signal110.

If a biophysical signal 110 is not detected (block 808), the connectionarbiter 504 determines whether a timeout has been reached (block 810).For example, the connection arbiter 504 may start a timeout timerproviding sufficient time within which the biophysical signal datacollector 506 should detect a biophysical signal 110 before timing out.When the timeout has not expired at block 810, control returns to theexample operations of blocks 806 and 808 to determine whether thebiophysical signal data collector 506 has detected a biophysical signal110. When the timeout has expired at block 810, control advances toblock 838 of FIG. 8B.

When the biophysical signal data collector 506 has detected abiophysical signal 110 (block 808), control advances to block 812, atwhich the biophysical signal data collector 506 collects localbiophysical signal data (e.g., the locally collected biophysical signaldata 113 of FIG. 1) (block 812).

The encryption codec 512 (FIG. 5) determines whether to decode a hash(block 814). For example, if the encryption codec 512 receives a hashvalue (e.g., a hash value generated at block 720 of FIG. 7A) from thedevice-request for connection received at block 802, the encryptioncodec 512 determines at block 814 that it should decode the receivedhash. Otherwise, if no hash value was received at block 802, then theencryption codec 512 need not decode a hash.

If the encryption codec 512 does determine at block 814 that it shoulddecode a hash, the encryption codec 512 decodes a hash received at block802 based on the locally collected biophysical signal data 113 collectedat block 812 (block 816). In the illustrated example, the encryptioncodec 512 uses the locally collected biophysical signal data 113collected at the wireless-enabled device 104 as a private key to decodethe hash and recover information hashed therein. If the locallycollected biophysical signal data 113 corresponds to the same person(e.g., the person 100 of FIG. 1) that is associated with the biophysicalsignal data 112 as shown in FIG. 1, the encryption codec 512 willrecover, at block 816, the public or shared information (e.g., a valueor information that is known to all wireless-enabled devices) that thewireless-enabled device 102 hashed at block 720 of FIG. 7A. If thelocally collected biophysical signal data 113 does not correspond to thesame person that is associated with the biophysical signal data 112,then the encryption codec 512 will recover, at block 816, informationthat is different from the public or shared information that thewireless-enabled device 102 hashed at block 720 of FIG. 7A.

After decoding the hash at block 816, the comparator 508 compares therecovered information with locally stored public or shared information(e.g., a value or information that is known to all wireless-enableddevices) (block 818).

The connection arbiter 504 determines whether there is a sufficientmatch (e.g., a match within an acceptable tolerance or threshold basedon, for example, a matching score) between the recovered information(i.e., the information recovered at block 816) and the locally storedpublic or shared information (block 820). If a sufficient match is foundat block 820, control advances to block 826 shown in FIG. 8B. If asufficient match is not found at block 820, control advances to block838 of FIG. 8B.

Returning to block 814, if the encryption codec 512 determines that itshould not decode a hash (e.g., a hash was not received at block 802),control advances from block 814 to block 822. In some examples, thewireless-enabled device 104 is not configured to monitor for hash valuesor decode hash values. In such some examples, the operations of blocks814, 816, 818, and 820 may be omitted, and control advances from block812 to block 822.

At block 822, the wireless-enabled device 104 uses its comparator 508(FIG. 5) to compare the biophysical signal data 112 received at block802 with the locally collected biophysical signal data 113 (block 822).

The connection arbiter 504 determines whether there is a sufficientmatch between the received biophysical signal data 112 and the locallycollected biophysical signal data 113 (block 824). The connectionarbiter 504 may determine whether a sufficient match exists based on acomparison score generated by the comparator 508 and a matching scorethreshold as described above in connection with FIG. 5. If a sufficientmatch is not found at block 824, control advances to block 838 of FIG.8B.

If a sufficient match is found at block 824 or at block 820, thewireless-enabled device 104 uses its connection arbiter 504 to determinewhether user confirmation is required to connect with thewireless-enabled device 102 (block 826) (FIG. 8B). For example, theconnection arbiter 504 can access a listing in the configuration datastore 502 (FIG. 5) of the wireless-enabled device 104 indicative ofdevices that require user-confirmation prior to allowing a wirelessconnection. If the connection arbiter 504 determines that userconfirmation is not required to connect with the wireless-enabled device102, control advances to block 832.

If the connection arbiter 504 determines that user confirmation isrequired to connect with the wireless-enabled device 102, the connectionarbiter 504 requests a user confirmation (block 828). In the illustratedexample, the connection arbiter 504 causes the wireless-enabled device104 to present a message (e.g., via the display 610 of FIG. 6) similarto the GUI message 400 of FIG. 4 to request user confirmation indicatingthat it is ok to establish a wireless connection (e.g., the wirelessconnection 114 of FIG. 1) with the wireless-enabled device 102.

If at block 830 the connection arbiter 504 receives a user confirmationaccepting the establishing of the wireless connection 114, controladvances to block 832. If at block 830 the connection arbiter 504 doesnot receive a user confirmation accepting the establishing of thewireless connection 114, control advances to block 838.

At block 832, the wireless-enabled device 104 sends a connectionacceptance message via one of its communication interfaces 510 (FIG. 5)to the wireless-enabled device 102. In the illustrated example, theconnection acceptance message sent by the wireless-enabled device 104 isthe connection acceptance message received by the wireless-enableddevice 102 at block 724 of FIG. 7B.

The connection arbiter 504 of the wireless-enabled device 104 thendetermines whether it should establish the wireless connection 114(block 834). For example, the connection arbiter 504 may establish thewireless connection 114 if it receives an acceptance or negotiation fromthe wireless-enabled device 102 to successfully establish the wirelessconnection 114 (e.g., see the operation of block 732 of FIG. 7B at whichthe wireless-enabled device 102 proceeds to successfully establish thewireless connection 114). If the connection arbiter 504 determines atblock 834 that it should allow or permit the wireless connection 114,the wireless-enabled device 104 establishes the wireless connection 114with the wireless-enabled device 102 via, for example, one of thecommunication interfaces 510 (block 836).

If at block 834 the wireless-enabled device 104 receives a connectionrejection response from the wireless-enabled device 102 (e.g., see block734 of FIG. 7B) or does not receive any response or further negotiationfrom the wireless-enabled device 102, the connection arbiter 504determines that it should not allow the wireless connection 114 andcontrol advances to block 838.

At block 838, the wireless-enabled device 104 ignores the device-requestfor connection received at block 802 (block 838). After ignoring thedevice-request for connection at block 838 or after establishing thewireless connection 114 at block 836, the example process of FIGS. 8Aand 8B ends.

Although certain methods, apparatus, and articles of manufacture havebeen described herein, the scope of coverage of this patent is notlimited thereto. To the contrary, this patent covers all methods,apparatus, and articles of manufacture fairly falling within the scopeof the appended claims either literally or under the doctrine ofequivalents.

1-21. (canceled)
 22. A method of establishing a connection betweenwireless-enabled devices, comprising: collecting first biophysicalsignal data via a first wireless-enabled device; using the firstbiophysical signal data as a key to decrypt encrypted informationreceived from a second wireless-enabled device to recover firstinformation, wherein the encrypted information is generated using secondbiophysical signal data; and establishing a wireless connection betweenthe first wireless-enabled device and the second wireless-enabled devicebased on a comparison of the first information and second informationstored in the first wireless-enabled device.
 23. The method of claim 22,wherein the second biophysical signal data is collected at the secondwireless-enabled device and the encrypted information is generated bythe second wireless-enabled device using the second biophysical signaldata as a second key.
 24. The method of claim 22, wherein the firstbiophysical signal data is representative of a biophysical signal of aperson in contact with the first wireless-enabled device.
 25. The methodof claim 24, wherein the biophysical signal comprises a heart rate ofthe person.
 26. The method of claim 24, wherein the biophysical signalcomprises information that indicates at least one of a heartbeatwavelength, a body temperature, or a blood pressure of the person. 27.The method of claim 22, further comprising, prior to establishing thewireless connection, confirming that the first wireless-enabled deviceis eligible to establish the wireless connection with the secondwireless-enabled device using a biophysical signal process.
 28. Themethod of claim 22, wherein collecting the first biophysical signal dataat the first wireless-enabled device is performed in response toreceiving a user request to establish the wireless connection based on abiophysical signal process.
 29. The method of claim 22, furthercomprising: when the establishing of the wireless connection requiresuser confirmation, requesting user confirmation to establish thewireless connection; and establishing the wireless connection betweenthe first and second wireless-enabled devices upon receipt of userconfirmation to permit the establishing of the wireless connection. 30.The method of claim 29, wherein a requirement of the user confirmationto establish the wireless connection is indicated in a configurationdata store of the first wireless-enabled device.
 31. The method of claim22, wherein at least one of the first wireless-enabled device or thesecond wireless-enabled device comprises a car.
 32. The method of claim22, wherein at least one of the first wireless-enabled device or thesecond wireless-enabled device comprises a watch.
 33. The method ofclaim 22, wherein at least one of the first wireless-enabled device orthe second wireless-enabled device comprises an appliance.
 34. A device,comprising: a memory; and at least one hardware processorcommunicatively coupled with the memory and configured to: collect firstbiophysical signal data via a first wireless-enabled device; use thefirst biophysical signal data as a key to decrypt encrypted informationreceived from a second wireless-enabled device to recover firstinformation, wherein the encrypted information is generated using secondbiophysical signal data; and establish a wireless connection between thefirst wireless-enabled device and the second wireless-enabled devicebased on a comparison of the first information and second informationstored in the first wireless-enabled device.
 35. The device of claim 34,wherein the second biophysical signal data is collected at the secondwireless-enabled device and the encrypted information is generated bythe second wireless-enabled device using the second biophysical signaldata as a second key.
 36. The device of claim 34, wherein the firstbiophysical signal data is representative of a biophysical signal of aperson in contact with the first wireless-enabled device.
 37. The deviceof claim 36, wherein the biophysical signal comprises information thatindicates at least one of a heart rate, a heartbeat wavelength, a bodytemperature, or a blood pressure of the person.
 38. The device of claim34, wherein collecting the first biophysical signal data at the firstwireless-enabled device is performed in response to receiving a userrequest to establish the wireless connection based on a biophysicalsignal process.
 39. The device of claim 34, wherein the at least onehardware processor is further configured to: when the establishing ofthe wireless connection requires user confirmation, request userconfirmation to establish the wireless connection; and establish thewireless connection between the first and second wireless-enableddevices upon receipt of user confirmation to permit the establishing ofthe wireless connection.
 40. The device of claim 34, wherein at leastone of the first wireless-enabled device or the second wireless-enableddevice comprises at least one of a car, a watch, or an appliance.
 41. Atangible, non-transitory computer-readable medium containinginstructions which, when executed, cause a computing device to performoperations comprising: collecting first biophysical signal data via afirst wireless-enabled device; using the first biophysical signal dataas a key to decrypt encrypted information received from a secondwireless-enabled device to recover first information, wherein theencrypted information is generated using second biophysical signal data;and establishing a wireless connection between the firstwireless-enabled device and the second wireless-enabled device based ona comparison of the first information and second information stored inthe first wireless-enabled device.