-
公开(公告)号:US20240121846A1
公开(公告)日:2024-04-11
申请号:US18045698
申请日:2022-10-11
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Junpeng WU , Zhonglin FENG , Xiumeng WANG , Meng ZHAO , Yiting ZHENG , Sachin GANU , Denis HOULE
IPC: H04W76/18 , H04B17/327 , H04W64/00
CPC classification number: H04W76/18 , H04B17/327 , H04W64/006
Abstract: Examples of performing selective Fine Timing Measurement (FTM) are described. For an FTM scan cycle, a first AP (i.e., an initiator) may determine scanning parameter values of a plurality of second APs (i.e., potential responders) based on previously performed FTM scans. The first AP may determine weights of the plurality of second APs based on the scanning parameter values and select a set of target APs based on the weights. The first AP may then scan the set of target APs for the FTM scan so that the rest of the plurality of second APs are relieved from participating in the FTM scan thereby reducing the performance impact on the rest of the plurality of second APs. After the FTM scan cycle is completed, the first AP may update the weights and select another set of target APs based on the updated weights to perform another FTM scan cycle.
-
公开(公告)号:US20230129553A1
公开(公告)日:2023-04-27
申请号:US17512161
申请日:2021-10-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Junpeng WU , Tong ZHANG
IPC: H04W12/122 , H04W12/03 , H04W12/06
Abstract: Implementations of the present disclosure relate to broadcast of intrusion detection information. A method comprises detecting, by an access point (AP), at least one device in a wireless communication network to be an illegal device. the method also comprises obtaining, by the AP, intrusion detection information related to the at least one device, the intrusion detection information comprising at least one identifier of the at least one device. The intrusion detection information related to the at least one device is broadcasted. In this way, when other devices in the network receive the intrusion detection information, they would know about the malicious activity or policy violations in the network, and would know which device(s) is detected to be illegal.
-