-
公开(公告)号:US09992733B2
公开(公告)日:2018-06-05
申请号:US14292620
申请日:2014-05-30
Applicant: APPLE INC.
Inventor: Welly Kasten , Chaitanya Mannemala , Kapil Chhabra , Veerendra Boodannavar
Abstract: A method, station and computer readable storage medium used to perform opportunistic roaming procedures. A station joined to a basic service set (BSS) of an access point (AP) performs a method including determining a roam profile for the station, the roam profile indicating at least one of available operating bands or available APs for the station, determining a first value associated with a network parameter of the joined AP, determining at least one roam candidate AP having a second value associated with the network parameter corresponding to the roam candidate AP, wherein the first and second values are a received signal strength indicator, determining whether a predetermined criteria value is satisfied based upon the first and second values, wherein the predetermined criteria value is a minimum difference between the first value and second value and roaming to the roam candidate AP when the predetermined criteria value is satisfied.
-
公开(公告)号:US09973895B2
公开(公告)日:2018-05-15
申请号:US15619116
申请日:2017-06-09
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten , Artiom Shamis , Chaitanya Mannemala
Abstract: After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.
-