-
公开(公告)号:US11035884B2
公开(公告)日:2021-06-15
申请号:US16723226
申请日:2019-12-20
Applicant: Apple Inc.
Inventor: Guoqing Li , Jarkko L. Kneckt , Yong Liu , Christiaan A. Hartman , Welly Kasten
Abstract: Methods, systems, and apparatus are presented for performing network probing. A user equipment device (UE) may store a record associating traditional service set identifiers (SSIDs) with corresponding Short SSIDs. According to some embodiments, the UE may receive a message including a Short SSID, and determine whether a corresponding full SSID is known to the UE. Based on the determination, a probe request may be generated, addressed to either the Short SSID or the full SSID. After transmitting the probe request, the UE may receive a probe response, which may include a full SSID corresponding to the Short SSID. The UE may store a record associating the full SSID with the Short SSID, if applicable. According to some embodiments, a UE may receive a plurality of messages including respective SSIDs, and may generate a single probe request addressed to the SSIDs. The UE may receive a plurality of probe responses.
-
公开(公告)号:US09992733B2
公开(公告)日:2018-06-05
申请号:US14292620
申请日:2014-05-30
Applicant: APPLE INC.
Inventor: Welly Kasten , Chaitanya Mannemala , Kapil Chhabra , Veerendra Boodannavar
Abstract: A method, station and computer readable storage medium used to perform opportunistic roaming procedures. A station joined to a basic service set (BSS) of an access point (AP) performs a method including determining a roam profile for the station, the roam profile indicating at least one of available operating bands or available APs for the station, determining a first value associated with a network parameter of the joined AP, determining at least one roam candidate AP having a second value associated with the network parameter corresponding to the roam candidate AP, wherein the first and second values are a received signal strength indicator, determining whether a predetermined criteria value is satisfied based upon the first and second values, wherein the predetermined criteria value is a minimum difference between the first value and second value and roaming to the roam candidate AP when the predetermined criteria value is satisfied.
-
公开(公告)号:US09973895B2
公开(公告)日:2018-05-15
申请号:US15619116
申请日:2017-06-09
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten , Artiom Shamis , Chaitanya Mannemala
Abstract: After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.
-
公开(公告)号:US20240323742A1
公开(公告)日:2024-09-26
申请号:US18733485
申请日:2024-06-04
Applicant: Apple Inc.
Inventor: Rachid Kachemir , Krishna M. Behara , Ashok Kumar Harikumar , Christopher R. Purcell , Welly Kasten
Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.
-
公开(公告)号:US11770731B2
公开(公告)日:2023-09-26
申请号:US16555356
申请日:2019-08-29
Applicant: Apple Inc.
Inventor: Guoqing Li , Yang Yu , Welly Kasten , Shehla S. Rana , Mete Fikirlier , Karthik R. Mekala , Charles F. Dominguez , Yong Liu , Rajneesh Kumar
CPC classification number: H04W28/0221 , H04W52/0216 , H04W52/0229 , H04W52/0206
Abstract: Some embodiments of this disclosure include apparatuses and methods for implementing a target wake time (TWT) scheme that includes traffic differentiation and service period extension. For example some embodiments relate to an electronic device including a transceiver and one or more processors communicatively coupled to the transceiver. The one or more processors receive an indication of traffic associated with an application. The one or more processors determine information associated with the traffic and configure the TWT scheme associated with the traffic based at least in part on the determined information. The one or more processors further communicate initial information associated with the TWT scheme to an access point of a wireless network. The initial information associated with the TWT scheme can include at least one of traffic direction information, traffic pattern information, a traffic identifier (TID), or an access category, indication (ACID).
-
公开(公告)号:US20200217875A1
公开(公告)日:2020-07-09
申请号:US16723226
申请日:2019-12-20
Applicant: Apple Inc.
Inventor: Guoqing Li , Jarkko L. Kneckt , Yong Liu , Christiaan A. Hartman , Welly Kasten
Abstract: Methods, systems, and apparatus are presented for performing network probing. A user equipment device (UE) may store a record associating traditional service set identifiers (SSIDs) with corresponding Short SSIDs. According to some embodiments, the UE may receive a message including a Short SSID, and determine whether a corresponding full SSID is known to the UE. Based on the determination, a probe request may be generated, addressed to either the Short SSID or the full SSID. After transmitting the probe request, the UE may receive a probe response, which may include a full SSID corresponding to the Short SSID. The UE may store a record associating the full SSID with the Short SSID, if applicable. According to some embodiments, a UE may receive a plurality of messages including respective SSIDs, and may generate a single probe request addressed to the SSIDs. The UE may receive a plurality of probe responses.
-
公开(公告)号:US10567428B2
公开(公告)日:2020-02-18
申请号:US16031459
申请日:2018-07-10
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten
IPC: G06F11/00 , H04L29/06 , H04W64/00 , H04W4/80 , H04W12/02 , H04L29/08 , H04W12/12 , G01S5/02 , H04W84/12 , H04W88/02
Abstract: Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement request and a first random identifier from a first wireless communication device at a second wireless communication device. The embodiments also includes deriving a transient key using the first random identifier, a second random identifier (generated by the second device), and a pre-shared key. The first and second random identifiers, the pre-shared key, and the transient key derived therefrom are shared between the first and second devices, but are not known to any other devices. The embodiments further include encrypting measurement data exchanged between the two devices using the transient key, and using the encrypted measurement data to calculate and verify a separation distance between the devices. The embodiments thus prevent dishonest wireless communication devices from intercepting communications and spoofing a location of one of the two honest devices.
-
公开(公告)号:US10225694B2
公开(公告)日:2019-03-05
申请号:US15975635
申请日:2018-05-09
Applicant: Apple Inc.
Inventor: Kapil Chhabra , Welly Kasten , Artiom Shamis , Chaitanya Mannemala
Abstract: After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.
-
-
-
-
-
-
-