Multiple network probing
    11.
    发明授权

    公开(公告)号:US11035884B2

    公开(公告)日:2021-06-15

    申请号:US16723226

    申请日:2019-12-20

    Applicant: Apple Inc.

    Abstract: Methods, systems, and apparatus are presented for performing network probing. A user equipment device (UE) may store a record associating traditional service set identifiers (SSIDs) with corresponding Short SSIDs. According to some embodiments, the UE may receive a message including a Short SSID, and determine whether a corresponding full SSID is known to the UE. Based on the determination, a probe request may be generated, addressed to either the Short SSID or the full SSID. After transmitting the probe request, the UE may receive a probe response, which may include a full SSID corresponding to the Short SSID. The UE may store a record associating the full SSID with the Short SSID, if applicable. According to some embodiments, a UE may receive a plurality of messages including respective SSIDs, and may generate a single probe request addressed to the SSIDs. The UE may receive a plurality of probe responses.

    Device and method for opportunistic roaming

    公开(公告)号:US09992733B2

    公开(公告)日:2018-06-05

    申请号:US14292620

    申请日:2014-05-30

    Applicant: APPLE INC.

    CPC classification number: H04W48/16 H04W8/18 H04W48/20

    Abstract: A method, station and computer readable storage medium used to perform opportunistic roaming procedures. A station joined to a basic service set (BSS) of an access point (AP) performs a method including determining a roam profile for the station, the roam profile indicating at least one of available operating bands or available APs for the station, determining a first value associated with a network parameter of the joined AP, determining at least one roam candidate AP having a second value associated with the network parameter corresponding to the roam candidate AP, wherein the first and second values are a received signal strength indicator, determining whether a predetermined criteria value is satisfied based upon the first and second values, wherein the predetermined criteria value is a minimum difference between the first value and second value and roaming to the roam candidate AP when the predetermined criteria value is satisfied.

    Wireless login with secure proximity detection

    公开(公告)号:US09973895B2

    公开(公告)日:2018-05-15

    申请号:US15619116

    申请日:2017-06-09

    Applicant: Apple Inc.

    CPC classification number: H04W4/023 H04W4/80 H04W8/005 H04W12/06 H04W84/12

    Abstract: After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.

    Crowd Sourced Privacy Preserving Access Point Mapping

    公开(公告)号:US20240323742A1

    公开(公告)日:2024-09-26

    申请号:US18733485

    申请日:2024-06-04

    Applicant: Apple Inc.

    CPC classification number: H04W24/10 H04W48/16 H04W64/00 H04W76/10 H04W12/02

    Abstract: In some implementations, a computing system can perform crowd sourced access point mapping using privacy preserving techniques. For example, a server device can receive access point data reports from multiple user devices that includes various attributes and/or measurements with respect to access points with which the user devices have established connections. The access point data reports can be delivered without identifying the user devices, or users thereof, and their exact locations. Based on the access point data reports, the server device can map locations of access points and relationships between access points to generate network topologies, network locations, network quality scores, and various other characteristics of networks and/or access points. The generated access point data can be served to user devices so that the user devices can improve the efficiency of the interactions between user devices and the detected access points and/or networks.

    Target wake time traffic differentiation and service period extension

    公开(公告)号:US11770731B2

    公开(公告)日:2023-09-26

    申请号:US16555356

    申请日:2019-08-29

    Applicant: Apple Inc.

    CPC classification number: H04W28/0221 H04W52/0216 H04W52/0229 H04W52/0206

    Abstract: Some embodiments of this disclosure include apparatuses and methods for implementing a target wake time (TWT) scheme that includes traffic differentiation and service period extension. For example some embodiments relate to an electronic device including a transceiver and one or more processors communicatively coupled to the transceiver. The one or more processors receive an indication of traffic associated with an application. The one or more processors determine information associated with the traffic and configure the TWT scheme associated with the traffic based at least in part on the determined information. The one or more processors further communicate initial information associated with the TWT scheme to an access point of a wireless network. The initial information associated with the TWT scheme can include at least one of traffic direction information, traffic pattern information, a traffic identifier (TID), or an access category, indication (ACID).

    Multiple Network Probing
    16.
    发明申请

    公开(公告)号:US20200217875A1

    公开(公告)日:2020-07-09

    申请号:US16723226

    申请日:2019-12-20

    Applicant: Apple Inc.

    Abstract: Methods, systems, and apparatus are presented for performing network probing. A user equipment device (UE) may store a record associating traditional service set identifiers (SSIDs) with corresponding Short SSIDs. According to some embodiments, the UE may receive a message including a Short SSID, and determine whether a corresponding full SSID is known to the UE. Based on the determination, a probe request may be generated, addressed to either the Short SSID or the full SSID. After transmitting the probe request, the UE may receive a probe response, which may include a full SSID corresponding to the Short SSID. The UE may store a record associating the full SSID with the Short SSID, if applicable. According to some embodiments, a UE may receive a plurality of messages including respective SSIDs, and may generate a single probe request addressed to the SSIDs. The UE may receive a plurality of probe responses.

    Secure wireless ranging
    17.
    发明授权

    公开(公告)号:US10567428B2

    公开(公告)日:2020-02-18

    申请号:US16031459

    申请日:2018-07-10

    Applicant: Apple Inc.

    Abstract: Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement request and a first random identifier from a first wireless communication device at a second wireless communication device. The embodiments also includes deriving a transient key using the first random identifier, a second random identifier (generated by the second device), and a pre-shared key. The first and second random identifiers, the pre-shared key, and the transient key derived therefrom are shared between the first and second devices, but are not known to any other devices. The embodiments further include encrypting measurement data exchanged between the two devices using the transient key, and using the encrypted measurement data to calculate and verify a separation distance between the devices. The embodiments thus prevent dishonest wireless communication devices from intercepting communications and spoofing a location of one of the two honest devices.

    Wireless login with secure proximity detection

    公开(公告)号:US10225694B2

    公开(公告)日:2019-03-05

    申请号:US15975635

    申请日:2018-05-09

    Applicant: Apple Inc.

    Abstract: After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.

Patent Agency Ranking