Bandwidth puncture and response rules

    公开(公告)号:US11784746B2

    公开(公告)日:2023-10-10

    申请号:US17194782

    申请日:2021-03-08

    Applicant: Apple Inc.

    CPC classification number: H04L1/0013 H04L5/0055 H04W84/12

    Abstract: An electronic device (such as an access point) that receives one or more block acknowledgments is described. This electronic device may transmit an extremely high-throughput (EHT) physical layer convergence protocol (PLCP) protocol data unit (PPDU) to a recipient electronic device, where the EHT PPDU is transmitted in multiple non-contiguous sub-bands that are separated by a punctured sub-band. Moreover, the electronic may receive the one or more block acknowledgments from the recipient electronic device, where the one or more block acknowledgments exclude the punctured sub-band. Note that the EHT PPDU may exclude transmitted energy in the punctured sub-band. Moreover, the punctured sub-band may have a bandwidth of at least 20 MHz and may be different from a primary sub-band.

    NAN Trusted Device Cluster
    18.
    发明申请

    公开(公告)号:US20220353682A1

    公开(公告)日:2022-11-03

    申请号:US17731454

    申请日:2022-04-28

    Applicant: Apple Inc.

    Abstract: One or more wireless stations operate to configure direct communication with neighboring mobile stations, e.g., direct communication between the wireless stations without utilizing an intermediate access point. A wireless station may enter an unsynchronized discovery mode, transmit, in response to receiving a subscribe message from a neighboring device, a publish message to the neighboring device, perform authentication and trusted device cluster provisioning with the neighboring wireless device, and protect transmissions using the security credentials. In the unsynchronized discovery mode, the wireless device may monitor a discovery channel for subscribe messages, e.g., from neighboring peer devices. Additionally, the trusted device cluster provisioning may provide security credentials to the wireless device. Note that protecting transmissions using the security credentials may include protecting a trusted device cluster identity, transmitted beacons, transmitted management frames, or transmitted action frames using the security credentials acquired via the trusted device cluster provisioning.

Patent Agency Ranking