Wireless channel access restrictions

    公开(公告)号:US11856503B2

    公开(公告)日:2023-12-26

    申请号:US17242496

    申请日:2021-04-28

    Abstract: An example method of controlling a wireless access point may include associating accumulated-channel-resource-consumption variables with, respectively, resource consumers of the wireless access point. The method may further include, for wireless communications of the wireless access point: determining a number of spatial streams effectively consumed by the respective wireless communication; determining an operational bandwidth effectively consumed by the respective wireless communication; determining a duration of the respective wireless communication; determining a channel-resource-consumption amount for the respective wireless communication based on the number of spatial streams effectively consumed by the respective wireless communication, the operational bandwidth effectively consumed by the respective wireless communication, and the duration of the respective wireless communication; and determining values for the accumulated-channel-resource-consumption variables by accumulating the channel-resource-consumption amounts per resource consumer. The method may further include determining whether to impose channel access restrictions on the resource consumers based on their respective accumulated-channel-resource-consumption variables.

    INTERNET PROTOCOL SECURITY (IPSEC) SECURITY ASSOCIATIONS (SA) BALANCE BETWEEN HETEROGENEOUS CORES IN MULTIPLE CONTROLLER SYSTEM

    公开(公告)号:US20230262035A1

    公开(公告)日:2023-08-17

    申请号:US17672011

    申请日:2022-02-15

    CPC classification number: H04L63/0485 H04L63/029 H04L63/164

    Abstract: Systems are methods are provided for implementing load balancing of IPsec security associations (SAs) SAs between different heterogeneous cores, for example in a multiple controller systems. The balancing of IPsec SAs are performed using software implementations of IPsec offloading and/or hardware implementations of IPsec offloading. By balancing the processing functions related to orchestration of IPsec SAs between hardware (e.g., IPsec hardware accelerator) and software (e.g., IPsec software accelerator), the methods realize increased optimization, improved user experience, and enhanced product performance in networks using IPsec. For example, an IPsec session is initiated, and it is determined whether a resource limitation for a hardware-based IPsec accelerator has been reached. If the limitation for the hardware-based IPsec accelerator has been reached, processing for the IPsec SA for the initiated IPsec session is offloaded to a software-based IPsec accelerator.

    Variable antenna patterns
    13.
    发明授权

    公开(公告)号:US11653223B2

    公开(公告)日:2023-05-16

    申请号:US17146000

    申请日:2021-01-11

    CPC classification number: H04W16/28 H04B7/0452 H04W84/12 H04W88/08

    Abstract: Embodiments of the present disclosure relate to variable antenna patterns. A method comprises determining respective locations of a plurality of candidate client stations to be communicated with an access point (AP); assigning the plurality of candidate client stations to at least one of a plurality of predetermined station groups based on the determined respective locations, the plurality of station groups being associated with a plurality of antenna patterns supported by the AP, respectively, and the plurality of antenna patterns providing respective radiation coverage areas; in accordance with a determination that at least one target client station is selected from the plurality of candidate client stations for communication, determining a target antenna pattern associated with a target station group to which the at least one target client station is assigned; and causing the AP to communicate with the at least one target client station using the target antenna pattern.

    DEFERRED AUTHENTICATION IN A SECURE BOOT SYSTEM

    公开(公告)号:US20220318391A1

    公开(公告)日:2022-10-06

    申请号:US17223493

    申请日:2021-04-06

    Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.

    Reliable multicast/broadcast transmission scheme

    公开(公告)号:US11457407B2

    公开(公告)日:2022-09-27

    申请号:US16547183

    申请日:2019-08-21

    Abstract: In one example a computer implemented method comprises receiving, at an access point of a wireless network, a multicast/broadcast frame which identifies one or more stations associated with the access point as a recipient for the multicast/broadcast frame, and in response to a determination that at least one station of the one or more stations identified as a recipient for the multicast/broadcast frame is in an inactive state, determining a beacon slot time for a transmission of the multicast/broadcast frame from the access point, in response to a determination that at least one of the one or more stations in an inactive state will miss the beacon signal, converting the multicast/broadcast frame to a unicast frame, and holding a copy of the unicast frame to be transmitted to the at least one of the one or more stations in an inactive state that will miss the beacon signal.

    System and method to implement scan on wireless composite device

    公开(公告)号:US11039373B2

    公开(公告)日:2021-06-15

    申请号:US16547186

    申请日:2019-08-21

    Abstract: In one example a computer implemented method comprises estimating, in a processor communicatively coupled to a wireless client of a composite device, a first transmission time for an uplink beacon from a first access point communicatively coupled to the wireless client, scheduling, in the processor, a second transmission time for a beacon from a local access point of the composite device, and defining a scan window during which scan operations for the wireless client of the composite device and the local access point of the composite device are to occur, the scan window offset from the second transmission time by a first time buffer.

    Channel scheduling for spatial reuse
    18.
    发明申请

    公开(公告)号:US20190335499A1

    公开(公告)日:2019-10-31

    申请号:US16356143

    申请日:2019-03-18

    Abstract: An example device comprising: a processor to determine that a client device is located in an overlapping area between the first network device and a second network device, to synchronize a first clock of the first network device with a second clock of the second network device, to negotiate, with the second network device, a overlapping access window, an overlapping forbidden window, and a non-overlapping access window for the first network device and the second network device in beacon intervals, to allocate the overlapping access window, the overlapping forbidden window, and the non-overlapping access window by the first network device, to store the allocated overlapping access window, the allocated overlapping forbidden window, and the allocated non-overlapping access window as channel scheduling rules for spatial reuse, and to control frame transmission of the network device based on the channel scheduling rules:

Patent Agency Ranking