摘要:
Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed.
摘要:
A method, apparatus and system enable a secure wireless platform. Specifically, embodiments of the present invention may utilize a secure processing area to enforce security mechanisms on the wireless platform, thus isolating the security measures (e.g., security keys) from the host operating system on the wireless node.
摘要:
A method, apparatus and system enable a mobile device to roam while maintaining a persistent IP tunnel. Specifically, a mobile router may be utilized to enable a mobile device to maintain a persistent IP tunnel while the device roams. In one embodiment, the mobile device is a virtual host and the mobile router is a virtual mobile router.
摘要:
Embodiments of wireless communication devices and methods for protecting broadcasted management control messages from insider forgery in wireless network are generally described herein.
摘要:
A reservation protocol is provided to enable a client mobile station to make a number of reservations with a number of access points to facilitate its access of a network at a future point in time, as it roams, and subsequently exercise one of the reservations
摘要:
A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
摘要:
A wireless device operating as an access point (AP) uses an idle mode service and an idle mode mechanism to provide the capability of powering down during idle times. The client and the AP may share a cooperative idle mode mechanism to efficiently manage power for all devices operating in the WLAN.
摘要:
Cooperating entities share a signaling interface. Each entity establishes a security association between itself and an endpoint, and one of the entities transmits keepalive messages over a channel associated with the security association. Chipsets and systems to implement related methods are also described and claimed.
摘要:
Before a transition from a current access point (AP) to a new AP, a mobile wireless station (STA) may determine mobility capabilities, network infrastructure and resource information that may be used to select a transition mechanism to use via information acquired by the current AP regarding the new AP.
摘要:
Embodiments of methods and apparatus for providing integrity protection for management and control traffic of wireless communication networks are generally described herein. Other embodiments may be described and claimed.