AUTHENTICATING AN INTERMEDIATE COMMUNICATION DEVICE

    公开(公告)号:US20230068972A1

    公开(公告)日:2023-03-02

    申请号:US17461390

    申请日:2021-08-30

    Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.

    Transmit multicast frame
    23.
    发明授权

    公开(公告)号:US11277715B2

    公开(公告)日:2022-03-15

    申请号:US16448023

    申请日:2019-06-21

    Abstract: An example network device may include a processor to assign resource units (RUs) for a multicast frame and a unicast frame, wherein the assigned RUs include a first RU corresponding to the multicast frame and a second RU corresponding to the unicast frame, and wherein a client device corresponding to the unicast frame is excluded in a subset of client devices corresponding to the multicast frame; and transmit the multicast frame and the unicast frame in a same duration by the first RU and the second RU, respectively.

    NETWORK DEVICE, METHOD FOR SECURITY AND COMPUTER READABLE STORAGE MEDIUM

    公开(公告)号:US20210336781A1

    公开(公告)日:2021-10-28

    申请号:US17259627

    申请日:2019-06-06

    Abstract: The present application discloses a network device, a method for security and a computer readable storage medium. The example network device may include a processor to perform: acquiring data to be processed from a downstream device, and transmitting it to a trusted platform module (TPM); and after the TPM encrypts the data to be processed using a cloud key stored therein, receiving the encrypted data for subsequent usage. The processor is further to perform: sending a request to a remote server to acquire the cloud key; and forwarding the acquired cloud key to the TPM for storage.

    Wireless channel access restrictions

    公开(公告)号:US11019554B2

    公开(公告)日:2021-05-25

    申请号:US16494788

    申请日:2017-04-14

    Abstract: An example method of controlling a wireless access point may include associating accumulated-channel-resource-consumption variables with, respectively, resource consumers of the wireless access point. The method may further include, for wireless communications of the wireless access point determining a number of spatial streams effectively consumed by the respective wireless communication; determining an operational bandwidth effectively consumed by the respective wireless communication; determining a duration of the respective wireless communication; determining a channel-resource-consumption amount for the respective wireless communication based on the number of spatial streams effectively consumed by the respective wireless communication, the operational bandwidth effectively consumed by the respective wireless communication, and the duration of the respective wireless communication; and determining values for the accumulated-channel-resource-consumption variables by accumulating the channel-resource-consumption amounts per resource consumer. The method may further include determining whether to impose channel access restrictions on the resource consumers based on their respective accumulated-channel-resource-consumption variables.

    RELIABLE MULTICAST/BROADCAST TRANSMISSION SCHEME

    公开(公告)号:US20210058861A1

    公开(公告)日:2021-02-25

    申请号:US16547183

    申请日:2019-08-21

    Abstract: In one example a computer implemented method comprises receiving, at an access point of a wireless network, a multicast/broadcast frame which identifies one or more stations associated with the access point as a recipient for the multicast/broadcast frame, and in response to a determination that at least one station of the one or more stations identified as a recipient for the multicast/broadcast frame is in an inactive state, determining a beacon slot time for a transmission of the multicast/broadcast frame from the access point, in response to a determination that at least one of the one or more stations in an inactive state will miss the beacon signal, converting the multicast/broadcast frame to a unicast frame, and holding a copy of the unicast frame to be transmitted to the at least one of the one or more stations in an inactive state that will miss the beacon signal.

    SYSTEM AND METHOD TO IMPLEMENT SCAN ON WIRELESS COMPOSITE DEVICE

    公开(公告)号:US20210058850A1

    公开(公告)日:2021-02-25

    申请号:US16547186

    申请日:2019-08-21

    Abstract: In one example a computer implemented method comprises estimating, in a processor communicatively coupled to a wireless client of a composite device, a first transmission time for an uplink beacon from a first access point communicatively coupled to the wireless client, scheduling, in the processor, a second transmission time for a beacon from a local access point of the composite device, and defining a scan window during which scan operations for the wireless client of the composite device and the local access point of the composite device are to occur, the scan window offset from the second transmission time by a first time buffer.

    Channel scheduling for spatial reuse

    公开(公告)号:US10827521B2

    公开(公告)日:2020-11-03

    申请号:US16356143

    申请日:2019-03-18

    Abstract: An example device comprising: a processor to determine that a client device is located in an overlapping area between the first network device and a second network device, to synchronize a first clock of the first network device with a second clock of the second network device, to negotiate, with the second network device, a overlapping access window, an overlapping forbidden window, and a non-overlapping access window for the first network device and the second network device in beacon intervals, to allocate the overlapping access window, the overlapping forbidden window, and the non-overlapping access window by the first network device, to store the allocated overlapping access window, the allocated overlapping forbidden window, and the allocated non-overlapping access window as channel scheduling rules for spatial reuse, and to control frame transmission of the network device based on the channel scheduling rules.

Patent Agency Ranking