摘要:
A method, apparatus and system enable distribution and enforcement of authenticated network connection policy. Specifically, in one embodiment, a wireless network may admit manageability cores (“MCs”) that include a manageability feature set, i.e., devices that do not implement the full wireless network feature set defined by IEEE standards. In one embodiment, the MCs and backend policy decision point (“PDP”) may agree upon connection policy information for the MCs, and a may utilize a mutually authenticated mechanism to deliver the agreed upon connection policy information to the MCs and Access Points (“Aps”).
摘要:
Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed.
摘要:
Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed.
摘要:
Embodiments of the present invention provide a method comprising transmitting, by a communication node, an information element (IE), the IE including a feature field indicating whether the communication node operates in accordance with an integrity protection protocol specifically for management frames, and the IE further including an enforcement field that advertises whether the integrity protection protocol for management and control frames is mandatory, and generating, by the communication node, a pairwise transient key (PTK), the PTK including a first plurality of keys and a pairwise integrity key (PIK), wherein the first plurality of keys are configured to protect an integrity of data frames transmitted by the communication node and the PIK is configured to protect an integrity of management frames transmitted by the communication node, wherein management frames are dedicated to management traffic and wherein the first plurality of keys and the PIK are different keys. Other embodiments may be described and claimed.
摘要:
A system, method and device may include triggering a direct connection setup based on one or more communication parameters communicated with a mobile device via a fixed device. It may be determined whether the mobile device is a peer. The quality of service with the mobile device via the fixed device may be compared with quality of service of a mobile device via a direct link. A channel for the direct link may be selected and information may be sent to the mobile device over the direct link via the channel.
摘要:
Embodiments of apparatuses, articles, methods, and systems for fast transitioning resource negotiation in wireless networks are generally described herein. Other embodiments may be described and claimed.
摘要:
Disclosed is a method for secure transfer of data for enabling roaming of the wireless device between a plurality of wireless networks. The wireless device data from an authentication server via a first channel. The authentication server sends the request for the data to an information server using a second channel. The information server generates the data bases on parameters of the wireless device and provides the data to the wireless device through the authentication server. The secure transfer of data to the wireless device enables roaming of the wireless device in a plurality of wireless networks.
摘要:
Various embodiments of the invention pertain to a communications process through which two wireless network devices in two different networks can establish a direct communications link with each other, so that communications between the two devices do not have to go through the respective network controllers. In some embodiments, after establishment of the direct link each of the two devices may continue to switch between its direct link and its infrastructure communications with the network controller.
摘要:
Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional.
摘要:
An intelligent network interface apparatus to provide always-on, always-connected processing for call signals is described. One embodiment of the apparatus includes logic to selectively handle incoming call signals even when a computer to which the apparatus is operably connected is unavailable (e.g., asleep). The apparatus may also include logic for selectively waking up a sleeping computer upon determining that incoming call signals indicate that a communication with the computer is desired. The incoming call signals may be associated with a voice over internet protocol (VoIP) communication.