-
公开(公告)号:US20190239232A1
公开(公告)日:2019-08-01
申请号:US15963827
申请日:2018-04-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Qiang Zhou , Guangzhi Ran , Jianpo Han
IPC: H04W72/08 , H04B17/318
Abstract: An example network device may include a processor to receive information of a set of devices including at least one network device; estimate interferences of available basic service set (BSS) color values in a specified channel, based on the received information; and select one BSS color value with the interference lower than others from the available BSS color values.
-
公开(公告)号:US20250039785A1
公开(公告)日:2025-01-30
申请号:US18360043
申请日:2023-07-27
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Jiaqi Li , Liao Xu
IPC: H04W52/02
Abstract: An example method for managing wake schedules of client devices is presented. A wireless networking device determines a value of a data traffic characteristic of a client device based on monitoring of data traffic associated with the client device. If it is determined that the client device is capable of implementing the TWT mechanism, the wireless networking device may set a wake schedule for the client device based on the value of the data traffic characteristic. Once the wake schedule is set, the wireless networking device communicates with the client device as per the wake schedule. In some examples, the wireless networking device may set custom wake schedules for different client devices when the client devices have different behaviors for the same data traffic characteristic. Further, in certain examples, the wireless networking device may even set custom wake schedules for different activity periods for the same client device.
-
公开(公告)号:US12052794B2
公开(公告)日:2024-07-30
申请号:US16905861
申请日:2020-06-18
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Liao Xu
IPC: H04W8/00 , H04L43/0888 , H04W24/08
CPC classification number: H04W8/005 , H04L43/0888 , H04W24/08
Abstract: Systems and methods are provided for detecting the presence of a hidden camera on a network. When video is encoded and transmitted over/across a network, the data packet carrying the video tend to exhibit certain characteristics or features specific to video traffic from a hidden camera. A machine learning model for detecting the presence of a hidden camera can be trained based on these characteristics and features. Once trained, the machine learning model can be operationalized on an access point that can analyze real-time network traffic to determine whether a hidden camera(s) is operating on the network.
-
公开(公告)号:US20230068972A1
公开(公告)日:2023-03-02
申请号:US17461390
申请日:2021-08-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Yafeng Jiang , Jianpo Han , Guangzhi Ran
Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.
-
公开(公告)号:US11357014B2
公开(公告)日:2022-06-07
申请号:US16753270
申请日:2017-10-23
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han , Guangzhi Ran , Qiang Zhou
Abstract: An example device comprising: a monitor to detect cellular signals; and a processor to: calculate frequencies of interferences produced due to the detected cellular signals; estimate energy levels of the interferences at the calculated frequencies; and determine available frequencies based on the calculated frequencies and the estimated energy levels to avoid transmissions on a plurality of frequency bands associated with a second order harmonic distortion, a third order harmonic distortion, a second order inter-modulation distortion (IMD 2), or a third order inter-modulation distortion (IMD 3).
-
公开(公告)号:US11277715B2
公开(公告)日:2022-03-15
申请号:US16448023
申请日:2019-06-21
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Qiang Zhou , Guangzhi Ran , Jianpo Han
Abstract: An example network device may include a processor to assign resource units (RUs) for a multicast frame and a unicast frame, wherein the assigned RUs include a first RU corresponding to the multicast frame and a second RU corresponding to the unicast frame, and wherein a client device corresponding to the unicast frame is excluded in a subset of client devices corresponding to the multicast frame; and transmit the multicast frame and the unicast frame in a same duration by the first RU and the second RU, respectively.
-
公开(公告)号:US20210336781A1
公开(公告)日:2021-10-28
申请号:US17259627
申请日:2019-06-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Xuguang Jia , Qiang Zhou , Guangzhi Ran , Jianpo Han
Abstract: The present application discloses a network device, a method for security and a computer readable storage medium. The example network device may include a processor to perform: acquiring data to be processed from a downstream device, and transmitting it to a trusted platform module (TPM); and after the TPM encrypts the data to be processed using a cloud key stored therein, receiving the encrypted data for subsequent usage. The processor is further to perform: sending a request to a remote server to acquire the cloud key; and forwarding the acquired cloud key to the TPM for storage.
-
公开(公告)号:US11122502B2
公开(公告)日:2021-09-14
申请号:US16487131
申请日:2017-03-07
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han
Abstract: Example systems relate to access point fit. A system may include a processing resource and a memory resource. The memory resource may store machine readable instructions to cause the processing resource to determine a fit for a first client device using a plurality of metrics in response to a scan request from the first client device. The memory resource may further include instructions to cause the processing resource to determine that the fit for the first client device is above a threshold fit. The memory resource may further include instructions to cause the proceeding resource to respond to the scan request from the first client device with a probe response in response to the determination that the fit for the first client device is above the threshold fit.
-
公开(公告)号:US11047975B2
公开(公告)日:2021-06-29
申请号:US16647791
申请日:2017-09-28
Applicant: Hewlett Packard Enterprise Development LP , Qiang Zhou , Guangzhi Ran , Jianpo Han , Andre Beaudin , Shahnawaz Siraj
Inventor: Qiang Zhou , Guangzhi Ran , Jianpo Han , Andre Beaudin , Shahnawaz Siraj
Abstract: An example system may include a plurality of wireless radio chains of a radio operating at a channel in a wireless network and a processor to receive a ranging measurement request for a client device not associated with the wireless network, split a subset of wireless radio chains from the plurality of the wireless radio chains, and use the subset of wireless radio chains to service the ranging measurement request.
-
公开(公告)号:US11019554B2
公开(公告)日:2021-05-25
申请号:US16494788
申请日:2017-04-14
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Qiang Zhou , Jianpo Han , Guangzhi Ran
Abstract: An example method of controlling a wireless access point may include associating accumulated-channel-resource-consumption variables with, respectively, resource consumers of the wireless access point. The method may further include, for wireless communications of the wireless access point determining a number of spatial streams effectively consumed by the respective wireless communication; determining an operational bandwidth effectively consumed by the respective wireless communication; determining a duration of the respective wireless communication; determining a channel-resource-consumption amount for the respective wireless communication based on the number of spatial streams effectively consumed by the respective wireless communication, the operational bandwidth effectively consumed by the respective wireless communication, and the duration of the respective wireless communication; and determining values for the accumulated-channel-resource-consumption variables by accumulating the channel-resource-consumption amounts per resource consumer. The method may further include determining whether to impose channel access restrictions on the resource consumers based on their respective accumulated-channel-resource-consumption variables.
-
-
-
-
-
-
-
-
-