MANAGING WAKE SCHEDULES FOR CLIENT DEVICES BASED ON DATA TRAFFIC

    公开(公告)号:US20250039785A1

    公开(公告)日:2025-01-30

    申请号:US18360043

    申请日:2023-07-27

    Abstract: An example method for managing wake schedules of client devices is presented. A wireless networking device determines a value of a data traffic characteristic of a client device based on monitoring of data traffic associated with the client device. If it is determined that the client device is capable of implementing the TWT mechanism, the wireless networking device may set a wake schedule for the client device based on the value of the data traffic characteristic. Once the wake schedule is set, the wireless networking device communicates with the client device as per the wake schedule. In some examples, the wireless networking device may set custom wake schedules for different client devices when the client devices have different behaviors for the same data traffic characteristic. Further, in certain examples, the wireless networking device may even set custom wake schedules for different activity periods for the same client device.

    Systems and methods for wireless camera detection

    公开(公告)号:US12052794B2

    公开(公告)日:2024-07-30

    申请号:US16905861

    申请日:2020-06-18

    Inventor: Jianpo Han Liao Xu

    CPC classification number: H04W8/005 H04L43/0888 H04W24/08

    Abstract: Systems and methods are provided for detecting the presence of a hidden camera on a network. When video is encoded and transmitted over/across a network, the data packet carrying the video tend to exhibit certain characteristics or features specific to video traffic from a hidden camera. A machine learning model for detecting the presence of a hidden camera can be trained based on these characteristics and features. Once trained, the machine learning model can be operationalized on an access point that can analyze real-time network traffic to determine whether a hidden camera(s) is operating on the network.

    AUTHENTICATING AN INTERMEDIATE COMMUNICATION DEVICE

    公开(公告)号:US20230068972A1

    公开(公告)日:2023-03-02

    申请号:US17461390

    申请日:2021-08-30

    Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.

    Transmit multicast frame
    36.
    发明授权

    公开(公告)号:US11277715B2

    公开(公告)日:2022-03-15

    申请号:US16448023

    申请日:2019-06-21

    Abstract: An example network device may include a processor to assign resource units (RUs) for a multicast frame and a unicast frame, wherein the assigned RUs include a first RU corresponding to the multicast frame and a second RU corresponding to the unicast frame, and wherein a client device corresponding to the unicast frame is excluded in a subset of client devices corresponding to the multicast frame; and transmit the multicast frame and the unicast frame in a same duration by the first RU and the second RU, respectively.

    NETWORK DEVICE, METHOD FOR SECURITY AND COMPUTER READABLE STORAGE MEDIUM

    公开(公告)号:US20210336781A1

    公开(公告)日:2021-10-28

    申请号:US17259627

    申请日:2019-06-06

    Abstract: The present application discloses a network device, a method for security and a computer readable storage medium. The example network device may include a processor to perform: acquiring data to be processed from a downstream device, and transmitting it to a trusted platform module (TPM); and after the TPM encrypts the data to be processed using a cloud key stored therein, receiving the encrypted data for subsequent usage. The processor is further to perform: sending a request to a remote server to acquire the cloud key; and forwarding the acquired cloud key to the TPM for storage.

    Access point fit
    38.
    发明授权

    公开(公告)号:US11122502B2

    公开(公告)日:2021-09-14

    申请号:US16487131

    申请日:2017-03-07

    Inventor: Jianpo Han

    Abstract: Example systems relate to access point fit. A system may include a processing resource and a memory resource. The memory resource may store machine readable instructions to cause the processing resource to determine a fit for a first client device using a plurality of metrics in response to a scan request from the first client device. The memory resource may further include instructions to cause the processing resource to determine that the fit for the first client device is above a threshold fit. The memory resource may further include instructions to cause the proceeding resource to respond to the scan request from the first client device with a probe response in response to the determination that the fit for the first client device is above the threshold fit.

    Wireless channel access restrictions

    公开(公告)号:US11019554B2

    公开(公告)日:2021-05-25

    申请号:US16494788

    申请日:2017-04-14

    Abstract: An example method of controlling a wireless access point may include associating accumulated-channel-resource-consumption variables with, respectively, resource consumers of the wireless access point. The method may further include, for wireless communications of the wireless access point determining a number of spatial streams effectively consumed by the respective wireless communication; determining an operational bandwidth effectively consumed by the respective wireless communication; determining a duration of the respective wireless communication; determining a channel-resource-consumption amount for the respective wireless communication based on the number of spatial streams effectively consumed by the respective wireless communication, the operational bandwidth effectively consumed by the respective wireless communication, and the duration of the respective wireless communication; and determining values for the accumulated-channel-resource-consumption variables by accumulating the channel-resource-consumption amounts per resource consumer. The method may further include determining whether to impose channel access restrictions on the resource consumers based on their respective accumulated-channel-resource-consumption variables.

Patent Agency Ranking