-
公开(公告)号:US20210058861A1
公开(公告)日:2021-02-25
申请号:US16547183
申请日:2019-08-21
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Qiang Zhou , Jianpo Han , Guangzhi Ran
Abstract: In one example a computer implemented method comprises receiving, at an access point of a wireless network, a multicast/broadcast frame which identifies one or more stations associated with the access point as a recipient for the multicast/broadcast frame, and in response to a determination that at least one station of the one or more stations identified as a recipient for the multicast/broadcast frame is in an inactive state, determining a beacon slot time for a transmission of the multicast/broadcast frame from the access point, in response to a determination that at least one of the one or more stations in an inactive state will miss the beacon signal, converting the multicast/broadcast frame to a unicast frame, and holding a copy of the unicast frame to be transmitted to the at least one of the one or more stations in an inactive state that will miss the beacon signal.
-
公开(公告)号:US20210058850A1
公开(公告)日:2021-02-25
申请号:US16547186
申请日:2019-08-21
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Guangzhi Ran , Qiang Zhou , Jianpo Han
Abstract: In one example a computer implemented method comprises estimating, in a processor communicatively coupled to a wireless client of a composite device, a first transmission time for an uplink beacon from a first access point communicatively coupled to the wireless client, scheduling, in the processor, a second transmission time for a beacon from a local access point of the composite device, and defining a scan window during which scan operations for the wireless client of the composite device and the local access point of the composite device are to occur, the scan window offset from the second transmission time by a first time buffer.
-
公开(公告)号:US10827521B2
公开(公告)日:2020-11-03
申请号:US16356143
申请日:2019-03-18
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han , Qiang Zhou , Guangzhi Ran
Abstract: An example device comprising: a processor to determine that a client device is located in an overlapping area between the first network device and a second network device, to synchronize a first clock of the first network device with a second clock of the second network device, to negotiate, with the second network device, a overlapping access window, an overlapping forbidden window, and a non-overlapping access window for the first network device and the second network device in beacon intervals, to allocate the overlapping access window, the overlapping forbidden window, and the non-overlapping access window by the first network device, to store the allocated overlapping access window, the allocated overlapping forbidden window, and the allocated non-overlapping access window as channel scheduling rules for spatial reuse, and to control frame transmission of the network device based on the channel scheduling rules.
-
公开(公告)号:US10771954B2
公开(公告)日:2020-09-08
申请号:US15966393
申请日:2018-04-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Qiang Zhou , Sachin Ganu , Guangzhi Ran , Jianpo Han
Abstract: An example of controlling a network of wireless access points (APs) to detect that a client device associated with the network is stationary in an AP-overlap area, and in response to the detection that the client device is stationary in the AP-overlap area, assigning one of the APs to be a preferred AP for the client device. The APs are to avoid connecting with any client devices that have been assigned another AP as a preferred AP. Thus, the stationary client device in the overlap area may be prevented from undesired roaming.
-
公开(公告)号:US20190239173A1
公开(公告)日:2019-08-01
申请号:US16262292
申请日:2019-01-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Xuguang Jia , Qiang Zhou , Jianpo Han , Guangzhi Ran
IPC: H04W56/00
CPC classification number: H04W56/001 , H04W56/0015 , H04W84/12
Abstract: An example device comprising: a processor to detect a time difference between a first system clock of an access point (AP) and a second system clock of a controller; determine whether the AP has abnormal dock based on the time difference; and automatically recover the first system clock of the AP when the AP has abnormal clock.
-
公开(公告)号:US12132714B2
公开(公告)日:2024-10-29
申请号:US17672011
申请日:2022-02-15
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Huimeng Huang , Jianpo Han , Zhijun Ren , Chunfeng Wang
IPC: H04L67/1004 , H04L9/40 , H04L12/46 , H04L67/141
CPC classification number: H04L63/0485 , H04L12/4633 , H04L63/029 , H04L63/164 , H04L67/1004 , H04L67/141
Abstract: Systems are methods are provided for implementing load balancing of IPsec security associations (SAs) SAs between different heterogeneous cores, for example in a multiple controller systems. The balancing of IPsec SAs are performed using software implementations of IPsec offloading and/or hardware implementations of IPsec offloading. By balancing the processing functions related to orchestration of IPsec SAs between hardware (e.g., IPsec hardware accelerator) and software (e.g., IPsec software accelerator), the methods realize increased optimization, improved user experience, and enhanced product performance in networks using IPsec. For example, an IPsec session is initiated, and it is determined whether a resource limitation for a hardware-based IPsec accelerator has been reached. If the limitation for the hardware-based IPsec accelerator has been reached, processing for the IPsec SA for the initiated IPsec session is offloaded to a software-based IPsec accelerator.
-
公开(公告)号:US12099133B2
公开(公告)日:2024-09-24
申请号:US17487630
申请日:2021-09-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han , Jiguang Zheng , Kuanyue Li
IPC: G01S5/02 , G01R33/022 , G01R33/24
CPC classification number: G01S5/0284 , G01R33/022 , G01R33/24
Abstract: In embodiments of the present disclosure, a method is provided for managing an AP position for an access point. In the method, a magnetic distribution map is obtained for an indoor area, the magnetic distribution map representing a plurality of reference magnetic values that are collected at a plurality of reference positions in the indoor area. A plurality of magnetic measurements are received, here the plurality of magnetic measurements are respectively collected at a plurality of access point (AP) positions at which a plurality of APs are deployed within the indoor area, and the plurality of AP positions are unknown. The plurality of AP positions are mapped to a portion of the plurality of reference positions based on the plurality of magnetic measurements and the plurality of reference magnetic values. The plurality of AP positions are determined based on the portion of the plurality of reference positions. Therefore, AP positions may be determined accurately and effectively in an indoor environment.
-
公开(公告)号:US12095905B2
公开(公告)日:2024-09-17
申请号:US17461390
申请日:2021-08-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Yafeng Jiang , Jianpo Han , Guangzhi Ran
CPC classification number: H04L9/0827 , H04L9/0825 , H04L9/0866 , H04L9/3247 , H04L2209/12
Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.
-
公开(公告)号:US12056244B2
公开(公告)日:2024-08-06
申请号:US17223493
申请日:2021-04-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Yinzhi Dong
IPC: G06F21/57
CPC classification number: G06F21/575 , G06F2221/034
Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.
-
公开(公告)号:US11902886B2
公开(公告)日:2024-02-13
申请号:US17528308
申请日:2021-11-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Liao Xu , Jianpo Han , Zhenlei Wang
Abstract: Examples of techniques for optimizing Neighbour Report (NR) are disclosed. In an example, a first virtual access point (VAP) operating in a 2.4 Giga Hertz (GHz) or 5 GHz band may determine a first Service Set Identifier (SSID) of the first VAP operating in a 2.4 GHz or 5 GHz band. The first VAP may identify a set of co-located VAPs operating in a 6 GHz band. The first VAP may filter the set of co-located VAPs to obtain a neighbour list comprising a second VAP, from the set, having a second SSID identical to the first SSID. Using the neighbour list, the first VAP may generate a Neighbour Report.
-
-
-
-
-
-
-
-
-