摘要:
Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed.
摘要:
A technique for allowing client-driven profile updates in a wireless network uses a shared character password and a shared image that is known by both a client device and a network server. In some embodiments, a random character table is generated by a client device and is used, along with the shared character password and shared image, to calculate a one-time password (OTP). The OTP is then used to both encrypt and sign a new security profile to be delivered to the network server in a profile update request. The server may then generate the same OTP using information within the request and the shared character password and shared image. The new profile may then be decrypted and validated within the server.
摘要:
Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed.
摘要:
A method and apparatus to enable configuring of a management frame priority and security type. The method and the apparatus may set a priority level and a transmission data rate of a management frame. The apparatus includes a memory including a priority queue for each management frame and a transmitter to transmit said management frame according to the priority queue of said frame.
摘要:
Systems and methods provide a mechanism for wireless stations and access points to negotiate security parameters for protecting management frames. The access point and station determine which management frames they are capable of and desire to protect. Data indicating protected frames are then exchanged between the station and access point to select which management frames are to be protected and a protection mechanism to be used for protecting the management frames.
摘要:
An energy efficient multi-core computing device and method are disclosed. According to embodiments of the invention, the processing load on a multi-core computing device may be monitored to determine whether one or more cores on the device may be dynamically shut down. Conversely, any core that is shut down may be dynamically powered up if the processing load on the device increases. Embodiments of the present invention therefore provide significant energy savings on multi-core platforms by minimizing the active cores on the device without affecting the device's processing capabilities.
摘要:
A system, apparatus, method and article to manage roaming in a wireless communication system are described. An apparatus may include a first wireless device having a processor to receive roaming information for a second wireless device from a third wireless device, and send the roaming information to the second wireless device to establish a connection with the third wireless device. Other embodiments are described and claimed.
摘要:
Embodiments of the present invention provide a method comprising transmitting, by a communication node, an information element (IE), the IE including a feature field indicating whether the communication node operates in accordance with an integrity protection protocol specifically for management frames, and the IE further including an enforcement field that advertises whether the integrity protection protocol for management and control frames is mandatory, and generating, by the communication node, a pairwise transient key (PTK), the PTK including a first plurality of keys and a pairwise integrity key (PIK), wherein the first plurality of keys are configured to protect an integrity of data frames transmitted by the communication node and the PIK is configured to protect an integrity of management frames transmitted by the communication node, wherein management frames are dedicated to management traffic and wherein the first plurality of keys and the PIK are different keys. Other embodiments may be described and claimed.
摘要:
A method of authenticating a device's access to a communications node is disclosed. The method of operation includes the communications node generating a first value for use in the derivation of a first encryption key, the first encryption key being at least partially used to authenticate the device's access to the communications node in a first communications exchange. The method of operation includes the communications node modifying the first value, independent of the device, to create a second value. The method includes the communications node using the second value in authenticating the device's access to the communications node in a second communications exchange. Embodiments of the present invention include but are not limited to communications nodes and devices, subsystems, and systems equipped to operate in the above-described manner.
摘要:
An embodiment of the present invention provides an apparatus, comprising a wireless station (STA) operable to communicate with a first access point (AP) and roam to a next access point (AP), wherein said next AP pre-caches a number of IP addresses from a backend Dynamic Host Configuration Protocol (DHCP) server; and wherein said wireless station (STA) gathers IP layer address and sub-network information from said next Access Point (AP) during roaming.