Restricted target wait time interference detection and management

    公开(公告)号:US12219477B2

    公开(公告)日:2025-02-04

    申请号:US17816877

    申请日:2022-08-02

    Abstract: Network traffic interference detection and management may be provided. An infringement event by an infringing Access Point (AP) on a Restricted Target Wake Time (rTWT) transmission opportunity (TxOp) associated with a victim AP may be detected, and information associated with the infringement event may be added to an infringement list, wherein the information includes a MAC address associated with the infringing AP. A controller, may receive the infringement list and notify the infringement event to the infringing AP. The infringing AP may determine whether a transmission associated with the infringement event is low latency and high priority. When the transmission is not low latency and high priority the infringing AP may modify future transmissions based on the notification. When the transmission is low latency and high priority the infringing AP may notify the controller that the transmission is low latency and high priority. The controller may then create a negotiation between the victim AP and the infringing AP, wherein the negotiation comprises managing future transmissions of the victim AP and the infringing AP.

    GPS-attack prevention system and method for fine timing measurement (FTM) in 802.11AZ

    公开(公告)号:US11523283B2

    公开(公告)日:2022-12-06

    申请号:US16985807

    申请日:2020-08-05

    Abstract: Presented herein are techniques for GPS attack prevention in association with wireless communication devices. In at least one embodiment, a method may include receiving, at a mobile device from a first access point (AP), first location information and one or more of a first token or first neighbor information relating to neighboring APs. The mobile device may receive from a second AP, second location information and one or more of a second token or second neighbor information relating to neighboring APs. The first token may be compared to the second token to determine whether the first and second tokens are consistent, and/or the first neighbor information may be compared to the second neighbor information to determine whether the first and second neighbor information are consistent. It may be determined whether the first location information provided by the first AP and the second location information provided by the second AP are valid based on the comparison(s).

    Random access trigger frame based uplink OFDMA scheduling mechanism

    公开(公告)号:US11457470B2

    公开(公告)日:2022-09-27

    申请号:US17036724

    申请日:2020-09-29

    Abstract: A method for scheduling a random access trigger frame (RA TF) in a wireless LAN includes determining whether a scheduled access (SA) TF is scheduled during a beacon interval (BI) beginning with a next beacon; determining whether one of, a first weighted average of a sum of (i) a number of clients whose respective buffer status reports (BSRs) have been successfully received (NSUCC) and (ii) a number of clients whose respective BSRs collided with one another (NCOL) is greater than a first threshold, or a second weighted average of an active number of UL OFDMA enabled HE users sending SU uplink traffic (NSU) is greater than the first threshold; when either weighted average is greater than the first threshold, allocating a predetermined number of RA RUs along with at least one SA RU in a buffer status report poll (BSRP) TF and scheduling the BSRP TF for transmission.

    Bypassing radar in wide dynamic frequency selection (DFS) channels utilizing puncturing

    公开(公告)号:US11172484B2

    公开(公告)日:2021-11-09

    申请号:US16504972

    申请日:2019-07-08

    Abstract: Bypassing radar in wide Dynamic Frequency Selection (DFS) channels utilizing puncturing may be provided. A first client device may be classified as eligible for puncturing and a second client device may be classified as not eligible for puncturing. Next, it may be determined that a subchannel in a bandwidth range should not be used. Then, in response to determining that the subchannel in the bandwidth range should not be used, the first client device may be steered to a first subset of the bandwidth range and the second client device may be steered to a second subset of the bandwidth range. The second subset of the bandwidth range may be smaller than the first subset of the bandwidth range.

Patent Agency Ranking