POWER SAVING TECHNIQUES FOR SUPPORTING DOWNLINK DATA BUFFER SIZE NEGOTIATION IN A TARGET WAKE TIME (TWT) PROTOCOL

    公开(公告)号:US20250126555A1

    公开(公告)日:2025-04-17

    申请号:US18488769

    申请日:2023-10-17

    Abstract: Systems and methods described herein determine, by a processing device executing on a requesting station, a target wake time (TWT) buffer size, wherein the TWT buffer size indicates a buffer size to allocate at a responding station when the requesting station is in a sleep mode. The systems and methods insert, by the requesting station, a TWT buffer size request into a request message, wherein the TWT buffer size request comprises the TWT buffer size. In turn, the systems and methods transmit the request message from the requesting station to the responding station.

    DEVICES, SYSTEMS AND METHODS FOR THROUGHPUT ORIENTED ASSOCIATION WITH ACCESS POINT DEVICES

    公开(公告)号:US20250119826A1

    公开(公告)日:2025-04-10

    申请号:US18983710

    申请日:2024-12-17

    Abstract: A method can include, by operation of an access point device (AP), between transmissions of a periodic beacon frame, communicating with each associated station devices (STAs), from communications with the STAs determining connection information for all associated STAs, and generating an information element (IE) that includes the connection information for all associated STAs. During a beacon transmission period, a beacon frame can be transmitted that includes a media access control (MAC) header, a frame body, and a frame check sequence. The frame body can include the IE. Corresponding devices and systems are also disclosed.

    Secure fine time measurement for wireless communication protocols

    公开(公告)号:US12160737B2

    公开(公告)日:2024-12-03

    申请号:US17127026

    申请日:2020-12-18

    Abstract: In general, techniques are described by which to perform secure fine time measurement for wireless communication protocols. An initiating station comprising wireless communication circuitry may be configured to perform the techniques. The wireless communication circuitry may be configured to receive, in accordance with a wireless networking protocol for communicating between the initiating station and a responding station, a first fine time measurement specifying a first time. The wireless communication circuitry may also be configured to receive, in accordance with the wireless networking protocol and for the corresponding first time, a first message integrity code. The wireless communication circuitry may next be configured to authenticate, based on the first message integrity code, the responding station to establish that the fine time measurement is from a trusted responding station.

    METHODS, SYSTEMS AND DEVICES FOR VARYING WIRELESS TRANSMIT POWER BASED ON PATH LOSS INFORMATION

    公开(公告)号:US20200336993A1

    公开(公告)日:2020-10-22

    申请号:US16572195

    申请日:2019-09-16

    Abstract: A method can include at a first station in a wireless network, receiving path loss (PL) transmissions from at least a second station, dynamically changing power for transmissions from the first station to the second station based on the received PL information, determining PL values for transmissions received at the first station from other stations, and sending PL transmissions from the first station that include the determined PL values for at least one other station. The PL transmissions are configured to be received by stations of the same wireless network and stations of a different wireless network. Corresponding devices and systems are also disclosed.

    METHODS, DEVICES AND SYSTEMS FOR AUTHENTICATION OF DEVICES TO A WIRELESS NETWORK WITH MULTI-PART PASSPHRASES

    公开(公告)号:US20250142323A1

    公开(公告)日:2025-05-01

    申请号:US18424506

    申请日:2024-01-26

    Inventor: Hui Luo

    Abstract: A method can include, by operation of a first wireless device, storing a first passphrase comprising a common password and a specific password, transforming the common password into a first finite field (FF) element and the specific password into a second FF element. A first key can be generated using a received third scalar value and third FF element. A commit message can be transmitted with a portion encrypted with the first key. In response to receiving a fourth scalar value and a fourth FF element, generating a second key using at least the fourth scalar value and the fourth FF element, and transmitting a second wireless message with a portion encrypted with the second key. In response to validating a received confirmation message using the second key, establishing encryption keys for a wireless connection using at least the second key. Corresponding devices and systems are also disclosed.

Patent Agency Ranking