Dynamic identification of network connection preferences

    公开(公告)号:US10455632B2

    公开(公告)日:2019-10-22

    申请号:US15426928

    申请日:2017-02-07

    Abstract: Methods and apparatus are disclosed for device discovery, pairing, and transmission of audio and video media, using preference data shared between a media sender/source node and a media receiver/sink node. In some examples of the disclosed technology, a sink node sends, via a peer-to-peer wireless communication path, a discovery message to a source node comprising a preference indication including an indication of a first one of two communication paths to use for the establishing a connection. The sink node receives a request to establish a connection between the sink node and the source node based on the indicated preference. Based on the received request, the sink node establishes a connection between the sink node and the source node. A selected communication path (e.g., peer-to-peer wireless or wireless infrastructure) can be indicated as preferred, along with additional parameters for the media connection.

    DYNAMIC IDENTIFICATION OF NETWORK CONNECTION PREFERENCES

    公开(公告)号:US20180152977A1

    公开(公告)日:2018-05-31

    申请号:US15426928

    申请日:2017-02-07

    CPC classification number: H04W76/14 H04W8/005 H04W48/12 H04W48/16 H04W88/08

    Abstract: Methods and apparatus are disclosed for device discovery, pairing, and transmission of audio and video media, using preference data shared between a media sender/source node and a media receiver/sink node. In some examples of the disclosed technology, a sink node sends, via a peer-to-peer wireless communication path, a discovery message to a source node comprising a preference indication including an indication of a first one of two communication paths to use for the establishing a connection. The sink node receives a request to establish a connection between the sink node and the source node based on the indicated preference. Based on the received request, the sink node establishes a connection between the sink node and the source node. A selected communication path (e.g., peer-to-peer wireless or wireless infrastructure) can be indicated as preferred, along with additional parameters for the media connection.

    Access point assisted roaming
    3.
    发明授权

    公开(公告)号:US10667207B2

    公开(公告)日:2020-05-26

    申请号:US14519870

    申请日:2014-10-21

    Abstract: In embodiments of access point assisted roaming, a mobile device, such as a mobile phone, tablet computer, or other portable device is implemented for wireless connection with access points, such as Wi-Fi access points. An access point controller can receive a request for a neighbor report from the mobile device, and also obtain a travel direction of the mobile device. The access point controller is implemented to determine access points that are each configured for a wireless connection with a communication system of the mobile device, where a wireless connection with an access point is based in part on a detected signal strength of an access point. The access point controller can then generate the neighbor report that lists one or more of the access points in order of connection likelihood and based on the travel direction of the mobile device.

    WIRELESS PROVISIONING A DEVICE FOR A NETWORK USING A SOFT ACCESS POINT

    公开(公告)号:US20180176970A1

    公开(公告)日:2018-06-21

    申请号:US15898615

    申请日:2018-02-18

    Abstract: A computing device for provisioning a wireless device for connection to a wireless network via a legacy access point. The wireless device supports a wireless protected setup protocol for obtaining the network profile of the network. A user requests the computing device discover wireless devices for provisioning. In response to the user input, the computing device is configured as a soft access point and broadcasts a beacon signal indicating that the access point supports a wireless protected setup protocol, such as Wi-Fi Protected Setup. A request for provisioning is then received by the computing device from the wireless device. A network profile is transmitted from the computing device to the wireless device in accordance with the wireless protected setup protocol. The wireless device may use the profile to connect to the network via the legacy access point using the network profile.

    SECURE PROTOCOL FOR PEER-TO-PEER NETWORK
    8.
    发明申请
    SECURE PROTOCOL FOR PEER-TO-PEER NETWORK 有权
    安全对等网络对等

    公开(公告)号:US20150229612A1

    公开(公告)日:2015-08-13

    申请号:US14600477

    申请日:2015-01-20

    Abstract: A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.

    Abstract translation: 作为对等组的控制器的无线计算设备被配置为为连接组的每个设备生成唯一的主密钥。 无线计算设备可以使用唯一主密钥来选择性地从组中移除远程设备,使得远程设备不能稍后重新加入组。 其他远程设备(每个拥有主密钥保持有效)可以与组断开连接,然后在没有明确的用户操作的情况下重新连接到组。 为了支持这种行为,无线设备可以提供用户界面,通过该用户界面,用户可以通过提供用于选择性地从组中断开或移除远程设备的命令来管理连接的远程设备。

    Wireless provisioning a device for a network using a soft access point

    公开(公告)号:US10117281B2

    公开(公告)日:2018-10-30

    申请号:US15713682

    申请日:2017-09-24

    Abstract: A computing device for provisioning a wireless device for connection to a wireless network via a legacy access point. The wireless device supports a wireless protected setup protocol for obtaining the network profile of the network. A user requests the computing device discover wireless devices for provisioning. In response to the user input, the computing device is configured as a soft access point and broadcasts a beacon signal indicating that the access point supports a wireless protected setup protocol, such as Wi-Fi Protected Setup. A request for provisioning is then received by the computing device from the wireless device. A network profile is transmitted from the computing device to the wireless device in accordance with the wireless protected setup protocol. The wireless device may use the profile to connect to the network via the legacy access point using the network profile.

Patent Agency Ranking