摘要:
L'invention concerne une technique de gestion d'un droit d'accès à un réseau pour un dispositif communicant (20). Le dispositif communicant détecte une connexion à un appareil de recharge (10) et envoie une demande de rechargement à destination d'un dispositif de traitement (30). Cette demande de rechargement comprend une estimation d'une quantité d'énergie demandée et un identifiant de batterie. Sur réception d'un accord de rechargement, le dispositif communicant alimente la batterie identifiée par l'appareil de recharge en fonction de la quantité d'énergie accordée. Le droit d'accès au réseau du dispositif communicant est prolongé dans le réseau en fonction de la quantité d'énergie accordée.
摘要:
This disclosure generally relates to systems, devices, apparatuses, and methods for providing adaptive discovery timing between wireless devices. A channel is identified for use by a wireless communication device. One or more channel conditions associated with the channel are determined. The system selects a value for a minimum wait time from multiple possible minimum time values based on the one or more channel conditions. In one example, the minimum wait time may represent the amount of time that the wireless communication device will wait before sending a probe request on the channel. In another example, the selected minimum wait time may represent the amount of time that the wireless communication device will remain on the channel after sending the probe request on the channel.
摘要:
A small cell includes a transceiver configured to receive and access request from a wireless- enabled device. The small cell also includes a processor configured to selectively provide the wireless-enabled device with private access to an enterprise network and public access to one or more core networks of mobile network operators based on an identifier included in the access request. The wireless-enabled device includes a transceiver configured to receive, from the small cell, broadcast information including an identifier of the enterprise network or the one or more core networks. The wireless-enabled device also includes a processor configured to compare the broadcast information to configuration information stored in the wireless-enabled device. The configuration information includes identifiers of the enterprise network or the core networks. The processor is configured to selectively provide the access request to the small cell based on the comparison.
摘要:
This disclosure describes systems, methods, and devices related to access point grouping and identification. A first access point may determine an access point group identification (ID) associated with the first access point and a second access point, wherein the first access point is associated with a first basic service set (BSS) and the second access point is associated with a second BSS. The first access point may determine a first station device associated with the first access point and a second station device associated with the second access point. The first access point may cause to send the access point group ID, a first identification information associated with the first station device, and a second identification information associated with the second station device. The first access point may initiate a multiuser communication between the first access point, the first station device and the second station device based on the access point group ID, the first identification information and the second identification information.
摘要:
We disclose various embodiments that enable a mobile terminal to authenticate a base station before the mobile terminal proceeds to attach to the corresponding network and/or camp on the corresponding cell, e.g., during the initial network selection and attachment or during an idle mode. In an example embodiment, the authentication processing includes the mobile terminal generating and sending to a candidate base station a system query with a nonce. The candidate base station is deemed to be authentic only if the acknowledgement generated and transmitted in response to the system query includes a copy of the nonce properly signed by a digital signature generated using one or more security keys. In some embodiments, the system query may also include a request for GPS coordinates and/or selected system information signed using a digital signature, which the mobile terminal may beneficially use to further strengthen the protection against a spoofing attack.