Patent application number | Description | Published |
20080272880 | DEVICE WITH IC, SOC OR SIP HAVING ONE OR MORE REMOTELY ENABLED MODULE AND METHODS FOR SELLING THE DEVICE - A device comprises an integrated circuit comprising N first circuit modules each having an enabled state, wherein N is an integer greater than zero and M second circuit modules each having a disabled state, wherein M is an integer greater than zero. A control module that outputs upgrade data including identification of the M second circuit modules for enabling the M second circuit modules, respectively, and that allows selection and enablement of at least one of the M second circuit modules by a purchaser based on payment of at least corresponding ones of M prices associated with said M second circuit modules. | 11-06-2008 |
20100008276 | POWER SAVE MODE FOR ACCESS POINTS - An access point includes a detection module and a control module. The detection module determines whether a client station communicates with the access point during a predetermined period of time. The access point initially operates in a normal mode during the predetermined period of time. The control module transitions the access point from the normal mode to a power save mode based on whether the client station communicates with the access point during the predetermined period of time. | 01-14-2010 |
20100008277 | PARTIAL POWER SAVE MODE FOR ACCESS POINTS DURING DEVICE DISCOVERY - An access point includes a beacon module and a control module. The access point transmits a beacon during a beacon interval. The beacon module determines a first portion of the beacon interval and a second portion of the beacon interval. The access point operates in a normal mode during the first portion of the beacon interval. The control module operates the access point in a power save mode during the second portion of the beacon interval. The control module operates the access point in the power save mode in response to a client station not communicating with the access point during the first portion of the beacon interval. | 01-14-2010 |
20100010899 | SERVICE DISCOVERY METHODS - Aspects of the disclosure provide a method for service discovery. The method includes receiving a first service advertisement by a first device. The first service advertisement includes at least a service of a second device. Further, the method include updating a service directory of the first device to include the service of the second device, and transmitting a second service advertisement by the first device. The second service advertisement includes at least the service of the second device, and can be used by a third device to effect use of the service of the second device. | 01-14-2010 |
20100011231 | ACCESS POINT ROTATION FOR SHARING POWER LOAD - Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first device. When the first device starts to serve as the AP of the network, the second device can be configured to enter into a power save state in order to reduce power consumption by the second device in the next time interval. | 01-14-2010 |
20100054154 | IP ASSIGNMENT SCHEME FOR DYNAMIC PEER-TO-PEER NETWORKS - An approach for assigning IP network addresses and for performing name resolution and service discovery in infrastructure mode and/or ad-hoc mode peer-to-peer networks. The size of an ad-hoc network and/or the size of infrastructure network basic service sets may be limited to a selected number of peer stations. A first portion of an IP network address assigned to stations joining a network may be predetermined by the network to be joined and a second portion of the IP network address may be selected dynamically, as each new station joins the network. Stations may generate layer 2 messages that include an information element containing information that supports peer-to-peer service discovery, name resolution and IP network address assignment across multiple ad-hoc and infrastructure networks. A peer-to-peer station may dynamically connect to available ad-hoc or infrastructure networks to access required services, as needed. | 03-04-2010 |
20100067509 | RAPID LOCAL ADDRESS ASSIGNMENT FOR WIRELESS COMMUNICATION NETWORKS - According to one embodiment, apparatus having corresponding computer programs comprise: a receiver to receive a first wireless signal from a wireless network; an address module to determine a type of Internet Protocol address assignment employed by the wireless network based on the first wireless signal; and a connection module to establish a network-layer connection to the wireless network based on the type of Internet Protocol address assignment determined by the address module. According to another embodiment, apparatus having corresponding computer programs comprise: a transmitter to transmit a first wireless signal, wherein the first wireless signal represents an indication of a type of Internet Protocol address assignment employed by a wireless network connected to the apparatus. | 03-18-2010 |
20100332822 | WIRELESS MULTIBAND SECURITY - A network device includes a first physical layer (PHY) module, a second physical layer (PHY) module, and a security module. The first PHY module is configured to operate in a first frequency band. The second PHY module is configured to operate in a second frequency band. The security module is configured to establish security for the first frequency band responsive to the network device operating in the first frequency band. The security module is further configured to establish security for the second frequency band prior to the network device switching operation from the first frequency band to the second frequency band. | 12-30-2010 |
20100333185 | GENERATING SECURITY MATERIAL - An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS) having a central secret holder/provider that allows secure, direct, station-to-station communications and that allows secure station-to-station broadcast communications. The first station and the second station will have previously established a security association (SA) with a topology control point (PCP). The method includes creating pair-wise unique material for the first station. The pair-wise unique material is computed as a function of (i) a known shared secret associated with the PCP, (ii) a first piece of unique data associated with the first station, and (iii) a second piece of unique data associated with the second station. The method includes securely communicating the pair-wise unique material from the first station to the second station. | 12-30-2010 |
20110055558 | GALOIS/COUNTER MODE ENCRYPTION IN A WIRELESS NETWORK - A system includes a temporal key module, a nonce module, and a security module. The temporal key module is configured to generate a first temporal key. The first temporal key is to be used to encrypt a plurality of packets. The nonce module is configured to generate a nonce for each packet encrypted based on the first temporal key. Each nonce includes a packet number that is different than packet numbers associated with other nonces generated by the nonce module. The security module is configured to determine when the packet number included in the nonce generated by the nonce module is greater than or equal to a predetermined threshold. | 03-03-2011 |
20110154039 | STATION-TO-STATION SECURITY ASSOCIATIONS IN PERSONAL BASIC SERVICE SETS - A personal basic service set (PBSS) includes a first device configured to communicate in the PBSS and a second device configured to communicate in the PBSS. The first device is configured to establish a robust security network association (RSNA) with the second device (i) without associating with a PBSS control point (PCP) and (ii) without associating with the second device. | 06-23-2011 |
20120096138 | Assignment of Network Addresses - Systems and techniques relating to hierarchical address assignment in ad hoc networks are described. A described technique includes receiving, by a device of an ad hoc network, a request to register in the ad hoc network from an enrollee device. The devices can be wireless mobile devices, and the ad hoc network can be an independent basic service set (IBSS) network. The method also includes responding to the enrollee with information representing (i) an address for the enrollee device, and (ii) a finite quantity of addresses to be assigned to future enrollee devices. | 04-19-2012 |
20120096184 | Management of Network Membership - Systems and techniques relating to management of membership in mobile, wireless ad hoc networks are described. A described technique includes transmitting, by a device that is not a member of an ad hoc network, a request to join the ad hoc network to a given device of the ad hoc network. The method also includes receiving from the given device information including a set of addresses of devices of the ad hoc network that is locally stored at the given device. In addition, the method includes obtaining an address for the requesting device to be different from any address of the received set of addresses. | 04-19-2012 |
20120201213 | WLAN CHANNEL ALLOCATION - An available frequency band for communication is determined, and a subset of communication channels from possible communication channels within the available frequency band is determined based on the available frequency band. A communication channel is selected from the subset of communication channels, and the selected communication channel is utilized to communicate with one or more communication devices. | 08-09-2012 |
20120207106 | WLAN CHANNEL ALLOCATION - In a method available frequency band for communication is determined and a frequency f | 08-16-2012 |
20120238304 | ASSISTED LOCATION-BASED WIRELESS SPECTRUM ALLOCATION - Apparatus having corresponding computer-readable media comprise: a first transceiver, wherein the first transceiver includes a receiver configured to receive a first message from a first device, wherein the first message includes a location of the first device, and a transmitter configured to transmit a second message, wherein the second message includes the location of the first device, and a request for a frequency allocation based on the location of the first device; wherein the receiver is further configured to receive a third message, wherein the third message includes the frequency allocation; and a second transceiver configured to wirelessly communicate on a frequency band indicated by the frequency allocation. | 09-20-2012 |
20120284517 | WIRELESS AUTHENTICATION USING BEACON MESSAGES - Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, an access point controller includes a transmitter configured to wirelessly transmit a beacon message. The beacon message is configured to announce to a remote device that a wireless access point is available to provide access to a network. The beacon message includes a security identifier that identifies a public key for the wireless access point. | 11-08-2012 |
20120300762 | RAPID LOCAL ADDRESS ASSIGNMENT FOR WIRELESS COMMUNICATION NETWORKS - A method of operating a wireless communication device includes transmitting a query to a wireless network. The query requests information about a type of Internet Protocol (IP) address assignment in use on the wireless network. The method also includes receiving a reply from the wireless network, wherein the reply includes the information about the type of IP address assignment in use on the wireless network. The method further includes determining an IP address for the wireless communication device, including: only in response to the information about the type of IP address assignment in use on the wireless network, as set forth in the reply, indicating that dynamic host configuration protocol (DHCP) is in use by the wireless network, transmitting a DHCP discovery message to the wireless network in order to determine the IP address for the wireless communication device. | 11-29-2012 |
20120315853 | METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING A CONFIGURABLE PARAMETER OF A DISCOVERY PROTOCOL DURING DISCOVERY OF DEVICES IN A WIRELESS NETWORK - A method and apparatus for performing a discovery of one or more wireless devices. The method includes initiating, at a first wireless device, a discovery protocol having a configurable parameter, the discovery protocol being associated with discovery of one or more second wireless devices; determining a number of second wireless devices within a predetermined range of the first wireless device; and adjusting the configurable parameter of the discovery protocol based on the number of second wireless devices determined to be within the predetermined range of the first wireless device. The method further includes at the first wireless device, completing the discovery of one or more second wireless devices in accordance with the configurable parameter of the discovery protocol as adjusted based on the number of second wireless devices determined to be within the predetermined range of the first wireless device. | 12-13-2012 |
20130007850 | Verifying Server Identity - The present disclosure describes techniques for verifying server identity. In some aspects a grant to access resources associated with a server is received from the server via a wireless network through which an address of the server is undeterminable. The grant includes the address of the server, and the server is verified as a granting authority for the resources based on the address of the server and known address information for the granting authority of the services. | 01-03-2013 |
20130042313 | KEY DERIVATIVE FUNCTION FOR NETWORK COMMUNICATIONS - Systems, methods, and other embodiments associated with deriving group keys used to securely communicate in a wireless mesh network are described. According to one embodiment, a controller, for calculating group keys used to secure communications to a plurality of remote devices in a network, includes a key logic configured to calculate a group key by using a group master key and unique information about a remote device of the plurality of remote devices. The plurality of remote devices are configured in a mesh topology. The group key is for securing communications with the remote device. The controller also includes a communication logic configured to secure a communication by using the group key. The communication is to be transmitted to the remote device. | 02-14-2013 |
20130195085 | METHOD AND APPARATUS FOR DISCOVERING A WIRELESS DEVICE IN A WIRELESS NETWORK - A method for synchronizing the discovery of wireless services or applications in a wireless network using a recurring time interval T in which wireless devices within the wireless network can be in one of a predetermined plurality of time states. The method includes selecting a time state from amongst the plurality of time states, performing discovery by a first wireless device supporting a given service or application once during the recurring time interval T at the selected time state, and repeating the above steps in successive ones of the recurring time interval T until all of the predetermined plurality of time states have been selected. | 08-01-2013 |
20130203413 | METHOD AND APPARATUS FOR DISCOVERING WIRELESS DEVICES - Wireless discovery is the process in which a service or application is located by a wireless station on a network, usually after the station has established a connection with the network. Wireless pre-association refers to the process of describing an application or service by its hardware/software interoperability requirements and/or a unique identifier prior to a connection being established between two or more wireless stations. A method performs wireless discovery between two or more wireless stations by communicating a data string between a wireless station and another wireless station, prior to a connection having been established between the wireless station and another wireless station, the data string including interoperability information necessary for a service or an application to run on a wireless station receiving the data string. | 08-08-2013 |
20130246792 | KEY CENTRIC IDENTITY - Aspects of the disclosure provide a method. The method includes generating an identification based on a public key of an asymmetric key pair for a device, including the identification into an information unit to identify the device as a source of the information unit and transmitting the information unit. | 09-19-2013 |
20130250934 | RAPID LOCAL ADDRESS ASSIGNMENT FOR WIRELESS COMMUNICATION NETWORKS - A wireless client device includes a receiver and a connection module. The receiver is configured to receive, on a wireless medium of a wireless network, a management frame that is periodically transmitted on the wireless medium. The management frame includes an address assignment indication that indicates which address assignment types are employed by the wireless network. The connection module is configured to, in response to the address assignment indication indicating that a dynamic address assignment type is employed by the wireless network, configure a network-layer address for the wireless client device according to a dynamic address assignment protocol. The connection module is configured to, in response to the address assignment indication indicating that the dynamic address assignment type is not employed by the wireless network, configure the network-layer address for the wireless client device according to a link-local address assignment protocol. | 09-26-2013 |
20130279388 | ACCESS POINT ROTATION FOR SHARING POWER LOAD - Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first device. When the first device starts to serve as the AP of the network, the second device can be configured to enter into a power save state in order to reduce power consumption by the second device in the next time interval. | 10-24-2013 |
20140022973 | POWER SAVE MODE FOR ACCESS POINTS - A first network device including a control module to operate the first network device, prior to beginning discovery of a second network device, initially in a power save mode and subsequently in a normal mode after receiving an input from a user of the first network device while operating in the power save mode; and prior to beginning the discovery and subsequent to the first network device switching from operating in the power save mode to the normal mode, to alternately operate the first network device as a client station and an access point. A device detection module begins, subsequent to the first network device switching from operating in the power save mode to the normal mode, the discovery by scanning a network or by transmitting a beacon over the network when the first network device operates as a client station or an the access point, respectively. | 01-23-2014 |
20140040618 | GALOIS/COUNTER MODE ENCRYPTION IN A WIRELESS NETWORK - A system including a nonce module and an encryption module. The nonce module is configured to generate a nonce for each packet of a plurality of packets to be encrypted using a first temporal key. Each nonce includes a packet number that is different than packet numbers associated with other nonces generated by the nonce module for the plurality of packets. The packet number is greater than N bits in length, where N is an integer greater than 40. The encryption module is configured to encrypt, without reusing a value of the packet number, more than 2 | 02-06-2014 |
20140056199 | Power Saving Mode for access point - An access point including a beacon module that determines a beacon interval and that defines a first portion and a second portion of the beacon interval during which the access point operates in a normal mode and a power save mode, respectively. On receiving a communication from a client station during the first portion, a control module does not transition the access point from the normal mode to the power save mode at an end of the first portion. If the communication is not received during the first portion, the control module transitions the access point from the normal mode to the power save mode at the end of the first portion and from the power save mode to the normal mode at an end of the second portion. A duration of the second portion is less than a scan time of the client station. | 02-27-2014 |
20140215594 | WIRELESS AUTHENTICATION USING BEACON MESSAGES - Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, a controller includes logic configured to control a transmitter to wirelessly transmit a beacon message. The beacon message is configured to announce to a remote device that a wireless device is available to communicate. The beacon message includes a security identifier that identifies a public key for the wireless device. | 07-31-2014 |
20140258724 | SECURE SIMPLE ENROLLMENT - Methods, systems, and apparatus are disclosed for generating one or more device identifiers based on a public key associated with a respective device. Various embodiments include condensing and/or hashing a device public key to generate the corresponding device identifier. By using the relationship between a device public key and its device identifier, public key exchanges are implemented to verify this relationship and facilitate device enrollment into one or more networks. The embodiments further describe enrolling one or more devices into networks and/or authorizing devices to enroll one more devices into networks based on public key exchanges and verification that the one or more device identifiers match the respective public keys. Embodiments for authorizing other devices describe a first device enrolling a second device in a first network and authorizing a third device to enroll the second device in a second network using an exchange of public keys and/or messages. | 09-11-2014 |
20140269426 | SERVICE DISCOVERY METHODS - Aspects of the disclosure provide a method for service discovery. The method includes receiving a first service advertisement by a first device. The first service advertisement includes at least a service of a second device. Further, the method include updating a service directory of the first device to include the service of the second device, and transmitting a second service advertisement by the first device. The second service advertisement includes at least the service of the second device, and can be used by a third device to effect use of the service of the second device. | 09-18-2014 |
20140304535 | ACCESS POINT ROTATION FOR SHARING POWER LOAD - Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first device. When the first device starts to serve as the AP of the network, the second device can be configured to enter into a power save state in order to reduce power consumption by the second device in the next time interval. | 10-09-2014 |
20150026453 | SYSTEM AND METHOD FOR ESTABLISHING SECURITY IN NETWORK DEVICES CAPABLE OF OPERATING IN MULTIPLE FREQUENCY BANDS - A Network device including a security module to establish, in response to the network device being capable of operating in multiple frequency bands, and in response to the network device operating in a first frequency band, security for the frequency band and a second frequency band by performing a single authentication in the first frequency band prior to the network device switching operation form the first frequency band to the second frequency band. A session transfer module to transfer, subsequent to the network device switching operation from the first frequency band to the second frequency band, a communication session of the network device from the first frequency band to the second frequency band. The communication session resumes in the second frequency band using the security established for the second frequency band during the operation of the network device in the first frequency band. | 01-22-2015 |
20150071438 | SECURE DEVICE BOOTSTRAP IDENTITY - Systems, methods, and other embodiments associated with generating transient identifiers are described. According to one embodiment, an apparatus includes a memory device that stores a primary identifier that is unique to the apparatus. The primary identifier correlates with a displayed identifier of the apparatus that is used by a remote device to initiate communications with the apparatus. The apparatus includes identifier logic configured to generate a secondary identifier in response to receiving an association request that includes the displayed identifier when the apparatus is in a bootstrap mode. The bootstrap mode is a state of the apparatus when the apparatus is initializing and will accept a new association. The association request is a wireless communication that initiates establishing secure communications. The apparatus includes communication logic configured to establish secure wireless communications with the remote device by causing the remote device to identify the apparatus using the secondary identifier. | 03-12-2015 |