Abstract:
Systems and methods for providing adaptive probe responses may be provided. An Access Point (AP) may receive a new probe response configuration, and compare the new probe response configuration to an old probe response configuration. The AP may determine that AP is operating in an ignore, a duplicate, or a hybrid mode based on the comparison of the new probe response configuration to the old probe response configuration. The AP may determine one or more probe response structures using the new probe response configuration and/or the old probe response configuration based on the mode the AP is operating in. When the AP receives a probe request from a Station (STA), the AP may send one or more probe responses in the probe response structures based the mode the AP is operating in.
Abstract:
The present disclosure describes a system and method for deconflicting locally administered medium access control addresses (LAMAs). An apparatus includes a memory and a processor communicatively coupled to the memory. The processor receives a request for a client device to use a LAMA and determines that the LAMA is reserved for future use by a first access point. The processor also transmits to the client device a message denying connectivity to the client device using the LAMA.
Abstract:
A meeting server receives shared content from a presenter device in an online conference session with one or more attendee devices. The meeting server generates one or more digital watermarks corresponding to the one or more attendee devices. Each respective digital watermark includes an indication of the presenter device and an indication of a respective attendee device. The meeting server transmits the shared content with the respective digital watermark to the respective attendee device as part of the online conference session. The respective digital watermark is visible in the shared content displayed on the respective attendee device.
Abstract:
An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.
Abstract:
Secure communication with a Backscatter Device (BKD) may be provided. A temporal key may be created. The temporal key and a network Identifier (ID) may be encrypted with a public key of a public private key pair associated with the BKD. An excitation frame including the encrypted temporal key and the encrypted network ID may be transmitted to the BKD. The AMP BKD may include a sensor. A BKD frame may be received from the BKD in response to the excitation frame. The BKD frame may include a sensor data encoded with the temporal key and the network ID as a target destination. The BKD frame may be signed using a private key of the public private key pair.
Abstract:
Techniques for connecting known entities to a protected network are described. A user device with a certified application installed is authenticated with an identification repository. The authentication is accomplished using credentials associated with the certified application. The user device is also enrolled with an authentication server and the authenticated user device is connected to the protected network.
Abstract:
A meeting server receives shared content from a presenter device in an online conference session with one or more attendee devices. The meeting server generates one or more digital watermarks corresponding to the one or more attendee devices. Each respective digital watermark includes an indication of the presenter device and an indication of a respective attendee device. The meeting server transmits the shared content with the respective digital watermark to the respective attendee device as part of the online conference session. The respective digital watermark is visible in the shared content displayed on the respective attendee device.
Abstract:
Methods, logic, apparatus, and systems are provided to support cross cluster directory number (DN) extension mobility (EM) using dynamic network distributed dial-peer updates in a communication networks, which includes a plurality of clusters or systems and each of the plurality of clusters including a call control agent (CCA). Identification data corresponding to an identity of an associated user is received into a first cluster of a multiple cluster telecommunication network. A directory number and associated first telecommunication device corresponding to the user are registered with a first call control agent of the first cluster in accordance with received identification data. Registration data corresponding to the registered directory number is communicated to at least a second cluster of the telecommunications network. An incoming connection request associated with the registered directory number is routed directly to the first CCA without redirection to any other CCAs within the multiple cluster telecommunication network.
Abstract:
Fine Time Measurement (FTM) Location Configuration Information (LCI) protection and, specifically, FTM LCI protection with authentication and selective client enablement may be provided. To perform FTM LCI protection, a controller may first obtain a key-pair including a public key and a private key from a Certificate Authority (CA). The controller my determine a venue location where an Access Point (AP) is located. The controller may send a Certificate Signing Request (CSR) with the venue location to the CA. In response to sending the CSR, the controller may receive a public key certificate from the CA, wherein the public key certificate includes the venue location. The AP may receive a request for Location Configuration Information (LCI) from a Station (STA), wherein the LCI includes an AP location. The AP creates a hash of LCI of the AP using the private key and sends the LCI and the hash to the STA.
Abstract:
Embodiments herein describe segmenting a Wi-Fi network into different groups. The embodiments herein assign a user, a client device, or a traffic flow originating from a client device to a group. For example, all the client devices for a particular user can be assigned to the same group tag, or each traffic flow in the client device may be assigned to different groups. Each group corresponds to a group key which can be transmitted to the client device when the device associates to an access point (AP). As such, within the same service set identifier (SSID), there can be multiple groups, and thus, client devices can use different group keys to communicate with other client devices associated to the same SSID. Put differently, rather than all devices connected the same SSID being assigned to the same group, the client devices can be assigned in different groups.